Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe

Overview

General Information

Sample name:1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
Analysis ID:1575960
MD5:5b74ba5d3f7a0aff3dea2d3ae9bb1a59
SHA1:e872b3d30b3da56ac0cafb905087d595c129d73b
SHA256:b84745937d020b9750842b35590589aadf47153c995f266a3f44dae8b1ff51d8
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found API chain indicative of debugger detection
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Communication To Uncommon Destination Ports
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe (PID: 6208 cmdline: "C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe" MD5: 5B74BA5D3F7A0AFF3DEA2D3AE9BB1A59)
    • WMIC.exe (PID: 3328 cmdline: wmic os get Name MD5: E2DE6500DE1148C7F6027AD50AC8B891)
      • conhost.exe (PID: 3548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIC.exe (PID: 1928 cmdline: wmic cpu get name MD5: E2DE6500DE1148C7F6027AD50AC8B891)
      • conhost.exe (PID: 5904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIC.exe (PID: 5084 cmdline: wmic path win32_VideoController get name MD5: E2DE6500DE1148C7F6027AD50AC8B891)
      • conhost.exe (PID: 3052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 31.13.224.69, DestinationIsIpv6: false, DestinationPort: 8080, EventID: 3, Image: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, Initiated: true, ProcessId: 6208, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49737
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-16T12:18:21.489781+010020283713Unknown Traffic192.168.2.44973052.17.181.189443TCP
2024-12-16T12:18:23.502993+010020283713Unknown Traffic192.168.2.44973134.117.59.81443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://xweb.ddns.net:8080Avira URL Cloud: Label: malware
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeJoe Sandbox ML: detected
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED
Source: unknownHTTPS traffic detected: 52.17.181.189:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 34.117.59.81:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 4x nop then jmp 00EE15A0h0_2_00F016A0
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 4x nop then jmp 00EE15A0h0_2_00F01651
Source: global trafficTCP traffic: 192.168.2.4:49737 -> 31.13.224.69:8080
Source: Joe Sandbox ViewIP Address: 34.117.59.81 34.117.59.81
Source: Joe Sandbox ViewIP Address: 34.117.59.81 34.117.59.81
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: unknownDNS query: name: checkip.amazonaws.com
Source: unknownDNS query: name: ipinfo.io
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 34.117.59.81:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 52.17.181.189:443
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveContent-Type: application/jsonAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: checkip.amazonaws.com
Source: global trafficHTTP traffic detected: GET /country HTTP/1.1Connection: Keep-AliveContent-Type: application/jsonAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: ipinfo.io
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveContent-Type: application/jsonAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: checkip.amazonaws.com
Source: global trafficHTTP traffic detected: GET /country HTTP/1.1Connection: Keep-AliveContent-Type: application/jsonAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: ipinfo.io
Source: global trafficDNS traffic detected: DNS query: checkip.amazonaws.com
Source: global trafficDNS traffic detected: DNS query: ipinfo.io
Source: global trafficDNS traffic detected: DNS query: xscapezo.capetown
Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/json; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 450Host: xscapezo.capetown:8080
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000158D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xscapezo.capetown:8080
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000158D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xscapezo.capetown:8080/
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2687058268.000000000161C000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000161C000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2672859368.000000000161C000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2687208163.000000000161F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xscapezo.capetown:8080/7
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000161C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xscapezo.capetown:8080/?
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000158D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xscapezo.capetown:8080/P
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000161C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xscapezo.capetown:8080/V
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2687132172.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2672949046.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.0000000001607000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2687184938.0000000001606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xscapezo.capetown:8080/lR&F
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000158D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xscapezo.capetown:8080/t
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2687132172.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2672949046.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.0000000001607000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2687184938.0000000001606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xscapezo.capetown:8080/yG
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://xscapezo.capetown:80800
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://xscapezo.capetown:80802.40
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://xscapezo.capetown:8080on3Microsoft
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://xweb.ddns.net:8080
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://xweb.ddns.net:80806WinHttp.WinHttpRequest.5.16WinHttp.WinHttpRequest.5.16WinHttp.WinHttpReque
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://xweb.ddns.net:80807http://xscapezo.capetown:8080
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000154E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkip.amazonaws.com/
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879655271.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879788669.00000000015B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879655271.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879788669.00000000015B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/1
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879655271.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879788669.00000000015B8000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879731900.0000000001573000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/country
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879655271.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879788669.00000000015B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/country=
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879655271.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879788669.00000000015B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/countryx2
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownHTTPS traffic detected: 52.17.181.189:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 34.117.59.81:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EF587C0_2_00EF587C
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE90290_2_00EE9029
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EF81290_2_00EF8129
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE83A50_2_00EE83A5
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EF4CD70_2_00EF4CD7
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE9CAD0_2_00EE9CAD
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EEAF500_2_00EEAF50
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EF60C90_2_00EF60C9
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EEE0780_2_00EEE078
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EEAA690_2_00EEAA69
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00F014D00_2_00F014D0
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EEED200_2_00EEED20
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EEF6B70_2_00EEF6B7
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EFCE7D0_2_00EFCE7D
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EFB6100_2_00EFB610
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: String function: 00EE3DB2 appears 44 times
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED
Source: classification engineClassification label: mal60.evad.winEXE@10/0@3/3
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EEAF50 CoInitialize,GetActiveObject,CoCreateInstance,CoGetObject,SysFreeString,VariantClear,0_2_00EEAF50
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3548:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5904:120:WilError_03
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\J1NXL04D3R_V3
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3052:120:WilError_03
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe "C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe"
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic os get Name
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get name
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic os get NameJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get nameJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic path win32_VideoController get nameJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: winhttpcom.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: mlang.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2087c2f4-2cef-4953-a8ab-66779b670495}\InProcServer32Jump to behavior
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE15A0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00EE15A0
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeStatic PE information: section name: .eh_fram
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EF587C push esi; mov dword ptr [esp], 00F0C140h0_2_00EF573B
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EF4CD7 push edx; mov dword ptr [esp], eax0_2_00EF5486
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EF4CD7 push ecx; mov dword ptr [esp], eax0_2_00EF5493
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EF60C9 push esi; mov dword ptr [esp], 00F0C140h0_2_00EF573B
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE6029 push edx; mov dword ptr [esp], edi0_2_00EE604A
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE6029 push edi; mov dword ptr [esp], 00F0C140h0_2_00EE6078
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE4831 push edx; mov dword ptr [esp], 00F0C140h0_2_00EE4869
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE6150 push eax; mov dword ptr [esp], 00F0C140h0_2_00EE617F
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00F14273 push esp; ret 0_2_00F1427A
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EEAA69 push ecx; mov dword ptr [esp], 00000000h0_2_00EEAC11
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EEAA69 push eax; mov dword ptr [esp], edi0_2_00EEAC5A
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EF63DF push esi; mov dword ptr [esp], 00F0C140h0_2_00EF573B
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00F1031B push D1DD3004h; retf 0_2_00F10320
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00F13B03 pushad ; ret 0_2_00F13B0A
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00F144F1 push es; ret 0_2_00F144F4
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE74EF push eax; mov dword ptr [esp], 00F0C140h0_2_00EE7521
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00F13CB0 push ecx; ret 0_2_00F13CDA
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EF65BC push esi; mov dword ptr [esp], 00F0C140h0_2_00EF573B
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE754B push eax; mov dword ptr [esp], 00F0C140h0_2_00EE7588
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00F13D39 push edi; ret 0_2_00F13D44
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00F1252F push edx; ret 0_2_00F12536
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EEA508 push edx; mov dword ptr [esp], 00F0C140h0_2_00EEA555
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EEBD1C push ebx; mov dword ptr [esp], 00F0C140h0_2_00EEBD5A
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EEA6B5 push eax; mov dword ptr [esp], 00F0C140h0_2_00EEA6EB
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00F1469A push ecx; ret 0_2_00F1469B
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE6FB3 push eax; mov dword ptr [esp], 00F0C140h0_2_00EE6FF5
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EEBF56 push ebx; mov dword ptr [esp], 00F0C140h0_2_00EEBF84
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE6F34 push eax; mov dword ptr [esp], 00F0C140h0_2_00EE6F85
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HOOKEXPLORER.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: AUTORUNSC.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: X64DBG.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: REGMON.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HOOKEXPLORER.EXEPE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: WINDBG.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: AUTORUNS.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: IMPORTREC.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: PETOOLS.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: PROC_ANALYZER.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: SNIFF_HIT.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: SYSANALYZER.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: IDAQ.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXEX
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: FILEMON.EXE
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe TID: 3496Thread sleep time: -90000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe TID: 3156Thread sleep count: 186 > 30Jump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe TID: 3156Thread sleep time: -5580000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe TID: 6184Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeThread delayed: delay time: 30000Jump to behavior
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000154E000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2672949046.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879655271.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.0000000001593000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879838672.00000000015AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2672949046.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879655271.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.0000000001593000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879838672.00000000015AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeDebugger detection routine: IsDebuggerPresent or CheckRemoteDebuggerPresent, DecisionNodes, ExitProcess or Sleepgraph_0-20388
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EF587C Sleep,IsDebuggerPresent,0_2_00EF587C
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE15A0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00EE15A0
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00F028AE RemoveVectoredExceptionHandler,AddVectoredExceptionHandler,RtlAddVectoredExceptionHandler,TlsGetValue,CloseHandle,CloseHandle,TlsSetValue,CloseHandle,CloseHandle,TlsSetValue,CloseHandle,0_2_00F028AE
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE1148 GetStartupInfoA,_amsg_exit,_initterm,SetUnhandledExceptionFilter,__p__acmdln,__initenv,exit,_cexit,0_2_00EE1148
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE1189 _amsg_exit,_initterm,SetUnhandledExceptionFilter,__p__acmdln,__initenv,exit,_cexit,0_2_00EE1189
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EE1207 _initterm,_initterm,SetUnhandledExceptionFilter,__p__acmdln,__initenv,exit,_cexit,0_2_00EE1207
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic os get NameJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get nameJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic path win32_VideoController get nameJump to behavior
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00EF4227 CreateNamedPipeW,GetLastError,CreateNamedPipeW,GetLastError,CreateFileW,GetLastError,CreateFileW,GetLastError,0_2_00EF4227
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeCode function: 0_2_00F05168 GetSystemTimeAsFileTime,0_2_00F05168
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: procmon.exe
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: tcpview.exe
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: wireshark.exe
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: lordpe.exe
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: procexp.exe
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: autoruns.exe
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ollydbg.exe
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: regmon.exe
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exeWMI Queries: IWbemServices::ExecQuery - root\securitycenter2 : SELECT displayName FROM AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
Windows Management Instrumentation
1
DLL Side-Loading
12
Process Injection
121
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
12
Process Injection
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager241
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
Obfuscated Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture3
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets121
Virtualization/Sandbox Evasion
SSHKeylogging14
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
System Network Configuration Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync4
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe11%ReversingLabs
1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://xscapezo.capetown:8080/V0%Avira URL Cloudsafe
http://xscapezo.capetown:8080on3Microsoft0%Avira URL Cloudsafe
http://xscapezo.capetown:8080/70%Avira URL Cloudsafe
http://xweb.ddns.net:80807http://xscapezo.capetown:80800%Avira URL Cloudsafe
http://xscapezo.capetown:80800%Avira URL Cloudsafe
http://xscapezo.capetown:8080/?0%Avira URL Cloudsafe
http://xscapezo.capetown:8080/P0%Avira URL Cloudsafe
http://xscapezo.capetown:8080/t0%Avira URL Cloudsafe
http://xscapezo.capetown:8080/yG0%Avira URL Cloudsafe
http://xscapezo.capetown:8080/lR&F0%Avira URL Cloudsafe
http://xscapezo.capetown:808000%Avira URL Cloudsafe
http://xscapezo.capetown:80802.400%Avira URL Cloudsafe
http://xweb.ddns.net:80806WinHttp.WinHttpRequest.5.16WinHttp.WinHttpRequest.5.16WinHttp.WinHttpReque0%Avira URL Cloudsafe
http://xscapezo.capetown:8080/0%Avira URL Cloudsafe
http://xweb.ddns.net:8080100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
checkip.eu-west-1.prod.check-ip.aws.a2z.com
52.17.181.189
truefalse
    high
    ipinfo.io
    34.117.59.81
    truefalse
      high
      xscapezo.capetown
      31.13.224.69
      truefalse
        unknown
        checkip.amazonaws.com
        unknown
        unknownfalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://ipinfo.io/countryfalse
            high
            https://checkip.amazonaws.com/false
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://xscapezo.capetown:8080on3Microsoft1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://xweb.ddns.net:80807http://xscapezo.capetown:80801734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://xscapezo.capetown:8080/?1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000161C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://ipinfo.io/1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879655271.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879788669.00000000015B8000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://xscapezo.capetown:8080/71734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2687058268.000000000161C000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000161C000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2672859368.000000000161C000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2687208163.000000000161F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ipinfo.io/11734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879655271.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879788669.00000000015B8000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://xscapezo.capetown:8080/V1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000161C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://xscapezo.capetown:8080/lR&F1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2687132172.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2672949046.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.0000000001607000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2687184938.0000000001606000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://xscapezo.capetown:80801734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000158D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://xscapezo.capetown:8080/t1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000158D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://xscapezo.capetown:8080/P1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000158D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://ipinfo.io/country=1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879655271.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879788669.00000000015B8000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://xscapezo.capetown:8080/yG1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2687132172.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2672949046.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.0000000001607000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2687184938.0000000001606000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://xscapezo.capetown:80802.401734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ipinfo.io/countryx21734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879655271.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1879788669.00000000015B8000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://xscapezo.capetown:808001734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://xscapezo.capetown:8080/1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961318785.000000000158D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://xweb.ddns.net:80806WinHttp.WinHttpRequest.5.16WinHttp.WinHttpRequest.5.16WinHttp.WinHttpReque1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://xweb.ddns.net:80801734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.2961622131.0000000001B50000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      31.13.224.69
                      xscapezo.capetownBulgaria
                      48584SARNICA-ASBGfalse
                      34.117.59.81
                      ipinfo.ioUnited States
                      139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                      52.17.181.189
                      checkip.eu-west-1.prod.check-ip.aws.a2z.comUnited States
                      16509AMAZON-02USfalse
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1575960
                      Start date and time:2024-12-16 12:17:10 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 27s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:11
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      Detection:MAL
                      Classification:mal60.evad.winEXE@10/0@3/3
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 86%
                      • Number of executed functions: 32
                      • Number of non-executed functions: 50
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.63, 52.149.20.212
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimeTypeDescription
                      06:18:21API Interceptor202x Sleep call for process: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe modified
                      06:18:24API Interceptor3x Sleep call for process: WMIC.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      31.13.224.69Evjm8L1nEb.exeGet hashmaliciousUnknownBrowse
                      • xscapezo.capetown:8080/
                      Evjm8L1nEb.exeGet hashmaliciousUnknownBrowse
                      • xscapezo.capetown:8080/
                      34.117.59.81file.exeGet hashmaliciousInvicta Stealer, XWormBrowse
                      • ipinfo.io/json
                      Code%20Send%20meta%20Discord%20EXE.ps1Get hashmaliciousUnknownBrowse
                      • ipinfo.io/json
                      idl57nk7gk.exeGet hashmaliciousNeshtaBrowse
                      • ipinfo.io/json
                      idl57nk7gk.exeGet hashmaliciousNeshtaBrowse
                      • ipinfo.io/json
                      FormulariomillasbonusLATAM_GsqrekXCVBmUf.cmdGet hashmaliciousUnknownBrowse
                      • ipinfo.io/json
                      172.104.150.66.ps1Get hashmaliciousUnknownBrowse
                      • ipinfo.io/json
                      VertusinstruccionesFedEX_66521.zipGet hashmaliciousUnknownBrowse
                      • ipinfo.io/json
                      UjbjOP.ps1Get hashmaliciousUnknownBrowse
                      • ipinfo.io/json
                      I9xuKI2p2B.ps1Get hashmaliciousUnknownBrowse
                      • ipinfo.io/json
                      licarisan_api.exeGet hashmaliciousIcarusBrowse
                      • ipinfo.io/ip
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      ipinfo.iofile.exeGet hashmaliciousUnknownBrowse
                      • 34.117.59.81
                      file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, RedLine, Stealc, VidarBrowse
                      • 34.117.59.81
                      file.exeGet hashmaliciousUnknownBrowse
                      • 34.117.59.81
                      file.exeGet hashmaliciousInvicta Stealer, XWormBrowse
                      • 34.117.59.81
                      http://enteolcl.top/Get hashmaliciousUnknownBrowse
                      • 34.117.59.81
                      Product Blueprint..htmlGet hashmaliciousHTMLPhisherBrowse
                      • 34.117.59.81
                      dYUteuvmHn.exeGet hashmaliciousUnknownBrowse
                      • 34.117.59.81
                      https://drive.google.com/file/d/1yoYdaJg2olHzjqEKXjn6nnXKPPak7HoL/view?usp=sharing_eil&ts=675747b9Get hashmaliciousUnknownBrowse
                      • 34.117.59.81
                      zW72x5d91l.batGet hashmaliciousUnknownBrowse
                      • 34.117.59.81
                      https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comGet hashmaliciousHTMLPhisherBrowse
                      • 34.117.59.81
                      xscapezo.capetownEvjm8L1nEb.exeGet hashmaliciousUnknownBrowse
                      • 31.13.224.69
                      ugisGK1R1q.exeGet hashmaliciousDarkVision RatBrowse
                      • 31.13.224.69
                      Evjm8L1nEb.exeGet hashmaliciousUnknownBrowse
                      • 31.13.224.69
                      checkip.eu-west-1.prod.check-ip.aws.a2z.comEvjm8L1nEb.exeGet hashmaliciousUnknownBrowse
                      • 54.74.44.6
                      Evjm8L1nEb.exeGet hashmaliciousUnknownBrowse
                      • 52.49.226.227
                      exe028.exeGet hashmaliciousAgentTeslaBrowse
                      • 34.247.132.162
                      exe028.exeGet hashmaliciousUnknownBrowse
                      • 63.32.212.245
                      setup.exeGet hashmaliciousUnknownBrowse
                      • 3.248.31.219
                      1.cmdGet hashmaliciousUnknownBrowse
                      • 54.77.225.185
                      2.cmdGet hashmaliciousUnknownBrowse
                      • 18.203.170.139
                      fL271NVAru.exeGet hashmaliciousUnknownBrowse
                      • 34.245.248.194
                      fL271NVAru.exeGet hashmaliciousUnknownBrowse
                      • 54.72.227.37
                      ExeFile (277).exeGet hashmaliciousRedLineBrowse
                      • 54.73.172.143
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      AMAZON-02USarm4.elfGet hashmaliciousMiraiBrowse
                      • 52.25.126.226
                      main_sh4.elfGet hashmaliciousMiraiBrowse
                      • 54.171.230.55
                      ppc.elfGet hashmaliciousMiraiBrowse
                      • 54.253.166.233
                      i686.elfGet hashmaliciousMiraiBrowse
                      • 54.119.189.16
                      la.bot.mips.elfGet hashmaliciousMiraiBrowse
                      • 54.171.230.55
                      PAYMENT RECEIPT.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 13.227.8.110
                      debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                      • 108.142.47.109
                      m68k.elfGet hashmaliciousMiraiBrowse
                      • 18.175.186.201
                      powerpc.elfGet hashmaliciousMiraiBrowse
                      • 34.249.145.219
                      mipsel.elfGet hashmaliciousMiraiBrowse
                      • 54.171.230.55
                      GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                      • 34.117.188.166
                      P0HV8mjHS1.exeGet hashmaliciousCredential FlusherBrowse
                      • 34.117.188.166
                      P0HV8mjHS1.exeGet hashmaliciousCredential FlusherBrowse
                      • 34.117.188.166
                      mdPov8VTwi.exeGet hashmaliciousCredential FlusherBrowse
                      • 34.117.188.166
                      mdPov8VTwi.exeGet hashmaliciousCredential FlusherBrowse
                      • 34.117.188.166
                      arm6.elfGet hashmaliciousUnknownBrowse
                      • 34.117.135.65
                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                      • 34.117.188.166
                      armv5l.elfGet hashmaliciousUnknownBrowse
                      • 34.119.157.208
                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                      • 34.117.188.166
                      nmy4mJXEaz.exeGet hashmaliciousCredential FlusherBrowse
                      • 34.117.188.166
                      SARNICA-ASBGdebug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                      • 93.123.109.208
                      x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                      • 93.123.109.208
                      spc.elfGet hashmaliciousMirai, MoobotBrowse
                      • 93.123.109.208
                      m68k.elfGet hashmaliciousMirai, MoobotBrowse
                      • 93.123.109.208
                      ppc.elfGet hashmaliciousMirai, MoobotBrowse
                      • 93.123.109.208
                      arm.elfGet hashmaliciousMirai, MoobotBrowse
                      • 93.123.109.208
                      x86.elfGet hashmaliciousMirai, MoobotBrowse
                      • 93.123.109.208
                      arm7.elfGet hashmaliciousMirai, MoobotBrowse
                      • 93.123.109.208
                      mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                      • 93.123.109.208
                      Estado.de.cuenta.xlsGet hashmaliciousAveMaria, UACMeBrowse
                      • 94.156.167.55
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      a0e9f5d64349fb13191bc781f81f42e1h.htmlGet hashmaliciousUnknownBrowse
                      • 34.117.59.81
                      • 52.17.181.189
                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                      • 34.117.59.81
                      • 52.17.181.189
                      UUH30xVTpr.exeGet hashmaliciousLummaC, StealcBrowse
                      • 34.117.59.81
                      • 52.17.181.189
                      4TPPuMwzSA.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                      • 34.117.59.81
                      • 52.17.181.189
                      yYJUaOwKa8.exeGet hashmaliciousLummaCBrowse
                      • 34.117.59.81
                      • 52.17.181.189
                      Wqd6nMOfmG.exeGet hashmaliciousLummaC, StealcBrowse
                      • 34.117.59.81
                      • 52.17.181.189
                      hiip7UoiAq.exeGet hashmaliciousLummaCBrowse
                      • 34.117.59.81
                      • 52.17.181.189
                      AzunBFiz02.exeGet hashmaliciousLummaCBrowse
                      • 34.117.59.81
                      • 52.17.181.189
                      MessengerAdmin.exeGet hashmaliciousLummaCBrowse
                      • 34.117.59.81
                      • 52.17.181.189
                      SOjID1t3un.exeGet hashmaliciousLummaCBrowse
                      • 34.117.59.81
                      • 52.17.181.189
                      No context
                      No created / dropped files found
                      File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                      Entropy (8bit):6.2915290015918925
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      File size:231'936 bytes
                      MD5:5b74ba5d3f7a0aff3dea2d3ae9bb1a59
                      SHA1:e872b3d30b3da56ac0cafb905087d595c129d73b
                      SHA256:b84745937d020b9750842b35590589aadf47153c995f266a3f44dae8b1ff51d8
                      SHA512:1f4fb6efb04f3b4c57b92271996bd7008462660cd51ed6ee5144c2e073c3d090e11864ce0963ab996030b174400581699bc35d3566d2cd54a6e7137fa82114b5
                      SSDEEP:3072:PtjlDNJxzpxhot+5XDTzcsNsEYwszSHRGhYlW5SQUxk5ja:Pp+tErcslYZYw9QkU
                      TLSH:EA340815E202C4B5C43356B6998ED5A7A610BF3681239D0FBECE0F58F336B01592E76B
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....>g...............$..........................@.................................W.....@... ............................
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x4010ba
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x673EE9D5 [Thu Nov 21 08:05:41 2024 UTC]
                      TLS Callbacks:0x41a51c, 0x41a5b3, 0x4228ae
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:12964e2649ce9036e2a1286774ae86cc
                      Instruction
                      push ebp
                      mov ebp, esp
                      sub esp, 18h
                      mov dword ptr [ebp-0Ch], 000000FFh
                      mov dword ptr [004382E0h], 00000001h
                      call 00007F24A46C9991h
                      mov dword ptr [ebp-0Ch], eax
                      mov eax, dword ptr [ebp-0Ch]
                      leave
                      ret
                      push ebp
                      mov ebp, esp
                      sub esp, 18h
                      mov dword ptr [ebp-0Ch], 000000FFh
                      mov dword ptr [004382E0h], 00000000h
                      call 00007F24A46C996Dh
                      mov dword ptr [ebp-0Ch], eax
                      mov eax, dword ptr [ebp-0Ch]
                      leave
                      ret
                      lea ecx, dword ptr [esp+04h]
                      and esp, FFFFFFF0h
                      push dword ptr [ecx-04h]
                      push ebp
                      mov ebp, esp
                      push ecx
                      sub esp, 00000094h
                      mov dword ptr [ebp-0Ch], 00000000h
                      mov dword ptr [ebp-10h], 00000000h
                      mov dword ptr [esp+08h], 00000044h
                      mov dword ptr [esp+04h], 00000000h
                      lea eax, dword ptr [ebp-7Ch]
                      mov dword ptr [esp], eax
                      call 00007F24A46E9156h
                      mov eax, dword ptr [004382E0h]
                      test eax, eax
                      je 00007F24A46C9972h
                      lea eax, dword ptr [ebp-7Ch]
                      mov dword ptr [esp], eax
                      mov eax, dword ptr [00439278h]
                      call eax
                      sub esp, 04h
                      mov dword ptr [ebp-18h], 00000000h
                      mov dword ptr [ebp-20h], 00000018h
                      mov eax, dword ptr [ebp-20h]
                      mov eax, dword ptr fs:[eax]
                      mov dword ptr [ebp-24h], eax
                      mov eax, dword ptr [ebp-24h]
                      mov eax, dword ptr [eax+04h]
                      mov dword ptr [ebp-1Ch], eax
                      mov dword ptr [ebp-14h], 00000000h
                      jmp 00007F24A46C9984h
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x390000xd2c.idata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c0000x224.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x3d0000x1974.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x306c00x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x392300x1e0.idata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x2a6840x2a800f192cbeafafbd036787705e45cd5893cFalse0.43780445772058824data6.144924956418916IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0x2c0000x26c0x400cd4faee918b6d039163459e9ae43b365False0.2353515625Matlab v4 mat-file (little endian) \240\326B, numeric, rows 0, columns 0, imaginary1.8158646800282847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rdata0x2d0000x4d740x4e0026a00dcabd068bb3c2a6c5d84f4dd568False0.4118088942307692data5.844738930570382IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                      .eh_fram0x320000x5a540x5c00cecdba5a38cd979b609cc7ed770370a6False0.3012058423913043data4.87734250713647IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                      .bss0x380000xd600x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .idata0x390000xd2c0xe00b35ff9b62b16a100bd2cc076e9eec51eFalse0.38253348214285715data5.085846307423846IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .CRT0x3a0000x380x200be43b8407ee9c03eea15b7f75f778714False0.072265625data0.3195396310293397IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .tls0x3b0000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x3c0000x2240x400607703b05b5f04b5884d9f6aa2c5cda8False0.3056640625data3.4103687270366034IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .reloc0x3d0000x19740x1a00bcf6e1b200c8178aaf8164efda0e1e90False0.8143028846153846data6.667293120350955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_MANIFEST0x3c0580x1caXML 1.0 document, ASCII text, with very long lines (456), with CRLF line terminatorsEnglishUnited States0.5764192139737991
                      DLLImport
                      KERNEL32.dllAddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateSemaphoreA, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, FreeLibrary, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetHandleInformation, GetLastError, GetModuleHandleA, GetModuleHandleW, GetProcAddress, GetProcessAffinityMask, GetStartupInfoA, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount, InitializeCriticalSection, IsDBCSLeadByteEx, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryA, MultiByteToWideChar, OpenProcess, OutputDebugStringA, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, SetEvent, SetLastError, SetProcessAffinityMask, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, Sleep, SuspendThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte
                      msvcrt.dll__getmainargs, __initenv, __lconv_init, __mb_cur_max, __p__acmdln, __p__commode, __p__fmode, __set_app_type, __setusermatherr, _amsg_exit, _beginthreadex, _cexit, _endthreadex, _errno, _fileno, _initterm, _iob, _lock, _onexit, _setjmp3, _setmode, _strdup, _ultoa, _unlock, _vsnprintf, _vsnwprintf, _wfopen, _wgetenv, abort, atoi, calloc, exit, fclose, fflush, fgetwc, fprintf, fputc, free, fwrite, getc, localeconv, longjmp, malloc, memchr, memcmp, memcpy, memmove, memset, printf, realloc, setlocale, setvbuf, signal, strchr, strerror, strlen, strncmp, vfprintf, wcslen
                      USER32.dllMessageBoxA
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                      2024-12-16T12:18:21.489781+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.44973052.17.181.189443TCP
                      2024-12-16T12:18:23.502993+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.44973134.117.59.81443TCP
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 16, 2024 12:18:20.086318016 CET49730443192.168.2.452.17.181.189
                      Dec 16, 2024 12:18:20.086353064 CET4434973052.17.181.189192.168.2.4
                      Dec 16, 2024 12:18:20.086427927 CET49730443192.168.2.452.17.181.189
                      Dec 16, 2024 12:18:20.089668036 CET49730443192.168.2.452.17.181.189
                      Dec 16, 2024 12:18:20.089692116 CET4434973052.17.181.189192.168.2.4
                      Dec 16, 2024 12:18:21.489557981 CET4434973052.17.181.189192.168.2.4
                      Dec 16, 2024 12:18:21.489780903 CET49730443192.168.2.452.17.181.189
                      Dec 16, 2024 12:18:21.494684935 CET49730443192.168.2.452.17.181.189
                      Dec 16, 2024 12:18:21.494702101 CET4434973052.17.181.189192.168.2.4
                      Dec 16, 2024 12:18:21.495143890 CET4434973052.17.181.189192.168.2.4
                      Dec 16, 2024 12:18:21.538237095 CET49730443192.168.2.452.17.181.189
                      Dec 16, 2024 12:18:21.689815044 CET49730443192.168.2.452.17.181.189
                      Dec 16, 2024 12:18:21.731329918 CET4434973052.17.181.189192.168.2.4
                      Dec 16, 2024 12:18:22.083914995 CET4434973052.17.181.189192.168.2.4
                      Dec 16, 2024 12:18:22.084013939 CET4434973052.17.181.189192.168.2.4
                      Dec 16, 2024 12:18:22.084108114 CET49730443192.168.2.452.17.181.189
                      Dec 16, 2024 12:18:22.107765913 CET49730443192.168.2.452.17.181.189
                      Dec 16, 2024 12:18:22.107767105 CET49730443192.168.2.452.17.181.189
                      Dec 16, 2024 12:18:22.107840061 CET4434973052.17.181.189192.168.2.4
                      Dec 16, 2024 12:18:22.107872009 CET4434973052.17.181.189192.168.2.4
                      Dec 16, 2024 12:18:22.281847000 CET49731443192.168.2.434.117.59.81
                      Dec 16, 2024 12:18:22.281892061 CET4434973134.117.59.81192.168.2.4
                      Dec 16, 2024 12:18:22.282263041 CET49731443192.168.2.434.117.59.81
                      Dec 16, 2024 12:18:22.282763004 CET49731443192.168.2.434.117.59.81
                      Dec 16, 2024 12:18:22.282787085 CET4434973134.117.59.81192.168.2.4
                      Dec 16, 2024 12:18:23.502917051 CET4434973134.117.59.81192.168.2.4
                      Dec 16, 2024 12:18:23.502993107 CET49731443192.168.2.434.117.59.81
                      Dec 16, 2024 12:18:23.506222010 CET49731443192.168.2.434.117.59.81
                      Dec 16, 2024 12:18:23.506242037 CET4434973134.117.59.81192.168.2.4
                      Dec 16, 2024 12:18:23.506603003 CET4434973134.117.59.81192.168.2.4
                      Dec 16, 2024 12:18:23.507936001 CET49731443192.168.2.434.117.59.81
                      Dec 16, 2024 12:18:23.551425934 CET4434973134.117.59.81192.168.2.4
                      Dec 16, 2024 12:18:23.957082033 CET4434973134.117.59.81192.168.2.4
                      Dec 16, 2024 12:18:23.957166910 CET4434973134.117.59.81192.168.2.4
                      Dec 16, 2024 12:18:23.957470894 CET49731443192.168.2.434.117.59.81
                      Dec 16, 2024 12:18:23.957557917 CET49731443192.168.2.434.117.59.81
                      Dec 16, 2024 12:18:23.957590103 CET4434973134.117.59.81192.168.2.4
                      Dec 16, 2024 12:18:23.957628965 CET49731443192.168.2.434.117.59.81
                      Dec 16, 2024 12:18:23.957638979 CET4434973134.117.59.81192.168.2.4
                      Dec 16, 2024 12:18:29.744147062 CET497378080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:29.864365101 CET80804973731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:29.864577055 CET497378080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:29.864702940 CET497378080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:29.864702940 CET497378080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:29.985088110 CET80804973731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:29.985131025 CET80804973731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:31.126600027 CET80804973731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:31.179056883 CET497378080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:31.244285107 CET497378080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:31.244872093 CET497398080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:31.365209103 CET80804973731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:31.365262985 CET80804973931.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:31.365452051 CET497378080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:31.365540028 CET497398080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:31.365756989 CET497398080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:31.365756989 CET497398080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:31.485583067 CET80804973931.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:31.485687971 CET80804973931.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:32.644475937 CET80804973931.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:32.694776058 CET497398080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:32.760598898 CET497398080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:32.761394024 CET497408080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:32.881159067 CET80804973931.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:32.881398916 CET497398080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:32.881639004 CET80804974031.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:32.881858110 CET497408080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:32.882257938 CET497408080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:32.882257938 CET497408080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:33.002357006 CET80804974031.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:33.002397060 CET80804974031.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:34.149986982 CET80804974031.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:34.194711924 CET497408080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:34.259881020 CET497408080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:34.260597944 CET497418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:34.380970955 CET80804974131.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:34.381016970 CET80804974031.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:34.381073952 CET497418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:34.381095886 CET497408080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:34.383893967 CET497418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:34.383893967 CET497418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:34.504313946 CET80804974131.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:34.504359007 CET80804974131.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:35.632550955 CET80804974131.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:35.679152966 CET497418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:35.744199038 CET497418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:35.745141029 CET497428080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:35.864758015 CET80804974131.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:35.864864111 CET497418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:35.865055084 CET80804974231.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:35.865184069 CET497428080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:35.865670919 CET497428080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:35.865670919 CET497428080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:35.985827923 CET80804974231.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:35.985871077 CET80804974231.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:37.127721071 CET80804974231.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:37.179059982 CET497428080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:37.244469881 CET497428080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:37.245306015 CET497438080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:37.365262985 CET80804974231.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:37.365292072 CET80804974331.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:37.365473986 CET497428080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:37.365521908 CET497438080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:37.365828037 CET497438080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:37.365828037 CET497438080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:37.485686064 CET80804974331.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:37.485729933 CET80804974331.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:38.626528025 CET80804974331.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:38.678926945 CET497438080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:38.743866920 CET497438080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:38.744601011 CET497448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:38.864729881 CET80804974431.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:38.864785910 CET80804974331.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:38.865156889 CET497438080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:38.865314007 CET497448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:38.865314007 CET497448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:38.871268988 CET497448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:38.985388994 CET80804974431.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:38.991281033 CET80804974431.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:40.115755081 CET80804974431.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:40.163383007 CET497448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:40.228713989 CET497448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:40.229490995 CET497458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:40.349167109 CET80804974431.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:40.349390984 CET80804974531.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:40.349441051 CET497448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:40.349679947 CET497458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:40.349771023 CET497458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:40.349787951 CET497458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:40.469837904 CET80804974531.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:40.469880104 CET80804974531.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:41.614937067 CET80804974531.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:41.663381100 CET497458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:41.728754044 CET497458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:41.729594946 CET497468080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:41.849312067 CET80804974531.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:41.849526882 CET497458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:41.849899054 CET80804974631.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:41.849978924 CET497468080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:41.850178957 CET497468080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:41.850192070 CET497468080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:41.970221996 CET80804974631.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:41.970279932 CET80804974631.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:43.126413107 CET80804974631.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:43.178946018 CET497468080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:43.244606018 CET497468080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:43.245304108 CET497478080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:43.365080118 CET80804974631.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:43.365144968 CET80804974731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:43.365430117 CET497478080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:43.365443945 CET497468080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:43.365725994 CET497478080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:43.365751982 CET497478080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:43.485775948 CET80804974731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:43.485820055 CET80804974731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:44.664764881 CET80804974731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:44.710294008 CET497478080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:44.776299953 CET497478080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:44.777086973 CET497488080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:44.897037983 CET80804974831.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:44.897084951 CET80804974731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:44.897559881 CET497488080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:44.897679090 CET497478080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:44.897996902 CET497488080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:44.897996902 CET497488080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:45.017822981 CET80804974831.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:45.017854929 CET80804974831.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:46.155132055 CET80804974831.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:46.210205078 CET497488080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:46.260133982 CET497488080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:46.260957956 CET497498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:46.381330967 CET80804974831.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:46.381421089 CET80804974931.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:46.381692886 CET497488080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:46.381709099 CET497498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:46.381827116 CET497498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:46.381858110 CET497498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:46.502140999 CET80804974931.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:46.502185106 CET80804974931.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:47.679086924 CET80804974931.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:47.726090908 CET497498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:47.791404009 CET497498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:47.792278051 CET497508080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:47.912512064 CET80804974931.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:47.912568092 CET80804975031.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:47.912759066 CET497498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:47.912763119 CET497508080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:47.912899017 CET497508080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:47.912899017 CET497508080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:48.033442974 CET80804975031.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:48.033488035 CET80804975031.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:49.163081884 CET80804975031.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:49.210309029 CET497508080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:49.282023907 CET497508080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:49.283112049 CET497518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:49.403075933 CET80804975031.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:49.403106928 CET80804975131.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:49.403434038 CET497518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:49.403475046 CET497508080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:49.403569937 CET497518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:49.403615952 CET497518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:49.524369001 CET80804975131.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:49.524411917 CET80804975131.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:50.684722900 CET80804975131.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:50.725975990 CET497518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:50.791534901 CET497518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:50.792380095 CET497528080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:50.912817955 CET80804975131.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:50.912861109 CET80804975231.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:50.912925959 CET497518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:50.912966967 CET497528080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:50.913223982 CET497528080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:50.913258076 CET497528080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:51.033076048 CET80804975231.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:51.033132076 CET80804975231.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:52.270313978 CET80804975231.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:52.319813013 CET497528080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:52.384747028 CET497528080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:52.385404110 CET497538080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:52.505496025 CET80804975231.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:52.505619049 CET497528080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:52.505687952 CET80804975331.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:52.505779982 CET497538080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:52.506052971 CET497538080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:52.506097078 CET497538080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:52.626302958 CET80804975331.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:52.626348019 CET80804975331.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:53.830374002 CET80804975331.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:53.882055998 CET497538080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:53.946822882 CET497538080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:53.947499037 CET497548080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:54.067523003 CET80804975431.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:54.067581892 CET80804975331.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:54.067645073 CET497548080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:54.067663908 CET497538080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:54.067876101 CET497548080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:54.067914009 CET497548080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:54.188047886 CET80804975431.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:54.188069105 CET80804975431.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:55.350877047 CET80804975431.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:55.397758007 CET497548080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:55.491844893 CET497548080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:55.492425919 CET497558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:55.612330914 CET80804975431.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:55.612358093 CET80804975531.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:55.612443924 CET497558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:55.612535954 CET497548080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:55.612649918 CET497558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:55.612649918 CET497558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:55.732547045 CET80804975531.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:55.732592106 CET80804975531.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:56.860637903 CET80804975531.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:56.913307905 CET497558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:56.978236914 CET497558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:56.978949070 CET497568080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:57.098877907 CET80804975531.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:57.098927975 CET80804975631.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:57.098978043 CET497558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:57.099035978 CET497568080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:57.099179983 CET497568080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:57.099179983 CET497568080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:57.219108105 CET80804975631.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:57.219129086 CET80804975631.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:58.347475052 CET80804975631.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:58.397833109 CET497568080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:58.463289976 CET497568080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:58.464061022 CET497578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:58.584044933 CET80804975731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:58.584270954 CET497578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:58.584530115 CET497578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:58.584564924 CET497578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:58.584990025 CET80804975631.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:58.585071087 CET497568080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:58.704502106 CET80804975731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:58.704524040 CET80804975731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:59.869250059 CET80804975731.13.224.69192.168.2.4
                      Dec 16, 2024 12:18:59.913489103 CET497578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:59.980101109 CET497578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:18:59.981064081 CET497588080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:00.100723982 CET80804975731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:00.100936890 CET80804975831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:00.101007938 CET497578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:00.101080894 CET497588080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:00.101306915 CET497588080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:00.101344109 CET497588080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:00.221246958 CET80804975831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:00.221271992 CET80804975831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:01.375282049 CET80804975831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:01.429059982 CET497588080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:01.493789911 CET497588080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:01.494616032 CET497608080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:01.614728928 CET80804975831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:01.614831924 CET80804976031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:01.615031958 CET497608080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:01.615096092 CET497588080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:01.615132093 CET497608080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:01.615133047 CET497608080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:01.735330105 CET80804976031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:01.735452890 CET80804976031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:03.469422102 CET80804976031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:03.522702932 CET497608080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:03.598319054 CET497608080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:03.602103949 CET497618080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:03.718687057 CET80804976031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:03.718772888 CET497608080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:03.722047091 CET80804976131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:03.722151041 CET497618080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:03.725904942 CET497618080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:03.725944042 CET497618080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:03.847950935 CET80804976131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:03.847994089 CET80804976131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:06.495816946 CET80804976131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:06.538502932 CET497618080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:06.603055954 CET497618080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:06.603717089 CET497738080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:06.724657059 CET80804977331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:06.724737883 CET497738080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:06.724852085 CET80804976131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:06.724906921 CET497618080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:06.724934101 CET497738080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:06.724983931 CET497738080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:06.844758987 CET80804977331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:06.844795942 CET80804977331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:07.976933956 CET80804977331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:08.022905111 CET497738080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:08.087862968 CET497738080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:08.088362932 CET497748080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:08.208631039 CET80804977431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:08.208725929 CET80804977331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:08.208817959 CET497748080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:08.208868980 CET497738080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:08.209032059 CET497748080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:08.209096909 CET497748080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:08.329257965 CET80804977431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:08.329312086 CET80804977431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:09.454586983 CET80804977431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:09.507119894 CET497748080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:09.572236061 CET497748080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:09.572884083 CET497808080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:09.692992926 CET80804977431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:09.693051100 CET80804978031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:09.693145037 CET497808080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:09.693180084 CET497748080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:09.693304062 CET497808080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:09.693365097 CET497808080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:09.813496113 CET80804978031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:09.813540936 CET80804978031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:10.974291086 CET80804978031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:11.022739887 CET497808080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:11.087672949 CET497808080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:11.088393927 CET497868080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:11.212604046 CET80804978631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:11.212703943 CET497868080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:11.212800026 CET80804978031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:11.212865114 CET497808080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:11.212908983 CET497868080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:11.212937117 CET497868080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:11.332655907 CET80804978631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:11.332715034 CET80804978631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:12.523499012 CET80804978631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:12.569698095 CET497868080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:12.636291027 CET497868080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:12.637212038 CET497878080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:12.757343054 CET80804978631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:12.757499933 CET80804978731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:12.757498026 CET497868080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:12.757725954 CET497878080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:12.757860899 CET497878080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:12.757898092 CET497878080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:12.877873898 CET80804978731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:12.877919912 CET80804978731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:14.004390001 CET80804978731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:14.054166079 CET497878080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:14.119349957 CET497878080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:14.120141983 CET497938080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:14.241156101 CET80804978731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:14.241272926 CET497878080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:14.241437912 CET80804979331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:14.241528988 CET497938080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:14.243379116 CET497938080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:14.243415117 CET497938080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:14.363586903 CET80804979331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:14.363631964 CET80804979331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:15.572176933 CET80804979331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:15.616574049 CET497938080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:15.682405949 CET497938080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:15.683162928 CET497998080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:15.803153038 CET80804979331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:15.803181887 CET80804979931.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:15.803425074 CET497998080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:15.803481102 CET497938080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:15.803679943 CET497998080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:15.803716898 CET497998080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:15.924010992 CET80804979931.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:15.924063921 CET80804979931.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:17.071687937 CET80804979931.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:17.116619110 CET497998080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:17.182447910 CET497998080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:17.183437109 CET498048080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:17.303329945 CET80804979931.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:17.303417921 CET497998080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:17.303546906 CET80804980431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:17.303630114 CET498048080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:17.303875923 CET498048080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:17.303929090 CET498048080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:17.423537970 CET80804980431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:17.423553944 CET80804980431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:18.557284117 CET80804980431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:18.600878000 CET498048080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:18.666831017 CET498048080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:18.667531967 CET498068080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:18.787400007 CET80804980631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:18.787507057 CET498068080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:18.787631035 CET80804980431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:18.787683010 CET498048080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:18.787877083 CET498068080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:18.787914038 CET498068080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:18.907649040 CET80804980631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:18.907690048 CET80804980631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:20.463035107 CET80804980631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:20.463202000 CET80804980631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:20.463270903 CET498068080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:20.572480917 CET498068080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:20.573276997 CET498128080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:20.692775011 CET80804980631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:20.693063021 CET498068080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:20.693233013 CET80804981231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:20.693317890 CET498128080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:20.693550110 CET498128080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:20.693583965 CET498128080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:20.814364910 CET80804981231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:20.814421892 CET80804981231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:22.024398088 CET80804981231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:22.069827080 CET498128080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:22.135358095 CET498128080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:22.136256933 CET498188080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:22.256331921 CET80804981231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:22.256376982 CET80804981831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:22.256406069 CET498128080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:22.256486893 CET498188080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:22.256730080 CET498188080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:22.256769896 CET498188080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:22.376802921 CET80804981831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:22.376838923 CET80804981831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:23.528111935 CET80804981831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:23.569628000 CET498188080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:23.637379885 CET498188080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:23.638010025 CET498218080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:23.757417917 CET80804981831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:23.757508039 CET498188080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:23.757729053 CET80804982131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:23.757813931 CET498218080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:23.757987022 CET498218080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:23.758012056 CET498218080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:23.877897024 CET80804982131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:23.877928019 CET80804982131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:25.000852108 CET80804982131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:25.054126024 CET498218080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:25.119617939 CET498218080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:25.120265961 CET498258080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:25.239779949 CET80804982131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:25.239896059 CET498218080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:25.240003109 CET80804982531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:25.240086079 CET498258080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:25.240271091 CET498258080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:25.240309954 CET498258080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:25.360053062 CET80804982531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:25.360270023 CET80804982531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:26.498600960 CET80804982531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:26.554085970 CET498258080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:26.603641033 CET498258080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:26.604283094 CET498318080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:26.724252939 CET80804982531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:26.724345922 CET80804983131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:26.724462986 CET498318080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:26.724497080 CET498258080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:26.724651098 CET498318080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:26.724669933 CET498318080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:26.844549894 CET80804983131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:26.844594002 CET80804983131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:27.987004042 CET80804983131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:28.038409948 CET498318080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:28.103750944 CET498318080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:28.104671955 CET498328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:28.224117041 CET80804983131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:28.224229097 CET498318080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:28.224417925 CET80804983231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:28.224541903 CET498328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:28.224751949 CET498328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:28.224788904 CET498328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:28.344574928 CET80804983231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:28.344605923 CET80804983231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:29.470256090 CET80804983231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:29.522882938 CET498328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:29.592024088 CET498328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:29.592931986 CET498388080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:29.712397099 CET80804983231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:29.712503910 CET498328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:29.712902069 CET80804983831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:29.713006020 CET498388080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:29.713224888 CET498388080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:29.713264942 CET498388080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:29.833039999 CET80804983831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:29.833118916 CET80804983831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:30.980479956 CET80804983831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:31.022849083 CET498388080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:31.087841988 CET498388080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:31.089824915 CET498448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:31.208482981 CET80804983831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:31.209408045 CET498388080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:31.209749937 CET80804984431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:31.209934950 CET498448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:31.209961891 CET498448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:31.209975958 CET498448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:31.330081940 CET80804984431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:31.330147028 CET80804984431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:32.459955931 CET80804984431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:32.507150888 CET498448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:32.572594881 CET498448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:32.573489904 CET498458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:32.693166018 CET80804984431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:32.693243027 CET498448080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:32.693540096 CET80804984531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:32.693633080 CET498458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:32.695274115 CET498458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:32.695274115 CET498458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:32.815803051 CET80804984531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:32.815841913 CET80804984531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:33.964093924 CET80804984531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:34.007153034 CET498458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:34.072426081 CET498458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:34.072961092 CET498518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:34.193351030 CET80804984531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:34.193423986 CET80804985131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:34.193588972 CET498458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:34.193780899 CET498518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:34.193780899 CET498518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:34.197758913 CET498518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:34.313584089 CET80804985131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:34.317574978 CET80804985131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:35.497426033 CET80804985131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:35.538636923 CET498518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:35.603321075 CET498518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:35.603868961 CET498578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:35.723701954 CET80804985131.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:35.723745108 CET80804985731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:35.723823071 CET498518080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:35.723860025 CET498578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:35.724056959 CET498578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:35.724093914 CET498578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:35.843847990 CET80804985731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:35.843904972 CET80804985731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:37.048379898 CET80804985731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:37.100929022 CET498578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:37.172569990 CET498578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:37.173562050 CET498628080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:37.292650938 CET80804985731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:37.292730093 CET498578080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:37.293744087 CET80804986231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:37.294127941 CET498628080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:37.294127941 CET498628080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:37.294127941 CET498628080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:37.414077044 CET80804986231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:37.414108992 CET80804986231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:38.602039099 CET80804986231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:38.647883892 CET498628080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:38.713701010 CET498628080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:38.714693069 CET498648080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:38.834027052 CET80804986231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:38.834300041 CET498628080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:38.834485054 CET80804986431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:38.834583044 CET498648080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:38.834815979 CET498648080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:38.834847927 CET498648080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:38.955900908 CET80804986431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:38.955970049 CET80804986431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:40.110639095 CET80804986431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:40.163567066 CET498648080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:40.229621887 CET498648080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:40.230528116 CET498708080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:40.350559950 CET80804986431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:40.350675106 CET498648080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:40.351016045 CET80804987031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:40.351133108 CET498708080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:40.351411104 CET498708080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:40.351471901 CET498708080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:40.471458912 CET80804987031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:40.471508026 CET80804987031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:41.613267899 CET80804987031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:41.663506985 CET498708080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:41.792742968 CET498708080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:41.793734074 CET498768080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:41.913069010 CET80804987031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:41.913136959 CET498708080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:41.913552999 CET80804987631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:41.913674116 CET498768080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:41.919815063 CET498768080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:41.919855118 CET498768080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:42.039767981 CET80804987631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:42.039808035 CET80804987631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:43.175744057 CET80804987631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:43.225969076 CET498768080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:43.291335106 CET498768080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:43.310494900 CET498778080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:43.411717892 CET80804987631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:43.411787033 CET498768080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:43.430296898 CET80804987731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:43.430394888 CET498778080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:43.432024002 CET498778080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:43.432056904 CET498778080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:43.551830053 CET80804987731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:43.551878929 CET80804987731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:44.708137989 CET80804987731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:44.757158995 CET498778080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:44.822911978 CET498778080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:44.822963953 CET498778080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:44.942898035 CET80804987731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:44.942934036 CET80804987731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:45.367132902 CET80804987731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:45.413466930 CET498778080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:45.479046106 CET498778080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:45.479784012 CET498838080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:45.599253893 CET80804987731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:45.599783897 CET80804988331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:45.600034952 CET498778080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:45.600083113 CET498838080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:45.600503922 CET498838080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:45.600533009 CET498838080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:45.720380068 CET80804988331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:45.720434904 CET80804988331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:46.893455982 CET80804988331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:46.944690943 CET498838080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:47.011379957 CET498838080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:47.012279034 CET498888080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:47.131429911 CET80804988331.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:47.131587029 CET498838080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:47.132116079 CET80804988831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:47.132215023 CET498888080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:47.132656097 CET498888080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:47.132714987 CET498888080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:47.252593040 CET80804988831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:47.252613068 CET80804988831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:48.420160055 CET80804988831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:48.460426092 CET498888080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:48.525867939 CET498888080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:48.526706934 CET498948080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:48.648452044 CET80804989431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:48.648597956 CET498948080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:48.648991108 CET80804988831.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:48.649163961 CET498888080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:48.659271002 CET498948080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:48.659271002 CET498948080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:48.779392958 CET80804989431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:48.779413939 CET80804989431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:50.067240953 CET80804989431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:50.116556883 CET498948080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:50.192096949 CET498948080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:50.192887068 CET498978080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:50.312571049 CET80804989431.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:50.312633991 CET498948080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:50.312979937 CET80804989731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:50.313047886 CET498978080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:50.313195944 CET498978080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:50.313214064 CET498978080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:50.432872057 CET80804989731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:50.432887077 CET80804989731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:51.581099987 CET80804989731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:51.632349014 CET498978080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:51.700239897 CET498978080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:51.703659058 CET499028080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:51.820489883 CET80804989731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:51.820601940 CET498978080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:51.823487043 CET80804990231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:51.823596001 CET499028080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:51.823754072 CET499028080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:51.823771000 CET499028080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:51.943572998 CET80804990231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:51.943604946 CET80804990231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:53.123792887 CET80804990231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:53.179076910 CET499028080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:53.229223013 CET499028080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:53.230557919 CET499078080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:53.349558115 CET80804990231.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:53.349853039 CET499028080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:53.350491047 CET80804990731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:53.350720882 CET499078080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:53.351125002 CET499078080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:53.351140976 CET499078080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:53.470904112 CET80804990731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:53.470928907 CET80804990731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:54.639369011 CET80804990731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:54.694700956 CET499078080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:54.908380032 CET499078080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:54.909229994 CET499098080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:55.028671980 CET80804990731.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:55.028752089 CET499078080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:55.028994083 CET80804990931.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:55.029076099 CET499098080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:55.029300928 CET499098080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:55.029323101 CET499098080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:55.149347067 CET80804990931.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:55.149394989 CET80804990931.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:56.317684889 CET80804990931.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:56.366580963 CET499098080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:56.431449890 CET499098080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:56.432235956 CET499158080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:56.552223921 CET80804991531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:56.552258968 CET80804990931.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:56.552324057 CET499098080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:56.552414894 CET499158080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:56.552582979 CET499158080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:56.552632093 CET499158080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:56.672825098 CET80804991531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:56.672851086 CET80804991531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:57.823740005 CET80804991531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:57.866552114 CET499158080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:57.931792021 CET499158080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:57.932564020 CET499208080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:58.052236080 CET80804991531.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:58.052299023 CET499158080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:58.052450895 CET80804992031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:58.052531958 CET499208080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:58.052759886 CET499208080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:58.052788019 CET499208080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:58.172780037 CET80804992031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:58.172801018 CET80804992031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:59.307533979 CET80804992031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:59.351118088 CET499208080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:59.416918993 CET499208080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:59.417665958 CET499268080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:59.537141085 CET80804992031.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:59.537214041 CET499208080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:59.537405014 CET80804992631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:59.537502050 CET499268080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:59.537695885 CET499268080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:59.537730932 CET499268080192.168.2.431.13.224.69
                      Dec 16, 2024 12:19:59.657370090 CET80804992631.13.224.69192.168.2.4
                      Dec 16, 2024 12:19:59.657470942 CET80804992631.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:00.806158066 CET80804992631.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:00.851027012 CET499268080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:00.916399956 CET499268080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:00.917195082 CET499288080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:01.036854982 CET80804992631.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:01.037072897 CET80804992831.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:01.037079096 CET499268080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:01.037211895 CET499288080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:01.037542105 CET499288080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:01.037621975 CET499288080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:01.157485008 CET80804992831.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:01.157525063 CET80804992831.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:02.316968918 CET80804992831.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:02.366625071 CET499288080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:02.454902887 CET499288080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:02.455406904 CET499328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:02.575226068 CET80804992831.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:02.575251102 CET80804993231.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:02.575294018 CET499288080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:02.575366020 CET499328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:02.621758938 CET499328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:02.621805906 CET499328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:02.741646051 CET80804993231.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:02.741671085 CET80804993231.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:04.030149937 CET80804993231.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:04.069894075 CET499328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:04.134984016 CET499328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:04.135776043 CET499368080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:04.255956888 CET80804993231.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:04.256002903 CET80804993631.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:04.256278992 CET499368080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:04.256405115 CET499368080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:04.256405115 CET499368080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:04.256422997 CET499328080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:04.376408100 CET80804993631.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:04.376594067 CET80804993631.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:05.513976097 CET80804993631.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:05.569725990 CET499368080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:05.621978998 CET499368080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:05.622720957 CET499418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:05.742489100 CET80804994131.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:05.742523909 CET80804993631.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:05.742582083 CET499418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:05.742708921 CET499368080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:05.742789030 CET499418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:05.742789030 CET499418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:05.862818956 CET80804994131.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:05.862910032 CET80804994131.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:06.998188972 CET80804994131.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:07.038496971 CET499418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:07.104238033 CET499418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:07.105081081 CET499458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:07.224658966 CET80804994131.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:07.224852085 CET80804994531.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:07.224909067 CET499418080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:07.225100994 CET499458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:07.225100994 CET499458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:07.225137949 CET499458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:07.345304012 CET80804994531.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:07.345330000 CET80804994531.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:08.529226065 CET80804994531.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:08.569837093 CET499458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:08.637360096 CET499458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:08.638362885 CET499498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:08.757949114 CET80804994531.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:08.758038044 CET499458080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:08.758452892 CET80804994931.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:08.758568048 CET499498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:08.758769989 CET499498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:08.758804083 CET499498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:08.879029989 CET80804994931.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:08.879082918 CET80804994931.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:10.064316988 CET80804994931.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:10.116878986 CET499498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:10.181963921 CET499498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:10.182553053 CET499558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:10.302445889 CET80804994931.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:10.302464008 CET80804995531.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:10.302557945 CET499558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:10.302632093 CET499498080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:10.302959919 CET499558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:10.303052902 CET499558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:10.422738075 CET80804995531.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:10.422768116 CET80804995531.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:11.619467020 CET80804995531.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:11.663609982 CET499558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:11.728470087 CET499558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:11.729221106 CET499588080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:11.848856926 CET80804995531.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:11.849087000 CET499558080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:11.850011110 CET80804995831.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:11.850202084 CET499588080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:11.850428104 CET499588080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:11.850461960 CET499588080192.168.2.431.13.224.69
                      Dec 16, 2024 12:20:11.970453024 CET80804995831.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:11.970474005 CET80804995831.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:13.461311102 CET80804995831.13.224.69192.168.2.4
                      Dec 16, 2024 12:20:13.507235050 CET499588080192.168.2.431.13.224.69
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 16, 2024 12:18:19.943370104 CET6351253192.168.2.41.1.1.1
                      Dec 16, 2024 12:18:20.081660032 CET53635121.1.1.1192.168.2.4
                      Dec 16, 2024 12:18:22.142328024 CET6112553192.168.2.41.1.1.1
                      Dec 16, 2024 12:18:22.280951977 CET53611251.1.1.1192.168.2.4
                      Dec 16, 2024 12:18:29.230524063 CET6227453192.168.2.41.1.1.1
                      Dec 16, 2024 12:18:29.743118048 CET53622741.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Dec 16, 2024 12:18:19.943370104 CET192.168.2.41.1.1.10x9f1eStandard query (0)checkip.amazonaws.comA (IP address)IN (0x0001)false
                      Dec 16, 2024 12:18:22.142328024 CET192.168.2.41.1.1.10x4fb8Standard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                      Dec 16, 2024 12:18:29.230524063 CET192.168.2.41.1.1.10x78e6Standard query (0)xscapezo.capetownA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Dec 16, 2024 12:18:20.081660032 CET1.1.1.1192.168.2.40x9f1eNo error (0)checkip.amazonaws.comcheckip.check-ip.aws.a2z.comCNAME (Canonical name)IN (0x0001)false
                      Dec 16, 2024 12:18:20.081660032 CET1.1.1.1192.168.2.40x9f1eNo error (0)checkip.check-ip.aws.a2z.comcheckip.eu-west-1.prod.check-ip.aws.a2z.comCNAME (Canonical name)IN (0x0001)false
                      Dec 16, 2024 12:18:20.081660032 CET1.1.1.1192.168.2.40x9f1eNo error (0)checkip.eu-west-1.prod.check-ip.aws.a2z.com52.17.181.189A (IP address)IN (0x0001)false
                      Dec 16, 2024 12:18:20.081660032 CET1.1.1.1192.168.2.40x9f1eNo error (0)checkip.eu-west-1.prod.check-ip.aws.a2z.com54.195.26.29A (IP address)IN (0x0001)false
                      Dec 16, 2024 12:18:20.081660032 CET1.1.1.1192.168.2.40x9f1eNo error (0)checkip.eu-west-1.prod.check-ip.aws.a2z.com18.202.169.9A (IP address)IN (0x0001)false
                      Dec 16, 2024 12:18:22.280951977 CET1.1.1.1192.168.2.40x4fb8No error (0)ipinfo.io34.117.59.81A (IP address)IN (0x0001)false
                      Dec 16, 2024 12:18:29.743118048 CET1.1.1.1192.168.2.40x78e6No error (0)xscapezo.capetown31.13.224.69A (IP address)IN (0x0001)false
                      • checkip.amazonaws.com
                      • ipinfo.io
                      • xscapezo.capetown:8080
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.44973731.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:29.864702940 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:31.126600027 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:30 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.44973931.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:31.365756989 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:32.644475937 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:32 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.44974031.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:32.882257938 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:34.149986982 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:33 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      3192.168.2.44974131.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:34.383893967 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:35.632550955 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:35 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      4192.168.2.44974231.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:35.865670919 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:37.127721071 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:36 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      5192.168.2.44974331.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:37.365828037 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:38.626528025 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:38 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      6192.168.2.44974431.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:38.865314007 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:40.115755081 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:39 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      7192.168.2.44974531.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:40.349771023 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:41.614937067 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:41 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      8192.168.2.44974631.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:41.850178957 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:43.126413107 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:42 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      9192.168.2.44974731.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:43.365725994 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:44.664764881 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:44 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      10192.168.2.44974831.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:44.897996902 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:46.155132055 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:45 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      11192.168.2.44974931.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:46.381827116 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:47.679086924 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:47 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      12192.168.2.44975031.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:47.912899017 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:49.163081884 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:48 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      13192.168.2.44975131.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:49.403569937 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:50.684722900 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:50 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      14192.168.2.44975231.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:50.913223982 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:52.270313978 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:52 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      15192.168.2.44975331.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:52.506052971 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:53.830374002 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:53 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      16192.168.2.44975431.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:54.067876101 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:55.350877047 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:55 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      17192.168.2.44975531.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:55.612649918 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:56.860637903 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:56 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      18192.168.2.44975631.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:57.099179983 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:58.347475052 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:58 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      19192.168.2.44975731.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:18:58.584530115 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:18:59.869250059 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:18:59 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      20192.168.2.44975831.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:00.101306915 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:01.375282049 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:01 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      21192.168.2.44976031.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:01.615132093 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:03.469422102 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:03 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      22192.168.2.44976131.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:03.725904942 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:06.495816946 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:06 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      23192.168.2.44977331.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:06.724934101 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:07.976933956 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:07 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      24192.168.2.44977431.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:08.209032059 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:09.454586983 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:09 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      25192.168.2.44978031.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:09.693304062 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:10.974291086 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:10 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      26192.168.2.44978631.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:11.212908983 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:12.523499012 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:12 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      27192.168.2.44978731.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:12.757860899 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:14.004390001 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:13 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      28192.168.2.44979331.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:14.243379116 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:15.572176933 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:15 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      29192.168.2.44979931.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:15.803679943 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:17.071687937 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:16 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      30192.168.2.44980431.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:17.303875923 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:18.557284117 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:18 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      31192.168.2.44980631.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:18.787877083 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:20.463035107 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:19 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06
                      Dec 16, 2024 12:19:20.463202000 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:19 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      32192.168.2.44981231.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:20.693550110 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:22.024398088 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:21 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      33192.168.2.44981831.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:22.256730080 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:23.528111935 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:23 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      34192.168.2.44982131.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:23.757987022 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:25.000852108 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:24 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      35192.168.2.44982531.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:25.240271091 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:26.498600960 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:26 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      36192.168.2.44983131.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:26.724651098 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:27.987004042 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:27 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      37192.168.2.44983231.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:28.224751949 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:29.470256090 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:29 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      38192.168.2.44983831.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:29.713224888 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:30.980479956 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:30 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      39192.168.2.44984431.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:31.209961891 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:32.459955931 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:32 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      40192.168.2.44984531.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:32.695274115 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:33.964093924 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:33 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      41192.168.2.44985131.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:34.193780899 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:35.497426033 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:35 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      42192.168.2.44985731.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:35.724056959 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:37.048379898 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:36 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      43192.168.2.44986231.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:37.294127941 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:38.602039099 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:38 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      44192.168.2.44986431.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:38.834815979 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:40.110639095 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:39 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      45192.168.2.44987031.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:40.351411104 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:41.613267899 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:41 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      46192.168.2.44987631.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:41.919815063 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:43.175744057 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:42 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      47192.168.2.44987731.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:43.432024002 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:44.708137989 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:44 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06
                      Dec 16, 2024 12:19:44.822911978 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:45.367132902 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:45 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      48192.168.2.44988331.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:45.600503922 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:46.893455982 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:46 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      49192.168.2.44988831.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:47.132656097 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:48.420160055 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:48 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      50192.168.2.44989431.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:48.659271002 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:50.067240953 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:49 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      51192.168.2.44989731.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:50.313195944 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:51.581099987 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:51 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      52192.168.2.44990231.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:51.823754072 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:53.123792887 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:52 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      53192.168.2.44990731.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:53.351125002 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:54.639369011 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:54 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      54192.168.2.44990931.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:55.029300928 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:56.317684889 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:56 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      55192.168.2.44991531.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:56.552582979 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:57.823740005 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:57 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      56192.168.2.44992031.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:58.052759886 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:19:59.307533979 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:19:59 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      57192.168.2.44992631.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:19:59.537695885 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:20:00.806158066 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:20:00 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      58192.168.2.44992831.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:20:01.037542105 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:20:02.316968918 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:20:02 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      59192.168.2.44993231.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:20:02.621758938 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:20:04.030149937 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:20:03 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      60192.168.2.44993631.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:20:04.256405115 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:20:05.513976097 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:20:05 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      61192.168.2.44994131.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:20:05.742789030 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:20:06.998188972 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:20:06 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      62192.168.2.44994531.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:20:07.225100994 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:20:08.529226065 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:20:08 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      63192.168.2.44994931.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:20:08.758769989 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:20:10.064316988 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:20:09 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      64192.168.2.44995531.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:20:10.302959919 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:20:11.619467020 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:20:11 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      65192.168.2.44995831.13.224.6980806208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      Dec 16, 2024 12:20:11.850428104 CET225OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json; Charset=UTF-8
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Content-Length: 450
                      Host: xscapezo.capetown:8080
                      Dec 16, 2024 12:20:13.461311102 CET167INHTTP/1.1 200 OK
                      Date: Mon, 16 Dec 2024 11:20:13 GMT
                      Content-Length: 50
                      Content-Type: text/plain; charset=utf-8
                      Data Raw: 36 65 39 38 61 34 63 35 34 62 62 38 63 30 31 65 38 36 37 37 63 37 39 30 34 64 38 65 39 32 62 62 32 33 61 31 64 39 65 34 63 61 65 35 66 64 34 64 30 36
                      Data Ascii: 6e98a4c54bb8c01e8677c7904d8e92bb23a1d9e4cae5fd4d06


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.44973052.17.181.1894436208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      2024-12-16 11:18:21 UTC187OUTGET / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Host: checkip.amazonaws.com
                      2024-12-16 11:18:22 UTC237INHTTP/1.1 200
                      Date: Mon, 16 Dec 2024 11:18:21 GMT
                      Content-Type: text/plain;charset=UTF-8
                      Content-Length: 13
                      Connection: close
                      Server: nginx
                      Vary: Origin
                      Vary: Access-Control-Request-Method
                      Vary: Access-Control-Request-Headers
                      2024-12-16 11:18:22 UTC13INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39 0a
                      Data Ascii: 8.46.123.189


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.44973134.117.59.814436208C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      TimestampBytes transferredDirectionData
                      2024-12-16 11:18:23 UTC182OUTGET /country HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/json
                      Accept: */*
                      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                      Host: ipinfo.io
                      2024-12-16 11:18:23 UTC448INHTTP/1.1 200 OK
                      access-control-allow-origin: *
                      Content-Length: 3
                      content-type: text/html; charset=utf-8
                      date: Mon, 16 Dec 2024 11:18:23 GMT
                      referrer-policy: strict-origin-when-cross-origin
                      x-content-type-options: nosniff
                      x-frame-options: SAMEORIGIN
                      x-xss-protection: 1; mode=block
                      via: 1.1 google
                      strict-transport-security: max-age=2592000; includeSubDomains
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close
                      2024-12-16 11:18:23 UTC3INData Raw: 55 53 0a
                      Data Ascii: US


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:06:18:06
                      Start date:16/12/2024
                      Path:C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe"
                      Imagebase:0xee0000
                      File size:231'936 bytes
                      MD5 hash:5B74BA5D3F7A0AFF3DEA2D3AE9BB1A59
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:2
                      Start time:06:18:23
                      Start date:16/12/2024
                      Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                      Wow64 process (32bit):true
                      Commandline:wmic os get Name
                      Imagebase:0x930000
                      File size:427'008 bytes
                      MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:3
                      Start time:06:18:23
                      Start date:16/12/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:06:18:24
                      Start date:16/12/2024
                      Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                      Wow64 process (32bit):true
                      Commandline:wmic cpu get name
                      Imagebase:0x930000
                      File size:427'008 bytes
                      MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:5
                      Start time:06:18:24
                      Start date:16/12/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:8
                      Start time:06:18:26
                      Start date:16/12/2024
                      Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                      Wow64 process (32bit):true
                      Commandline:wmic path win32_VideoController get name
                      Imagebase:0x930000
                      File size:427'008 bytes
                      MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:9
                      Start time:06:18:26
                      Start date:16/12/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:7%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:46.7%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:97
                        execution_graph 20401 f016e8 20402 f016f0 20401->20402 20403 f030f4 17 API calls 20402->20403 20404 f01704 20403->20404 20405 f01b64 2 API calls 20404->20405 20407 f01710 20405->20407 20406 f01868 20407->20406 20408 f01c0d 2 API calls 20407->20408 20409 f016b2 20408->20409 20410 f034a7 16 API calls 20409->20410 20411 f016bf 20410->20411 20412 f01730 calloc 20411->20412 20413 f016c5 20411->20413 20416 f01750 20412->20416 20417 f0b655 abort 20412->20417 20414 f017d0 realloc 20413->20414 20415 f016cf 20413->20415 20414->20417 20420 f017fc memset 20414->20420 20418 f016de 20415->20418 20422 f01787 malloc 20415->20422 20423 f01838 malloc 20415->20423 20419 f03527 20 API calls 20416->20419 20421 f01766 20419->20421 20424 f03527 20 API calls 20420->20424 20421->20415 20421->20418 20422->20417 20427 f0179e 20422->20427 20423->20417 20426 f01850 20423->20426 20425 f01830 20424->20425 20425->20423 20426->20406 20426->20427 20428 f01880 memset 20427->20428 20429 f017b6 memcpy 20427->20429 20430 f017c2 20428->20430 20429->20430 21786 efa1cf 21787 ee3719 29 API calls 21786->21787 21788 efa1e4 21787->21788 21789 ee3f9a 38 API calls 21788->21789 21790 efa22b 21789->21790 21791 efa23f 21790->21791 21792 ee27f2 29 API calls 21790->21792 21793 ee2ffd 42 API calls 21791->21793 21794 efa19c 21791->21794 21792->21791 21793->21794 21797 ee27f2 29 API calls 21794->21797 21798 efa286 21794->21798 21795 efa2ae 21796 efa34f 21795->21796 21799 efa2d1 21795->21799 21804 ee27f2 29 API calls 21795->21804 21800 ee4509 45 API calls 21796->21800 21797->21798 21798->21795 21801 ee27f2 29 API calls 21798->21801 21802 ee44a5 29 API calls 21799->21802 21803 efa36c 21800->21803 21801->21795 21805 efa2e8 21802->21805 21804->21799 21806 efa2fe 21805->21806 21809 ee27f2 29 API calls 21805->21809 21807 efa312 21806->21807 21811 ee27f2 29 API calls 21806->21811 21808 ee44a5 29 API calls 21807->21808 21810 efa329 21808->21810 21809->21806 21812 ee44a5 29 API calls 21810->21812 21811->21807 21813 efa342 21812->21813 21814 ee6150 30 API calls 21813->21814 21814->21796 20009 ef47c7 20039 ee80e7 20009->20039 20012 ef47f0 SetHandleInformation 20013 ef483a SetHandleInformation 20012->20013 20014 ef4816 GetLastError 20012->20014 20016 ef4860 SetHandleInformation 20013->20016 20015 ef4820 20014->20015 20030 ef47a4 20014->20030 20047 ee4b85 20015->20047 20019 ef476e 20016->20019 20020 ef488a GetLastError 20016->20020 20017 ee2812 29 API calls 20022 ef4c6d 20017->20022 20054 ee5767 20019->20054 20024 ef48c3 20020->20024 20020->20030 20025 ef4cc3 20022->20025 20027 ee2812 29 API calls 20022->20027 20026 ee4b85 44 API calls 20024->20026 20026->20030 20029 ef4c8c 20027->20029 20029->20025 20031 ee2812 29 API calls 20029->20031 20030->20017 20034 ef4cab 20031->20034 20032 ee3877 42 API calls 20037 ef4915 20032->20037 20033 ee5767 42 API calls 20033->20037 20034->20025 20035 ee27f2 29 API calls 20034->20035 20035->20025 20036 ee37db 42 API calls 20036->20037 20037->20030 20037->20032 20037->20033 20037->20036 20038 ee27f2 29 API calls 20037->20038 20038->20037 20071 ee193d 20039->20071 20041 ee8103 CreatePipe 20042 ee8138 GetLastError 20041->20042 20043 ee8163 20041->20043 20044 f016a0 29 API calls 20042->20044 20043->20012 20043->20030 20045 ee814b 20044->20045 20045->20043 20046 ee4b85 44 API calls 20045->20046 20046->20043 20072 ee42c0 20047->20072 20050 f016a0 29 API calls 20051 ee4b9f 20050->20051 20052 ee3db2 42 API calls 20051->20052 20053 ee4bce 20052->20053 20053->20013 20053->20030 20055 ee5797 20054->20055 20056 f016a0 29 API calls 20055->20056 20057 ee57c9 20056->20057 20058 ee5935 20057->20058 20059 ee37db 42 API calls 20057->20059 20063 ee5800 20057->20063 20058->20037 20059->20063 20060 ee5820 20062 ee37db 42 API calls 20060->20062 20066 ee5835 20060->20066 20061 ee590f 20061->20058 20068 ee27f2 29 API calls 20061->20068 20062->20066 20063->20060 20064 ee3877 42 API calls 20063->20064 20069 ee37db 42 API calls 20063->20069 20064->20063 20065 ee37db 42 API calls 20067 ee58f5 20065->20067 20066->20061 20066->20065 20070 ee37db 42 API calls 20067->20070 20068->20058 20069->20063 20070->20061 20071->20041 20073 ee36c0 29 API calls 20072->20073 20074 ee42e0 20073->20074 20075 f016a0 29 API calls 20074->20075 20076 ee430c 20075->20076 20077 ee4312 FormatMessageW 20076->20077 20078 ee4387 20076->20078 20077->20078 20080 ee4358 20077->20080 20079 ee4425 20078->20079 20081 ee43f8 20078->20081 20083 ee43cf 20078->20083 20086 ee4212 29 API calls 20078->20086 20079->20050 20082 ee18f3 42 API calls 20080->20082 20081->20079 20085 ee414d 29 API calls 20081->20085 20084 ee4360 20082->20084 20087 ee37db 42 API calls 20083->20087 20084->20078 20090 ee414d 29 API calls 20084->20090 20085->20079 20088 ee43b0 20086->20088 20089 ee43db 20087->20089 20088->20079 20088->20083 20093 ee3877 42 API calls 20088->20093 20094 ee37db 42 API calls 20089->20094 20091 ee4374 20090->20091 20091->20078 20092 ee437d LocalFree 20091->20092 20092->20078 20093->20083 20094->20081 20316 ee25c2 20317 ee25e2 20316->20317 20319 ee25d7 20316->20319 20318 ee2373 13 API calls 20317->20318 20318->20319 20160 ee83a5 20161 ee833a 29 API calls 20160->20161 20162 ee83d4 20161->20162 20163 f016a0 29 API calls 20162->20163 20164 ee83ee 20163->20164 20165 ee6d2d 48 API calls 20164->20165 20229 ee8421 20164->20229 20166 ee840b 20165->20166 20168 ee8418 20166->20168 20169 ee8469 20166->20169 20167 ee6150 30 API calls 20175 ee8e22 20167->20175 20171 ee6c0e 29 API calls 20168->20171 20170 ee833a 29 API calls 20169->20170 20179 ee847e 20170->20179 20171->20229 20172 ee8957 20173 ee833a 29 API calls 20172->20173 20180 ee898e 20172->20180 20177 ee896f 20173->20177 20174 ee8e3c 20176 ee6150 30 API calls 20174->20176 20175->20172 20175->20174 20178 ee27f2 29 API calls 20175->20178 20186 ee8e43 20176->20186 20177->20180 20182 ee3719 29 API calls 20177->20182 20178->20174 20181 ee833a 29 API calls 20179->20181 20179->20229 20184 ee84ba 20181->20184 20185 ee8987 20182->20185 20183 ee8e6b 20187 ee6150 30 API calls 20183->20187 20190 ee7341 34 API calls 20184->20190 20184->20229 20188 ee2ffd 42 API calls 20185->20188 20186->20172 20186->20183 20189 ee27f2 29 API calls 20186->20189 20191 ee8e76 20187->20191 20188->20180 20189->20183 20192 ee84db 20190->20192 20191->20172 20195 ee6150 30 API calls 20191->20195 20193 ee84e8 20192->20193 20194 ee8525 20192->20194 20196 ee6150 30 API calls 20193->20196 20197 ee833a 29 API calls 20194->20197 20200 ee8e87 20195->20200 20196->20229 20198 ee8543 20197->20198 20201 ee7341 34 API calls 20198->20201 20198->20229 20199 ee8eb5 20202 ee6150 30 API calls 20199->20202 20200->20172 20200->20199 20203 ee27f2 29 API calls 20200->20203 20204 ee8564 20201->20204 20210 ee8ec0 20202->20210 20203->20199 20205 ee85a4 20204->20205 20206 ee8571 20204->20206 20209 ee73eb 31 API calls 20205->20209 20207 ee6150 30 API calls 20206->20207 20207->20229 20208 ee8eee 20212 ee8f13 20208->20212 20219 ee27f2 29 API calls 20208->20219 20211 ee85b4 20209->20211 20210->20172 20210->20208 20213 ee27f2 29 API calls 20210->20213 20214 ee85bf 20211->20214 20215 ee8625 20211->20215 20216 ee6150 30 API calls 20212->20216 20213->20208 20218 ee6150 30 API calls 20214->20218 20220 ef56cb 63 API calls 20215->20220 20217 ee8f1e 20216->20217 20217->20172 20221 ee6150 30 API calls 20217->20221 20218->20229 20219->20212 20222 ee8660 20220->20222 20223 ee8f32 20221->20223 20224 ee866b 20222->20224 20225 ee86c7 20222->20225 20223->20172 20227 ee6150 30 API calls 20223->20227 20226 ee6150 30 API calls 20224->20226 20228 ee833a 29 API calls 20225->20228 20226->20229 20231 ee8f46 20227->20231 20232 ee86dc 20228->20232 20229->20167 20230 ee8f74 20233 ee6150 30 API calls 20230->20233 20231->20172 20231->20230 20234 ee27f2 29 API calls 20231->20234 20232->20229 20235 ee833a 29 API calls 20232->20235 20238 ee8f7f 20233->20238 20234->20230 20236 ee8718 20235->20236 20236->20229 20240 ee7341 34 API calls 20236->20240 20237 ee8fad 20239 ee8fd2 20237->20239 20246 ee27f2 29 API calls 20237->20246 20238->20172 20238->20237 20241 ee27f2 29 API calls 20238->20241 20242 ee8ff7 20239->20242 20250 ee27f2 29 API calls 20239->20250 20243 ee8739 20240->20243 20241->20237 20247 ee6c0e 29 API calls 20242->20247 20244 ee8746 20243->20244 20245 ee8765 20243->20245 20248 ee6150 30 API calls 20244->20248 20249 ee833a 29 API calls 20245->20249 20246->20239 20247->20172 20248->20229 20251 ee8783 20249->20251 20250->20242 20251->20229 20252 ee7341 34 API calls 20251->20252 20253 ee87a4 20252->20253 20254 ee87ae 20253->20254 20255 ee87c3 20253->20255 20256 ee6150 30 API calls 20254->20256 20257 ef56cb 63 API calls 20255->20257 20256->20229 20258 ee87fb 20257->20258 20259 ee8829 20258->20259 20260 ee8806 20258->20260 20262 ee833a 29 API calls 20259->20262 20261 ee6150 30 API calls 20260->20261 20261->20229 20263 ee883e 20262->20263 20263->20229 20264 ef56cb 63 API calls 20263->20264 20265 ee8897 20264->20265 20266 ee889e 20265->20266 20267 ee88ac 20265->20267 20269 ee6150 30 API calls 20266->20269 20268 ee833a 29 API calls 20267->20268 20270 ee88c1 20268->20270 20269->20229 20270->20229 20271 ef56cb 63 API calls 20270->20271 20272 ee891c 20271->20272 20273 ee892d 20272->20273 20274 ee8923 20272->20274 20276 ee745e 54 API calls 20273->20276 20275 ee6150 30 API calls 20274->20275 20275->20229 20277 ee8938 20276->20277 20277->20229 20278 ee8947 20277->20278 20279 ee6150 30 API calls 20278->20279 20282 ee8952 20279->20282 20282->20172 20381 ef65bc 20385 ef5747 20381->20385 20383 ee6c0e 29 API calls 20383->20385 20384 ee2ffd 42 API calls 20384->20385 20385->20383 20385->20384 20386 ef5719 Sleep 20385->20386 20388 ef5756 IsDebuggerPresent 20385->20388 20389 ee3719 29 API calls 20385->20389 20390 ee6d2d 48 API calls 20385->20390 20391 ee73eb 31 API calls 20385->20391 20392 ee27f2 29 API calls 20385->20392 20393 ee6150 30 API calls 20385->20393 20394 ee833a 29 API calls 20385->20394 20395 ee7341 34 API calls 20385->20395 20396 ef56cb 63 API calls 20385->20396 20397 ee49a7 20385->20397 20387 f016a0 29 API calls 20386->20387 20387->20385 20388->20385 20389->20385 20390->20385 20391->20385 20392->20385 20393->20385 20394->20385 20395->20385 20396->20385 20398 ee49b5 20397->20398 20399 ee49c0 20397->20399 20398->20399 20400 ee27f2 29 API calls 20398->20400 20399->20385 20400->20399 22498 eef6b7 22499 ee833a 29 API calls 22498->22499 22500 eef6cc 22499->22500 22501 ee496d memcmp 22500->22501 22507 eef6d8 22500->22507 22502 eef7fd 22501->22502 22505 eef827 22502->22505 22506 eef801 22502->22506 22503 ef1151 22504 ef116d 22503->22504 22512 ee27f2 29 API calls 22503->22512 22818 eea72b 22505->22818 22509 ee833a 29 API calls 22506->22509 22507->22503 22510 ee27f2 29 API calls 22507->22510 22513 eef816 22509->22513 22510->22503 22512->22504 22515 ee496d memcmp 22513->22515 22557 eef822 22513->22557 22517 eefb95 22515->22517 22519 eefbbf 22517->22519 22520 eefb99 22517->22520 22518 ee40bc 42 API calls 22522 eefab3 22518->22522 22524 eea72b 42 API calls 22519->22524 22523 ee833a 29 API calls 22520->22523 22526 ee44a5 29 API calls 22522->22526 22527 eefbae 22523->22527 22529 eefbd1 22524->22529 22530 eefabf 22526->22530 22532 ee496d memcmp 22527->22532 22685 eefbba 22527->22685 22528 ee27f2 29 API calls 22528->22507 22531 ee833a 29 API calls 22529->22531 22806 eefe79 22529->22806 22534 eefadd 22530->22534 22542 ee27f2 29 API calls 22530->22542 22535 eefc08 22531->22535 22536 ef0809 22532->22536 22543 ee27f2 29 API calls 22534->22543 22552 eef944 22534->22552 22544 ee833a 29 API calls 22535->22544 22535->22806 22540 ef080d 22536->22540 22541 ef0835 22536->22541 22538 ee40bc 42 API calls 22545 ef05b9 22538->22545 22539 eefb15 22547 eefb31 22539->22547 22562 ee27f2 29 API calls 22539->22562 22546 ee496d memcmp 22540->22546 22548 eea72b 42 API calls 22541->22548 22542->22534 22543->22552 22550 eefc2e 22544->22550 22551 ee44a5 29 API calls 22545->22551 22553 ef0828 22546->22553 22556 eefb4d 22547->22556 22565 ee27f2 29 API calls 22547->22565 22555 ef0847 22548->22555 22549 ee379b 29 API calls 22569 eef8ad 22549->22569 22563 ee55bf 44 API calls 22550->22563 22550->22806 22558 ef05c5 22551->22558 22552->22539 22559 ee27f2 29 API calls 22552->22559 22560 ef0b21 22553->22560 22561 ef0830 22553->22561 22554 ee27f2 29 API calls 22554->22557 22564 ee5678 44 API calls 22555->22564 22619 ef09a3 22555->22619 22556->22557 22568 ee27f2 29 API calls 22556->22568 22557->22507 22557->22528 22566 ef05d8 22558->22566 22575 ee27f2 29 API calls 22558->22575 22559->22539 22567 ee496d memcmp 22560->22567 23075 eee078 22561->23075 22562->22547 22570 eefc54 22563->22570 22574 ef086a 22564->22574 22565->22556 22572 ef05f7 22566->22572 22585 ee27f2 29 API calls 22566->22585 22571 ef0b3c 22567->22571 22568->22557 22922 eeea18 22569->22922 22583 ee833a 29 API calls 22570->22583 22570->22806 22584 eeed20 53 API calls 22571->22584 22571->22685 22577 ef0613 22572->22577 22588 ee27f2 29 API calls 22572->22588 22579 eeaa69 42 API calls 22574->22579 22574->22619 22575->22566 22576 ee40bc 42 API calls 22586 ef0a82 22576->22586 22581 ef062f 22577->22581 22595 ee27f2 29 API calls 22577->22595 22591 ef0885 22579->22591 22580 ef0ea6 22599 ee6150 30 API calls 22580->22599 22589 ef064b 22581->22589 22600 ee27f2 29 API calls 22581->22600 22590 eefc80 22583->22590 22584->22685 22585->22572 22587 ee44a5 29 API calls 22586->22587 22593 ef0a91 22587->22593 22588->22577 22596 ef0667 22589->22596 22612 ee27f2 29 API calls 22589->22612 22601 eea508 45 API calls 22590->22601 22590->22806 22603 eea508 45 API calls 22591->22603 22591->22619 22597 ef0aaf 22593->22597 22614 ee27f2 29 API calls 22593->22614 22594 f016a0 29 API calls 22598 ef0b8e 22594->22598 22595->22581 22602 ef0683 22596->22602 22618 ee27f2 29 API calls 22596->22618 22623 ee27f2 29 API calls 22597->22623 22626 ef0a03 22597->22626 22608 ef0b99 22598->22608 23238 eebf56 22598->23238 22609 ef107b 22599->22609 22600->22589 22613 eefc9d 22601->22613 22606 ef069f 22602->22606 22630 ee27f2 29 API calls 22602->22630 22607 ef08a2 22603->22607 22604 eef929 22605 eef904 22620 ef06bb 22606->22620 22638 ee27f2 29 API calls 22606->22638 22607->22619 22631 ee379b 29 API calls 22607->22631 22653 ef0ba8 22608->22653 23227 eeae31 22608->23227 22627 ee6150 30 API calls 22609->22627 22736 ef1083 22609->22736 22612->22596 22629 ee833a 29 API calls 22613->22629 22613->22806 22614->22597 22617 ef0ae7 22628 ef0af8 22617->22628 22643 ee27f2 29 API calls 22617->22643 22618->22602 22619->22576 22632 ef06d7 22620->22632 22644 ee27f2 29 API calls 22620->22644 22623->22626 22624 ee2ffd 42 API calls 22624->22685 22626->22617 22642 ee27f2 29 API calls 22626->22642 22636 ef1094 22627->22636 22650 ee27f2 29 API calls 22628->22650 22628->22685 22637 eefcc0 22629->22637 22630->22606 22657 ef08b8 22631->22657 22639 ef06f3 22632->22639 22645 ee27f2 29 API calls 22632->22645 22635 ee6150 30 API calls 22635->22608 22647 ee6150 30 API calls 22636->22647 22636->22736 22649 eea508 45 API calls 22637->22649 22637->22806 22638->22620 22640 ef070f 22639->22640 22651 ee27f2 29 API calls 22639->22651 22646 ef072b 22640->22646 22659 ee27f2 29 API calls 22640->22659 22642->22617 22643->22628 22644->22632 22645->22639 22664 ee27f2 29 API calls 22646->22664 22666 eeffe0 22646->22666 22654 ef10a0 22647->22654 22648 ef0ba0 22648->22653 22655 f016a0 29 API calls 22648->22655 22656 eefcdd 22649->22656 22650->22685 22651->22640 22660 ee6150 30 API calls 22653->22660 22667 ee6150 30 API calls 22654->22667 22654->22736 22662 ef0c13 22655->22662 22671 ee833a 29 API calls 22656->22671 22656->22806 22672 eeea18 85 API calls 22657->22672 22659->22646 22665 ef0e78 22660->22665 22661 ef076c 22668 ef0788 22661->22668 22681 ee27f2 29 API calls 22661->22681 22669 ef0c2f 22662->22669 22670 ef0c1b CoInitialize 22662->22670 22664->22666 22679 ee6150 30 API calls 22665->22679 22708 ef0e92 22665->22708 22666->22661 22680 ee27f2 29 API calls 22666->22680 22673 ef10ac 22667->22673 22675 ef07ad 22668->22675 22690 ee27f2 29 API calls 22668->22690 22676 ee6150 30 API calls 22669->22676 22670->22669 22674 eefd00 22671->22674 22677 ef08f8 22672->22677 22687 ee6150 30 API calls 22673->22687 22673->22736 22689 eea508 45 API calls 22674->22689 22674->22806 22675->22685 22700 ee27f2 29 API calls 22675->22700 22684 ef0c36 22676->22684 22677->22619 22692 ef09ae 22677->22692 22693 ef090c 22677->22693 22678 eef924 22678->22518 22686 ef0e85 22679->22686 22680->22661 22681->22668 22682 ef0e9e 22688 ee6150 30 API calls 22682->22688 22683 ef0eab 23301 ef2579 22683->23301 22698 ee36c0 29 API calls 22684->22698 22735 ef0d61 22684->22735 22685->22554 22685->22557 22703 ee6150 30 API calls 22686->22703 22686->22708 22696 ef10b9 22687->22696 22688->22580 22697 eefd1d 22689->22697 22690->22675 22695 ee40bc 42 API calls 22692->22695 22694 ee345e 29 API calls 22693->22694 22705 ef0916 22694->22705 22702 ef09b5 22695->22702 22709 ee6150 30 API calls 22696->22709 22696->22736 22710 ee833a 29 API calls 22697->22710 22697->22806 22711 ef0c55 22698->22711 22700->22685 22701 ee80cb 30 API calls 22706 ef0e0e 22701->22706 22707 ee44a5 29 API calls 22702->22707 22703->22708 22704 ef0eca 22712 ee6150 30 API calls 22704->22712 22705->22619 22977 eeed20 22705->22977 22706->22653 23287 ef3f4c 22706->23287 22714 ef09c9 22707->22714 22708->22682 22708->22683 22715 ef10c6 22709->22715 22716 eefd40 22710->22716 22720 ef0c75 SafeArrayCreate 22711->22720 22711->22735 22712->22580 22713 ef0eec 23328 eedd07 22713->23328 22719 ef09e7 22714->22719 22729 ee27f2 29 API calls 22714->22729 22724 ee6150 30 API calls 22715->22724 22715->22736 22725 eea508 45 API calls 22716->22725 22716->22806 22719->22626 22732 ee27f2 29 API calls 22719->22732 22721 ef0ca6 22720->22721 22720->22735 22730 ee36c0 29 API calls 22721->22730 22760 ef0caa 22721->22760 22722 ef0f29 22727 ef0f4f 22722->22727 22728 ef0f34 22722->22728 22737 ef10d3 22724->22737 22726 eefd5d 22725->22726 22733 ee833a 29 API calls 22726->22733 22726->22806 22740 ee754b 30 API calls 22727->22740 22731 ee6150 30 API calls 22728->22731 22729->22719 22734 ef0cc0 22730->22734 22731->22580 22732->22626 22738 eefd80 22733->22738 22739 ee62db 42 API calls 22734->22739 22735->22653 22735->22701 22736->22624 22736->22685 22737->22736 22742 ee27f2 29 API calls 22737->22742 22746 eea508 45 API calls 22738->22746 22738->22806 22743 ef0cde 22739->22743 22744 ef0f71 22740->22744 22741 ef0d75 CoInitialize 22741->22760 22742->22736 22747 ef0d44 22743->22747 22751 ee61e3 29 API calls 22743->22751 22748 ef0f8d 22744->22748 22749 ef0f79 22744->22749 22745 ee6150 30 API calls 22745->22760 22750 eefd9d 22746->22750 22747->22735 22757 ee27f2 29 API calls 22747->22757 22747->22760 23364 ef274e 22748->23364 22752 ee6150 30 API calls 22749->22752 22756 eeaa69 42 API calls 22750->22756 22750->22806 22753 ef0d08 22751->22753 22752->22580 22753->22747 22762 ee3db2 42 API calls 22753->22762 22754 ef0d9c SafeArrayPutElement 22759 ee6150 30 API calls 22754->22759 22755 ee36c0 29 API calls 22755->22760 22761 eefdb7 22756->22761 22757->22760 22759->22760 22760->22735 22760->22741 22760->22745 22760->22754 22760->22755 22766 eea508 45 API calls 22761->22766 22761->22806 22762->22747 22769 eefdd3 22766->22769 22773 ee379b 29 API calls 22769->22773 22769->22806 22778 eefdec 22773->22778 22779 eeea18 85 API calls 22778->22779 22780 eefe42 22779->22780 22781 eefe7e 22780->22781 22782 eefe52 22780->22782 22780->22806 22784 ee40bc 42 API calls 22781->22784 22783 ee833a 29 API calls 22782->22783 22785 eefe67 22783->22785 22786 eefe85 22784->22786 22788 ee833a 29 API calls 22785->22788 22785->22806 22787 ee44a5 29 API calls 22786->22787 22789 eefe99 22787->22789 22791 ef0019 22788->22791 22790 eefeb7 22789->22790 22793 ee27f2 29 API calls 22789->22793 22792 eefed3 22790->22792 22796 ee27f2 29 API calls 22790->22796 22795 ee345e 29 API calls 22791->22795 22791->22806 22794 eefee4 22792->22794 22799 ee27f2 29 API calls 22792->22799 22793->22790 22797 eeff00 22794->22797 22802 ee27f2 29 API calls 22794->22802 22798 ef0034 22795->22798 22796->22792 22800 eeff1c 22797->22800 22804 ee27f2 29 API calls 22797->22804 22801 ee833a 29 API calls 22798->22801 22799->22794 22801->22806 22802->22797 22804->22800 22806->22538 22819 ee833a 29 API calls 22818->22819 22820 eea76c 22819->22820 22821 f016a0 29 API calls 22820->22821 22822 eea77c 22821->22822 22823 ef1f83 42 API calls 22822->22823 22851 eea9b4 22822->22851 22824 eea7aa 22823->22824 22826 ee3719 29 API calls 22824->22826 22824->22851 22825 ee44a5 29 API calls 22827 eeaa34 22825->22827 22829 eea7d9 22826->22829 22828 eeaa47 22827->22828 22832 ee27f2 29 API calls 22827->22832 22830 eeaa59 22828->22830 22833 ee27f2 29 API calls 22828->22833 22831 ee833a 29 API calls 22829->22831 22830->22678 22866 ee5678 GetTempPathW 22830->22866 22835 eea7f0 22831->22835 22832->22828 22833->22830 22834 eea9fd 22836 ee27f2 29 API calls 22834->22836 22834->22851 22835->22834 22837 eea8c1 22835->22837 22838 ee833a 29 API calls 22835->22838 22836->22851 22839 ee833a 29 API calls 22837->22839 22843 eea84c 22838->22843 22841 eea8d8 22839->22841 22840 eea9ec 22840->22834 22845 ee27f2 29 API calls 22840->22845 22841->22840 22842 eea8e4 22841->22842 22844 ee3719 29 API calls 22842->22844 22843->22837 22843->22840 22846 eea88b 22843->22846 22850 eea8f3 22844->22850 22845->22834 22847 ee833a 29 API calls 22846->22847 22849 eea8ae 22847->22849 22848 eea998 22848->22851 22855 ee27f2 29 API calls 22848->22855 22852 ee4919 29 API calls 22849->22852 22856 eea8bc 22849->22856 22850->22848 22853 ee27f2 29 API calls 22850->22853 22851->22825 22854 eea911 22852->22854 22853->22848 22857 eea9bf 22854->22857 22858 eea922 22854->22858 22855->22851 22856->22840 22859 ee27f2 29 API calls 22856->22859 22857->22856 22861 ee27f2 29 API calls 22857->22861 22860 ee379b 29 API calls 22858->22860 22859->22840 22863 eea92d 22860->22863 22861->22856 22862 eea96b 22862->22850 22865 ee27f2 29 API calls 22862->22865 22863->22862 22864 ee27f2 29 API calls 22863->22864 22864->22862 22865->22850 22869 ee56d1 22866->22869 22881 ee56a9 22866->22881 22867 ee414d 29 API calls 22870 ee56cd 22867->22870 23391 ee3652 22869->23391 23395 ee4177 22870->23395 22871 ee5739 22871->22678 22882 eeaa69 22871->22882 22874 f016a0 29 API calls 22875 ee56f9 22874->22875 22875->22871 22876 ee5700 GetTempPathW 22875->22876 22877 ee571c 22876->22877 22878 ee573b 22876->22878 22877->22871 22879 ee2812 29 API calls 22877->22879 22880 ee18f3 42 API calls 22878->22880 22879->22881 22880->22877 22881->22867 22881->22870 22881->22871 22885 eeaa82 22882->22885 22884 f016a0 29 API calls 22884->22885 22885->22884 22886 eeac40 22885->22886 22890 eeaafd 22885->22890 23402 eea618 22885->23402 22887 ee44ed 29 API calls 22886->22887 22888 eeac58 22887->22888 22889 ee44ed 29 API calls 22888->22889 22891 eeac68 22889->22891 22892 ee833a 29 API calls 22890->22892 22894 ee27f2 29 API calls 22891->22894 22908 eeac25 22891->22908 22893 eeab12 22892->22893 22895 ee833a 29 API calls 22893->22895 22897 eeac29 22893->22897 22894->22908 22896 eeab46 22895->22896 22899 ee3719 29 API calls 22896->22899 22911 eeabd3 22896->22911 22897->22886 22900 ee27f2 29 API calls 22897->22900 22898 eeabec 22901 eeabfd 22898->22901 22903 ee27f2 29 API calls 22898->22903 22910 eeab61 22899->22910 22900->22886 23405 ee44ed 22901->23405 22903->22901 22905 ee3684 29 API calls 22905->22910 22906 ee44ed 29 API calls 22906->22908 22907 ee37db 42 API calls 22907->22910 22908->22678 22913 eea508 22908->22913 22909 ee4212 29 API calls 22909->22910 22910->22905 22910->22907 22910->22909 22910->22911 22912 ee27f2 29 API calls 22910->22912 22911->22897 22911->22898 22912->22910 22914 ee379b 29 API calls 22913->22914 22915 eea534 22914->22915 23409 ee4ce0 22915->23409 22918 f016a0 29 API calls 22919 eea561 22918->22919 22920 eea57b 22919->22920 22921 ee4ce0 45 API calls 22919->22921 22920->22549 22920->22678 22921->22920 23512 ef2911 22922->23512 22925 f016a0 29 API calls 22926 eeea61 22925->22926 22929 ee36c0 29 API calls 22926->22929 22966 eeea6e 22926->22966 22927 eeea7a 22931 ee833a 29 API calls 22927->22931 22928 eeeb68 22930 eee078 81 API calls 22928->22930 22932 eeea8e 22929->22932 22933 eeeb7a 22930->22933 22934 eeeb22 22931->22934 22935 ee379b 29 API calls 22932->22935 22936 eeec25 22933->22936 22937 eeeb91 22933->22937 22956 eeec48 22933->22956 22939 eeeb2f 22934->22939 22940 eeeba0 22934->22940 22951 eeeaa5 22935->22951 23533 ef220a 22936->23533 22941 eeeb99 22937->22941 22957 ee27f2 29 API calls 22937->22957 22938 ee833a 29 API calls 22943 eeec86 22938->22943 22944 ee3f9a 38 API calls 22939->22944 22942 ee833a 29 API calls 22940->22942 22952 eeebd0 22940->22952 22955 eeec1b 22940->22955 23525 ee1b6a 22941->23525 22947 eeebc5 22942->22947 22949 eeecea 22943->22949 22965 eeeb4e 22944->22965 22947->22952 22954 ee1b6a fclose 22949->22954 22961 ee3db2 42 API calls 22951->22961 22952->22604 22952->22605 22952->22678 22954->22940 22958 ee2ffd 42 API calls 22955->22958 22956->22938 22956->22949 22957->22941 22958->22952 22961->22966 22965->22955 22966->22927 22966->22928 22978 eeed47 22977->22978 22979 ee3652 29 API calls 22978->22979 22980 eeed51 22979->22980 22981 f016a0 29 API calls 22980->22981 22993 eeed63 22981->22993 22982 eeedc3 22983 ee2812 29 API calls 22982->22983 22985 eeee14 22983->22985 22984 eeed7b GetModuleFileNameW 22986 eeed9f 22984->22986 22984->22993 22989 ee5678 44 API calls 22985->22989 23073 eef1f5 22985->23073 22986->22982 22988 ee414d 29 API calls 22986->22988 22987 eeed9d 22991 ef22ac 42 API calls 22987->22991 22988->22982 22992 eeee3a 22989->22992 22990 ee3652 29 API calls 22990->22993 22991->22986 22997 eeaa69 42 API calls 22992->22997 22992->23073 22993->22982 22993->22984 22993->22987 22993->22990 22995 eeedd1 22993->22995 22994 ee40bc 42 API calls 22996 eef4aa 22994->22996 22998 ee2812 29 API calls 22995->22998 22999 ee44a5 29 API calls 22996->22999 23000 eeee60 22997->23000 22998->22982 23001 eef4b6 22999->23001 23002 eea508 45 API calls 23000->23002 23000->23073 23003 eef4c9 23001->23003 23005 ee27f2 29 API calls 23001->23005 23004 eeee7d 23002->23004 23009 ee27f2 29 API calls 23003->23009 23010 eef4e5 23003->23010 23008 ee833a 29 API calls 23004->23008 23004->23073 23005->23003 23006 eef51d 23013 eef539 23006->23013 23017 ee27f2 29 API calls 23006->23017 23007 eef501 23007->23006 23014 ee27f2 29 API calls 23007->23014 23012 eeeea0 23008->23012 23009->23010 23010->23007 23011 ee27f2 29 API calls 23010->23011 23011->23007 23016 ee379b 29 API calls 23012->23016 23012->23073 23015 eef555 23013->23015 23020 ee27f2 29 API calls 23013->23020 23014->23006 23018 eef571 23015->23018 23021 ee27f2 29 API calls 23015->23021 23026 eeeeb6 23016->23026 23017->23013 23019 eef58d 23018->23019 23023 ee27f2 29 API calls 23018->23023 23022 eef5a9 23019->23022 23025 ee27f2 29 API calls 23019->23025 23020->23015 23021->23018 23024 eef5c5 23022->23024 23029 ee27f2 29 API calls 23022->23029 23023->23019 23027 eef5e1 23024->23027 23030 ee27f2 29 API calls 23024->23030 23025->23022 23032 ee833a 29 API calls 23026->23032 23028 eef5fd 23027->23028 23033 ee27f2 29 API calls 23027->23033 23029->23024 23030->23027 23035 eeef05 23032->23035 23033->23028 23038 ee833a 29 API calls 23035->23038 23035->23073 23041 eeef1b 23038->23041 23042 ee833a 29 API calls 23041->23042 23041->23073 23043 eeef42 23042->23043 23044 ee833a 29 API calls 23043->23044 23043->23073 23073->22994 23076 ee833a 29 API calls 23075->23076 23077 eee0a7 23076->23077 23078 f016a0 29 API calls 23077->23078 23079 eee0c1 23078->23079 23080 eee0f4 23079->23080 23081 ee6d2d 48 API calls 23079->23081 23083 ee6150 30 API calls 23080->23083 23082 eee0de 23081->23082 23084 eee0eb 23082->23084 23085 eee0f9 23082->23085 23090 eee966 23083->23090 23086 ee6c0e 29 API calls 23084->23086 23087 ee833a 29 API calls 23085->23087 23086->23080 23093 eee10e 23087->23093 23088 eee97c 23092 ee6150 30 API calls 23088->23092 23089 ee833a 29 API calls 23091 eee9de 23089->23091 23090->23088 23094 ee27f2 29 API calls 23090->23094 23109 eee7f7 23090->23109 23095 eee9f9 23091->23095 23097 ee3719 29 API calls 23091->23097 23102 eee984 23092->23102 23096 ee833a 29 API calls 23093->23096 23104 eee177 23093->23104 23094->23088 23095->22580 23095->22594 23099 eee144 23096->23099 23101 eee9f2 23097->23101 23098 eee9ae 23103 ee6c0e 29 API calls 23098->23103 23099->23104 23108 ee7341 34 API calls 23099->23108 23100 eee5d6 23105 ee6150 30 API calls 23100->23105 23106 ee2ffd 42 API calls 23101->23106 23102->23098 23107 ee27f2 29 API calls 23102->23107 23102->23109 23103->23109 23104->23100 23110 ee27f2 29 API calls 23104->23110 23111 eee5e1 23105->23111 23106->23095 23107->23098 23112 eee15f 23108->23112 23109->23089 23109->23095 23109->23101 23110->23100 23116 ee6150 30 API calls 23111->23116 23196 eee5e6 23111->23196 23113 eee16c 23112->23113 23114 eee190 23112->23114 23117 ee6150 30 API calls 23113->23117 23118 ee7341 34 API calls 23114->23118 23115 ee833a 29 API calls 23119 eee5fe 23115->23119 23127 eee616 23116->23127 23117->23104 23120 eee1ab 23118->23120 23121 eee609 23119->23121 23123 eea4b0 29 API calls 23119->23123 23124 eee1b8 23120->23124 23125 eee215 23120->23125 23121->23080 23132 ee833a 29 API calls 23121->23132 23122 eee62c 23128 ee6150 30 API calls 23122->23128 23129 eee740 23123->23129 23130 ee6150 30 API calls 23124->23130 23126 ee73eb 31 API calls 23125->23126 23131 eee225 23126->23131 23127->23122 23133 ee27f2 29 API calls 23127->23133 23127->23196 23141 eee637 23128->23141 23134 ee3f9a 38 API calls 23129->23134 23130->23104 23135 eee283 23131->23135 23136 eee230 23131->23136 23145 eee857 23132->23145 23133->23122 23137 eee755 23134->23137 23146 ef56cb 63 API calls 23135->23146 23138 ee6150 30 API calls 23136->23138 23140 ee833a 29 API calls 23137->23140 23138->23104 23139 eee661 23143 eee686 23139->23143 23154 ee27f2 29 API calls 23139->23154 23142 eee76a 23140->23142 23141->23139 23147 ee27f2 29 API calls 23141->23147 23141->23196 23148 eee805 23142->23148 23149 eee773 23142->23149 23144 ee6150 30 API calls 23143->23144 23150 eee691 23144->23150 23145->23080 23161 ef56cb 63 API calls 23145->23161 23152 eee2be 23146->23152 23147->23139 23151 eee81e 23148->23151 23160 ee27f2 29 API calls 23148->23160 23153 ee3719 29 API calls 23149->23153 23159 ee6150 30 API calls 23150->23159 23150->23196 23151->23121 23162 eee82f 23151->23162 23168 ee27f2 29 API calls 23151->23168 23155 eee2c9 23152->23155 23156 eee312 23152->23156 23157 eee782 23153->23157 23154->23143 23163 ee6150 30 API calls 23155->23163 23164 ee833a 29 API calls 23156->23164 23158 eee795 23157->23158 23169 ee27f2 29 API calls 23157->23169 23165 eee7a6 23158->23165 23174 ee27f2 29 API calls 23158->23174 23166 eee6a5 23159->23166 23160->23151 23167 eee8a3 23161->23167 23162->23121 23173 ee2ffd 42 API calls 23162->23173 23163->23104 23180 eee327 23164->23180 23170 ee6150 30 API calls 23165->23170 23175 ee6150 30 API calls 23166->23175 23166->23196 23171 eee8aa 23167->23171 23172 eee8b4 23167->23172 23168->23162 23169->23158 23176 eee7ad 23170->23176 23177 ee6150 30 API calls 23171->23177 23569 ee7da4 23172->23569 23173->23121 23174->23165 23183 eee6b9 23175->23183 23176->23109 23184 ee6150 30 API calls 23176->23184 23177->23080 23180->23104 23182 ee833a 29 API calls 23180->23182 23181 eee8c8 23185 ee6150 30 API calls 23181->23185 23186 eee361 23182->23186 23187 ee6150 30 API calls 23183->23187 23183->23196 23194 eee7be 23184->23194 23197 eee8d3 23185->23197 23186->23104 23188 ee7341 34 API calls 23186->23188 23201 eee6cd 23187->23201 23192 eee37c 23188->23192 23189 eee7ec 23190 ee6c0e 29 API calls 23189->23190 23190->23109 23191 eee8ed 23200 ee6150 30 API calls 23191->23200 23198 eee399 23192->23198 23199 eee389 23192->23199 23193 eee6fb 23193->23196 23206 ee27f2 29 API calls 23193->23206 23194->23109 23194->23189 23195 ee27f2 29 API calls 23194->23195 23195->23189 23196->23115 23196->23121 23197->23109 23197->23191 23202 ee27f2 29 API calls 23197->23202 23204 ee833a 29 API calls 23198->23204 23203 ee6150 30 API calls 23199->23203 23210 eee8f5 23200->23210 23201->23193 23201->23196 23205 ee27f2 29 API calls 23201->23205 23202->23191 23203->23104 23207 eee3b7 23204->23207 23205->23193 23206->23196 23207->23104 23211 ee7341 34 API calls 23207->23211 23208 eee923 23209 ee6c0e 29 API calls 23208->23209 23209->23109 23210->23109 23210->23208 23213 ee27f2 29 API calls 23210->23213 23212 eee3ce 23211->23212 23214 eee3d8 23212->23214 23215 eee3e6 23212->23215 23213->23208 23216 ee6150 30 API calls 23214->23216 23217 ef56cb 63 API calls 23215->23217 23216->23104 23218 eee421 23217->23218 23228 eeae55 23227->23228 23229 f016a0 29 API calls 23228->23229 23231 eeae61 23229->23231 23230 eeae99 23236 f016a0 29 API calls 23230->23236 23237 eeae91 23230->23237 23231->23230 23233 eeae85 23231->23233 23231->23237 23232 ee754b 30 API calls 23234 eeaf1c 23232->23234 23235 f016a0 29 API calls 23233->23235 23234->22648 23235->23237 23236->23237 23237->23232 23237->23234 23239 ee3719 29 API calls 23238->23239 23240 eebf82 23239->23240 23241 f016a0 29 API calls 23240->23241 23242 eebf90 23241->23242 23243 eebf98 23242->23243 23244 eec01b CLRCreateInstance 23242->23244 23248 eec005 23242->23248 23246 eec2d5 CLRCreateInstance 23243->23246 23255 eec2d0 23243->23255 23270 eebfd1 23243->23270 23245 f016a0 29 API calls 23244->23245 23261 eec048 23245->23261 23247 f016a0 29 API calls 23246->23247 23249 eec302 23247->23249 23248->23243 23253 ee27f2 29 API calls 23248->23253 23252 ee5d36 44 API calls 23249->23252 23249->23270 23250 ee6150 30 API calls 23251 eec56e 23250->23251 23251->23255 23256 ee6150 30 API calls 23251->23256 23258 eec31c 23252->23258 23253->23243 23254 eec600 23254->22635 23255->23254 23257 ee27f2 29 API calls 23255->23257 23256->23255 23257->23254 23259 ee379b 29 API calls 23258->23259 23260 eec380 23258->23260 23258->23270 23263 eec392 23259->23263 23260->23270 23606 eea58b 23260->23606 23261->23248 23262 ee5c6f 29 API calls 23261->23262 23264 ee5c3d 29 API calls 23261->23264 23266 ee5c3d 29 API calls 23261->23266 23273 ee5b62 31 API calls 23261->23273 23276 ee414d 29 API calls 23261->23276 23280 ee27f2 29 API calls 23261->23280 23262->23261 23263->23260 23265 ee27f2 29 API calls 23263->23265 23264->23261 23265->23260 23267 eec1a8 lstrlenW 23266->23267 23268 ee5c6f 29 API calls 23267->23268 23268->23261 23270->23250 23271 eec507 23271->23270 23272 eedd07 63 API calls 23271->23272 23274 eec550 23272->23274 23273->23261 23274->23270 23275 eedd07 63 API calls 23274->23275 23277 eec6c1 23275->23277 23276->23261 23277->23270 23280->23261 23288 ee754b 30 API calls 23287->23288 23289 ef3f69 23288->23289 23290 f016a0 29 API calls 23289->23290 23294 ef3f75 23290->23294 23291 ee6150 30 API calls 23292 ef40e7 23291->23292 23292->22653 23293 ef3f7c 23293->23291 23294->23293 23295 ef3ff3 23294->23295 23297 ef4007 23294->23297 23296 f016a0 29 API calls 23295->23296 23300 ef3fff 23296->23300 23297->23293 23298 f016a0 29 API calls 23297->23298 23298->23300 23300->23293 23617 eebd1c 23300->23617 23302 f016a0 29 API calls 23301->23302 23303 ef2594 23302->23303 23304 ef25ac 23303->23304 23305 ef2599 CoInitialize 23303->23305 23306 ee6150 30 API calls 23304->23306 23305->23304 23307 ef25b5 23306->23307 23308 f016a0 29 API calls 23307->23308 23309 ef25c1 23308->23309 23310 ef0ec1 23309->23310 23311 ee36c0 29 API calls 23309->23311 23310->22704 23310->22713 23312 ef25db 23311->23312 23312->23310 23313 ef25fa SafeArrayCreate 23312->23313 23313->23310 23314 ef2628 23313->23314 23315 ee36c0 29 API calls 23314->23315 23319 ef262c 23314->23319 23316 ef2642 23315->23316 23318 ee62db 42 API calls 23316->23318 23317 ee7341 34 API calls 23317->23319 23321 ef2661 23318->23321 23319->23310 23319->23317 23320 ef26e7 SafeArrayPutElement 23319->23320 23322 ee6150 30 API calls 23320->23322 23323 ef26c8 23321->23323 23324 ee61e3 29 API calls 23321->23324 23322->23319 23323->23310 23323->23319 23326 ee27f2 29 API calls 23323->23326 23325 ef268b 23324->23325 23325->23323 23327 ee3db2 42 API calls 23325->23327 23326->23319 23327->23323 23329 f016a0 29 API calls 23328->23329 23330 eedd21 23329->23330 23331 eeddac 23330->23331 23332 eedd51 23330->23332 23333 eedd98 23330->23333 23331->23332 23336 f016a0 29 API calls 23331->23336 23332->22722 23334 f016a0 29 API calls 23333->23334 23335 eedda4 23334->23335 23338 eedf68 23335->23338 23638 eec8a7 23335->23638 23336->23335 23338->23332 23339 f016a0 29 API calls 23338->23339 23343 eedfb5 23339->23343 23343->23332 23350 eebd1c 52 API calls 23343->23350 23350->23332 23392 ee3668 23391->23392 23393 ee345e 29 API calls 23392->23393 23394 ee3675 23393->23394 23394->22874 23396 ee4211 23395->23396 23397 ee4183 23395->23397 23396->22871 23398 ee41f0 23397->23398 23400 ee38a3 42 API calls 23397->23400 23399 ee414d 29 API calls 23398->23399 23401 ee4207 23399->23401 23400->23397 23401->22871 23403 f016a0 29 API calls 23402->23403 23404 eea664 23403->23404 23404->22885 23406 ee44fa 23405->23406 23407 ee4505 23405->23407 23406->23407 23408 ee27f2 29 API calls 23406->23408 23407->22906 23408->23407 23410 f016a0 29 API calls 23409->23410 23412 ee4d04 23410->23412 23411 ee4d17 23411->22918 23413 ee4212 29 API calls 23412->23413 23415 ee4d0b 23412->23415 23413->23415 23414 ee4177 42 API calls 23416 ee4d66 23414->23416 23415->23411 23415->23414 23416->23411 23417 ee3719 29 API calls 23416->23417 23418 ee4d93 23417->23418 23420 ee3719 29 API calls 23418->23420 23441 ee52f1 23418->23441 23419 ee53bc 23419->23411 23424 ee4177 42 API calls 23419->23424 23422 ee4df7 23420->23422 23421 ee53c1 23425 ee414d 29 API calls 23421->23425 23428 ee53cd 23421->23428 23427 ee3684 29 API calls 23422->23427 23430 ee4e85 23422->23430 23424->23411 23425->23428 23426 ee5221 23426->23419 23431 ee414d 29 API calls 23426->23431 23436 ee4e31 23427->23436 23428->23419 23429 ee27f2 29 API calls 23428->23429 23429->23419 23430->23426 23432 ee27f2 29 API calls 23430->23432 23433 ee5287 23431->23433 23432->23426 23434 ee37db 42 API calls 23433->23434 23449 ee5294 23434->23449 23435 ee4212 29 API calls 23435->23436 23436->23435 23447 ee4e6c 23436->23447 23437 ee4435 29 API calls 23437->23441 23438 ee3877 42 API calls 23438->23441 23439 ee38a3 42 API calls 23439->23441 23440 ee4e80 23440->23430 23448 ee27f2 29 API calls 23440->23448 23441->23419 23441->23421 23441->23437 23441->23438 23441->23439 23443 ee37db 42 API calls 23441->23443 23457 ee27f2 29 API calls 23441->23457 23506 ee194e 23441->23506 23442 ee52aa 23445 ee52ae 23442->23445 23452 ee27f2 29 API calls 23442->23452 23443->23441 23444 ee4ec4 23444->23440 23451 ee4919 29 API calls 23444->23451 23450 ee49a7 29 API calls 23445->23450 23446 ee4212 29 API calls 23446->23449 23447->23440 23447->23444 23453 ee4919 29 API calls 23447->23453 23448->23430 23449->23442 23449->23446 23450->23441 23454 ee5178 23451->23454 23452->23445 23455 ee4ef9 23453->23455 23456 ee51de 23454->23456 23458 efa3a1 29 API calls 23454->23458 23455->23444 23459 ef1efe 29 API calls 23455->23459 23456->23440 23461 ee27f2 29 API calls 23456->23461 23457->23441 23460 ee519e 23458->23460 23462 ee4f2b 23459->23462 23463 ee51cf 23460->23463 23464 ee51aa 23460->23464 23461->23440 23462->23444 23466 ee3684 29 API calls 23462->23466 23463->23456 23467 ee27f2 29 API calls 23463->23467 23465 ee2d0e 29 API calls 23464->23465 23465->23440 23471 ee4f45 23466->23471 23467->23456 23468 ee4f81 23468->23444 23470 ee496d memcmp 23468->23470 23469 ee4212 29 API calls 23469->23471 23472 ee4fad 23470->23472 23471->23468 23471->23469 23473 ee4fcb 23472->23473 23475 ee27f2 29 API calls 23472->23475 23474 ee4fdc 23473->23474 23479 ee27f2 29 API calls 23473->23479 23476 ee4fed 23474->23476 23480 ee27f2 29 API calls 23474->23480 23475->23473 23477 ee4ffc memchr 23476->23477 23478 ee501e 23476->23478 23477->23478 23478->23444 23481 ee5103 23478->23481 23482 ee5055 memchr 23478->23482 23484 ee507a 23478->23484 23479->23474 23480->23476 23481->23430 23482->23484 23484->23481 23507 ee196f 23506->23507 23508 f016a0 29 API calls 23507->23508 23510 ee19c6 23507->23510 23509 ee19bc 23508->23509 23509->23510 23511 ee194e 29 API calls 23509->23511 23510->23441 23511->23510 23513 ef2933 23512->23513 23514 ee360d strlen 23513->23514 23515 ef295d 23514->23515 23516 f016a0 29 API calls 23515->23516 23517 ef296f 23516->23517 23518 ee360d strlen 23517->23518 23520 eeea50 23517->23520 23519 ef2981 23518->23519 23519->23520 23521 ef298c _wfopen 23519->23521 23520->22925 23522 ee2812 29 API calls 23521->23522 23523 ef29b3 23522->23523 23523->23520 23524 ee2812 29 API calls 23523->23524 23524->23520 23534 ef2227 23533->23534 23570 ee7db5 23569->23570 23588 ee7e29 23569->23588 23571 f016a0 29 API calls 23570->23571 23572 ee7dc3 23571->23572 23573 ee7e4f 23572->23573 23574 ee6669 45 API calls 23572->23574 23572->23588 23576 ee7ea3 23573->23576 23577 ee7e93 SafeArrayGetDim 23573->23577 23573->23588 23575 ee7dfe 23574->23575 23578 ee7e2e 23575->23578 23579 ee7da4 45 API calls 23575->23579 23581 ee7ed4 SafeArrayGetVartype 23576->23581 23576->23588 23605 ee7ff5 23576->23605 23577->23576 23580 ee6150 30 API calls 23578->23580 23582 ee7e13 23579->23582 23580->23573 23584 ee7ef1 23581->23584 23581->23605 23582->23578 23585 ee7e24 23582->23585 23583 ee36c0 29 API calls 23586 ee800e 23583->23586 23584->23588 23589 ee7f0e SafeArrayGetLBound 23584->23589 23584->23605 23587 ee6150 30 API calls 23585->23587 23586->23588 23590 ee62db 42 API calls 23586->23590 23587->23588 23588->23080 23588->23181 23591 ee7f34 23589->23591 23589->23605 23592 ee8034 23590->23592 23591->23588 23594 ee7f40 SafeArrayGetUBound 23591->23594 23593 ee8099 23592->23593 23596 ee61e3 29 API calls 23592->23596 23593->23588 23600 ee27f2 29 API calls 23593->23600 23595 ee7f66 23594->23595 23594->23605 23595->23588 23597 ee7f76 SafeArrayAccessData 23595->23597 23598 ee805e 23596->23598 23599 ee7f8f 23597->23599 23597->23605 23598->23593 23602 ee3db2 42 API calls 23598->23602 23601 ee3684 29 API calls 23599->23601 23600->23588 23603 ee7fa0 SafeArrayUnaccessData 23601->23603 23602->23593 23603->23588 23603->23605 23605->23583 23605->23588 23607 f016a0 29 API calls 23606->23607 23608 eea5b0 23607->23608 23609 eea5c8 23608->23609 23610 eea5b5 CoInitialize 23608->23610 23611 ee6150 30 API calls 23609->23611 23610->23609 23612 eea5cf 23611->23612 23613 f016a0 29 API calls 23612->23613 23614 eea5db 23613->23614 23615 eea5f3 23614->23615 23616 ee36c0 29 API calls 23614->23616 23615->23271 23616->23615 23618 ee5d36 44 API calls 23617->23618 23639 f016a0 29 API calls 23638->23639 23640 eec8cc 23639->23640 23641 f016a0 29 API calls 23640->23641 20431 f028ae 20432 f028c8 20431->20432 20433 f028fd 20431->20433 20434 f02903 RtlAddVectoredExceptionHandler 20433->20434 20435 f02926 20433->20435 20434->20432 20435->20432 20436 f02a1d 20435->20436 20437 f0296b 20435->20437 20439 f02a35 20436->20439 20445 f02b32 20436->20445 20462 f036d2 20437->20462 20441 f036d2 31 API calls 20439->20441 20443 f02a77 20441->20443 20442 f01def free 20446 f02b6d 20442->20446 20447 f02b0d 20443->20447 20456 f02a88 20443->20456 20444 f01def free 20448 f029d8 20444->20448 20445->20432 20445->20442 20449 f0278d abort 20446->20449 20450 f01def free 20447->20450 20451 f0278d abort 20448->20451 20449->20432 20452 f02b1b 20450->20452 20453 f029ed 20451->20453 20455 f0278d abort 20452->20455 20469 f025a4 20453->20469 20454 f01def free 20458 f02ac6 20454->20458 20455->20432 20456->20454 20459 f0278d abort 20458->20459 20460 f02adb 20459->20460 20461 f025a4 8 API calls 20460->20461 20461->20432 20463 f036e2 20462->20463 20464 f0297c 20462->20464 20484 f02274 20463->20484 20464->20444 20466 f036ed 20466->20464 20490 f05b83 20466->20490 20514 f06089 20466->20514 20470 f02691 20469->20470 20471 f025b4 20469->20471 20470->20432 20471->20470 20472 f01b64 2 API calls 20471->20472 20473 f025d1 20472->20473 20474 f025ef 20473->20474 20644 f02460 20473->20644 20476 f02607 20474->20476 20477 f025f9 free 20474->20477 20478 f02611 free 20476->20478 20479 f0261f 20476->20479 20477->20476 20478->20479 20480 f02637 memset 20479->20480 20481 f02629 free 20479->20481 20482 f0265b 20480->20482 20481->20480 20483 f01c0d 2 API calls 20482->20483 20483->20470 20485 f02280 20484->20485 20486 f02287 20484->20486 20485->20466 20487 f01b64 2 API calls 20486->20487 20488 f02293 20487->20488 20489 f01c0d 2 API calls 20488->20489 20489->20485 20527 f05591 20490->20527 20492 f05b9c 20493 f01b64 2 API calls 20492->20493 20500 f05ba5 20492->20500 20494 f05bc3 20493->20494 20495 f05be3 20494->20495 20496 f05bcc 20494->20496 20498 f05c09 20495->20498 20499 f05c8a 20495->20499 20531 f05504 20496->20531 20502 f01b64 2 API calls 20498->20502 20501 f01c0d 2 API calls 20499->20501 20500->20466 20503 f05c98 20501->20503 20504 f05c17 20502->20504 20505 f05504 2 API calls 20503->20505 20506 f05c20 20504->20506 20507 f05c42 20504->20507 20505->20500 20509 f01c0d 2 API calls 20506->20509 20535 f05778 20507->20535 20511 f05c2e 20509->20511 20513 f05504 2 API calls 20511->20513 20512 f05504 2 API calls 20512->20500 20513->20500 20515 f0609a 20514->20515 20516 f060a3 20515->20516 20517 f06123 20515->20517 20518 f060bd 20515->20518 20516->20466 20520 f05778 2 API calls 20517->20520 20519 f01b64 2 API calls 20518->20519 20521 f060cb 20519->20521 20522 f06112 20520->20522 20521->20522 20524 f06101 20521->20524 20566 f06d7d 20521->20566 20523 f05504 2 API calls 20522->20523 20523->20516 20526 f01c0d 2 API calls 20524->20526 20526->20522 20528 f055a8 20527->20528 20530 f055b3 20527->20530 20540 f0588b 20528->20540 20530->20492 20532 f05516 20531->20532 20533 f05572 20532->20533 20534 f0553e fprintf exit 20532->20534 20533->20500 20534->20533 20536 f01c0d 2 API calls 20535->20536 20537 f0578c 20536->20537 20538 f01c0d 2 API calls 20537->20538 20539 f0579d 20538->20539 20539->20512 20541 f0589d 20540->20541 20543 f058a7 20541->20543 20544 f058e1 20541->20544 20543->20530 20545 f058f7 calloc 20544->20545 20546 f058ed 20544->20546 20545->20546 20547 f05927 20545->20547 20546->20543 20548 f05971 free 20547->20548 20549 f05984 20547->20549 20548->20546 20550 f059c1 20549->20550 20551 f059a3 20549->20551 20560 f06971 20550->20560 20553 f01def free 20551->20553 20554 f059b1 free 20553->20554 20554->20546 20556 f01def free 20557 f059ee 20556->20557 20558 f01def free 20557->20558 20559 f059fc free 20558->20559 20559->20546 20561 f059d7 20560->20561 20562 f0698e 20560->20562 20561->20546 20561->20556 20562->20561 20563 f069a8 calloc 20562->20563 20563->20561 20564 f069cf 20563->20564 20564->20561 20565 f06aac free 20564->20565 20565->20561 20567 f06d89 20566->20567 20569 f06d92 20566->20569 20567->20569 20570 f0778c 20567->20570 20569->20524 20571 f0779f 20570->20571 20572 f077d4 20571->20572 20574 f07835 20571->20574 20572->20569 20575 f078de 20574->20575 20581 f07853 20574->20581 20594 f03a01 20575->20594 20578 f079ff 20579 f07a09 20578->20579 20585 f07acc 20578->20585 20580 f03cad 16 API calls 20579->20580 20579->20581 20583 f07a73 20579->20583 20580->20579 20581->20572 20582 f07956 20582->20581 20608 f03cad 20582->20608 20583->20581 20588 f03d58 31 API calls 20583->20588 20584 f07901 20584->20582 20590 f07977 20584->20590 20591 f03d58 31 API calls 20584->20591 20585->20581 20587 f03cad 16 API calls 20585->20587 20589 f07b70 20585->20589 20587->20585 20588->20581 20589->20581 20592 f03d58 31 API calls 20589->20592 20597 f03d58 20590->20597 20591->20584 20592->20581 20595 f03841 16 API calls 20594->20595 20596 f03a0c 20595->20596 20596->20578 20596->20584 20598 f03841 16 API calls 20597->20598 20599 f03d63 20598->20599 20600 f01b64 2 API calls 20599->20600 20603 f03e21 20599->20603 20605 f03d9d 20600->20605 20601 f03e13 20602 f01c0d 2 API calls 20601->20602 20602->20603 20603->20581 20604 f01c0d 2 API calls 20606 f03e0e 20604->20606 20605->20601 20605->20604 20612 f03c29 20606->20612 20609 f03cc3 20608->20609 20610 f03cbc 20608->20610 20611 f03841 16 API calls 20609->20611 20610->20581 20611->20610 20613 f03841 16 API calls 20612->20613 20614 f03c34 20613->20614 20621 f03d0b 20614->20621 20617 f03d0b 16 API calls 20618 f03c9e 20617->20618 20624 f03a97 20618->20624 20622 f03841 16 API calls 20621->20622 20623 f03c53 20622->20623 20623->20617 20625 f03841 16 API calls 20624->20625 20626 f03aaf 20625->20626 20627 f036d2 30 API calls 20626->20627 20628 f03acc 20627->20628 20629 f03af2 20628->20629 20630 f03ada longjmp 20628->20630 20631 f03b5f 20629->20631 20632 f03b1b 20629->20632 20636 f03b84 20629->20636 20630->20629 20634 f03841 16 API calls 20631->20634 20633 f025a4 8 API calls 20632->20633 20633->20631 20635 f03c34 20634->20635 20637 f03d0b 16 API calls 20635->20637 20636->20631 20639 f025a4 8 API calls 20636->20639 20638 f03c53 20637->20638 20640 f03d0b 16 API calls 20638->20640 20639->20631 20641 f03c9e 20640->20641 20642 f03a97 30 API calls 20641->20642 20643 f03caa 20642->20643 20643->20601 20645 f0247a 20644->20645 20646 f02470 20644->20646 20645->20646 20647 f02519 20645->20647 20648 f024d9 memmove 20645->20648 20646->20474 20647->20646 20649 f0252f free 20647->20649 20648->20647 20649->20646 22015 ee1d8a 22016 ee1db2 22015->22016 22017 ee1e18 22015->22017 22016->22017 22021 ee1ce3 22016->22021 22018 ee1ce3 6 API calls 22017->22018 22020 ee1e8f 22017->22020 22018->22020 22022 ee1d33 22021->22022 22023 ee1c83 6 API calls 22022->22023 22024 ee1d5a 22023->22024 22024->22017 18318 eea58b 18329 f016a0 18318->18329 18320 eea5b0 18321 eea5c8 18320->18321 18322 eea5b5 CoInitialize 18320->18322 18359 ee6150 18321->18359 18322->18321 18325 f016a0 29 API calls 18326 eea5db 18325->18326 18327 eea5f3 18326->18327 18364 ee36c0 18326->18364 18330 f016f0 18329->18330 18355 f016b2 18329->18355 18371 f030f4 18330->18371 18334 f016bf 18336 f01730 calloc 18334->18336 18337 f016c5 18334->18337 18340 f01750 18336->18340 18341 f0b655 abort 18336->18341 18338 f017d0 realloc 18337->18338 18339 f016cf 18337->18339 18338->18341 18346 f017fc memset 18338->18346 18343 f016de 18339->18343 18348 f01787 malloc 18339->18348 18349 f01838 malloc 18339->18349 18397 f03527 18340->18397 18343->18320 18345 f01868 18345->18320 18351 f03527 20 API calls 18346->18351 18347 f01766 18347->18339 18347->18343 18348->18341 18354 f0179e 18348->18354 18349->18341 18353 f01850 18349->18353 18352 f01830 18351->18352 18352->18349 18353->18345 18353->18354 18356 f01880 memset 18354->18356 18357 f017b6 memcpy 18354->18357 18367 f034a7 18355->18367 18358 f017c2 18356->18358 18357->18358 18358->18320 18360 ee6162 18359->18360 18361 ee6166 VariantClear 18360->18361 18362 ee618b 18360->18362 18363 f016a0 29 API calls 18361->18363 18362->18325 18363->18362 18492 ee345e 18364->18492 18368 f034b4 18367->18368 18405 f03841 18368->18405 18370 f034bc 18370->18334 18372 f03113 18371->18372 18373 f01704 18371->18373 18372->18373 18374 f02c3f calloc 18372->18374 18391 f01b64 18373->18391 18375 f0313e 18374->18375 18376 f01b64 2 API calls 18375->18376 18377 f0314f 18376->18377 18378 f03158 18377->18378 18379 f0319d 18377->18379 18476 f03a4d 18378->18476 18380 f0318d 18379->18380 18385 f031ba fprintf 18379->18385 18382 f01c0d 2 API calls 18380->18382 18386 f031e3 18382->18386 18384 f03a4d 16 API calls 18387 f03179 18384->18387 18385->18380 18388 f02d01 3 API calls 18386->18388 18390 f03a4d 16 API calls 18387->18390 18389 f031ee 18388->18389 18389->18373 18390->18380 18479 f019d6 18391->18479 18393 f01710 18393->18345 18394 f01c0d 18393->18394 18395 f0199c 2 API calls 18394->18395 18396 f01c1f 18395->18396 18396->18355 18398 f03534 18397->18398 18399 f03841 16 API calls 18398->18399 18400 f0353c 18399->18400 18401 f0355c realloc 18400->18401 18403 f0358a 18400->18403 18402 f035a2 realloc 18401->18402 18401->18403 18402->18403 18404 f035d8 memset memset 18402->18404 18403->18347 18404->18403 18417 f02e02 18405->18417 18408 f03880 18408->18370 18414 f03976 abort 18415 f0397b 18414->18415 18415->18408 18416 f039cb abort 18415->18416 18416->18408 18418 f02e17 18417->18418 18419 f02e21 18417->18419 18418->18408 18431 f02696 18418->18431 18419->18418 18451 f02c3f 18419->18451 18421 f02e4c 18422 f01b64 2 API calls 18421->18422 18423 f02e5d 18422->18423 18424 f02e76 18423->18424 18425 f02e66 18423->18425 18424->18425 18427 f02e93 fprintf 18424->18427 18426 f01c0d 2 API calls 18425->18426 18428 f02ebc 18426->18428 18427->18425 18456 f02d01 18428->18456 18430 f02ec7 18430->18418 18432 f01b64 2 API calls 18431->18432 18433 f026af 18432->18433 18434 f026bd calloc 18433->18434 18435 f0271e 18433->18435 18436 f026da 18434->18436 18437 f0270d 18434->18437 18438 f022b2 3 API calls 18435->18438 18469 f022b2 18436->18469 18440 f01c0d 2 API calls 18437->18440 18441 f02729 18438->18441 18443 f02719 18440->18443 18446 f01c0d 2 API calls 18441->18446 18445 f02785 18443->18445 18444 f026fb free 18444->18437 18445->18408 18447 f0278d 18445->18447 18446->18443 18448 f0289c DuplicateHandle 18447->18448 18449 f0279f 18447->18449 18448->18414 18448->18415 18449->18448 18450 f02894 abort 18449->18450 18450->18448 18452 f02c58 18451->18452 18453 f02c87 calloc 18452->18453 18455 f02ce1 18452->18455 18454 f02cb6 18453->18454 18454->18455 18455->18421 18457 f02dc9 18456->18457 18458 f02d18 18456->18458 18457->18430 18459 f02d51 18458->18459 18460 f02da4 fprintf 18458->18460 18459->18457 18465 f01def 18459->18465 18460->18457 18467 f01e08 18465->18467 18466 f01e40 free 18466->18457 18467->18466 18468 f01e2c free 18467->18468 18468->18466 18470 f022c9 18469->18470 18473 f022bf 18469->18473 18471 f022e5 malloc 18470->18471 18472 f02318 realloc 18470->18472 18474 f02304 18470->18474 18471->18473 18471->18474 18472->18473 18472->18474 18473->18437 18473->18444 18474->18473 18475 f023e2 memmove 18474->18475 18475->18473 18477 f03841 16 API calls 18476->18477 18478 f0316a 18477->18478 18478->18384 18482 f0199c 18479->18482 18481 f019e8 18481->18393 18483 f019b5 18482->18483 18484 f019b9 18483->18484 18485 f019cd 18483->18485 18488 f01909 malloc 18484->18488 18485->18481 18489 f0192b 18488->18489 18490 f01924 18488->18490 18489->18490 18491 f0198a free 18489->18491 18490->18485 18491->18490 18495 ee25a2 18492->18495 18496 f016a0 29 API calls 18495->18496 18497 ee25b7 18496->18497 22280 ee1148 22281 ee1155 _amsg_exit 22280->22281 22283 ee1218 22281->22283 22284 ee1222 _initterm 22283->22284 22286 ee1240 22283->22286 22284->22286 22285 efac8e 4 API calls 22287 ee128c 22285->22287 22286->22285 22288 ee12b3 __p__acmdln 22287->22288 22291 ee12cd 22288->22291 22289 ee14b1 4 API calls 22290 ee1361 22289->22290 22292 efa4dc _onexit 22290->22292 22291->22289 22293 ee1366 22292->22293 22294 ee13af 22293->22294 22295 ee13a2 exit 22293->22295 22296 ee13bd 22294->22296 22297 ee13b8 _cexit 22294->22297 22295->22294 22297->22296 18498 ef8129 18771 ee3719 18498->18771 18503 ee833a 29 API calls 18504 ef817f 18503->18504 18507 ef80d1 18504->18507 18785 ee55bf 18504->18785 18505 ef9f39 18506 ef9f4d 18505->18506 18511 ee27f2 29 API calls 18505->18511 18508 ef9f61 18506->18508 18514 ee27f2 29 API calls 18506->18514 18507->18505 18510 ee27f2 29 API calls 18507->18510 18512 ef9f75 18508->18512 18517 ee27f2 29 API calls 18508->18517 18510->18505 18511->18506 18515 ef9f89 18512->18515 18521 ee27f2 29 API calls 18512->18521 18514->18508 18516 ef9f9d 18515->18516 18522 ee27f2 29 API calls 18515->18522 18519 ef9fb1 18516->18519 18525 ee27f2 29 API calls 18516->18525 18517->18512 18518 ee833a 29 API calls 18520 ef81da 18518->18520 18523 ef9fc5 18519->18523 18529 ee27f2 29 API calls 18519->18529 18520->18507 18524 ee833a 29 API calls 18520->18524 18521->18515 18522->18516 18526 ef9fd9 18523->18526 18531 ee27f2 29 API calls 18523->18531 18527 ef8206 18524->18527 18525->18519 18528 ef9fed 18526->18528 18533 ee27f2 29 API calls 18526->18533 18527->18507 18532 ee55bf 44 API calls 18527->18532 18530 efa001 18528->18530 18536 ee27f2 29 API calls 18528->18536 18529->18523 18534 efa015 18530->18534 18539 ee27f2 29 API calls 18530->18539 18531->18526 18535 ef8235 18532->18535 18533->18528 18537 efa029 18534->18537 18542 ee27f2 29 API calls 18534->18542 18535->18507 18799 ee9029 18535->18799 18536->18530 18538 efa03d 18537->18538 18543 ee27f2 29 API calls 18537->18543 18540 efa051 18538->18540 18546 ee27f2 29 API calls 18538->18546 18539->18534 18545 efa065 18540->18545 18548 ee27f2 29 API calls 18540->18548 18542->18537 18543->18538 18549 efa079 18545->18549 18553 ee27f2 29 API calls 18545->18553 18546->18540 18547 ee833a 29 API calls 18552 ef829e 18547->18552 18548->18545 18550 efa08d 18549->18550 18554 ee27f2 29 API calls 18549->18554 18551 efa0a1 18550->18551 18556 ee27f2 29 API calls 18550->18556 18555 efa0c9 18551->18555 18560 ee27f2 29 API calls 18551->18560 18557 ee833a 29 API calls 18552->18557 18598 ef838c 18552->18598 18553->18549 18554->18550 18558 efa0f1 18555->18558 18564 ee27f2 29 API calls 18555->18564 18556->18551 18561 ef82ca 18557->18561 18559 efa105 18558->18559 18566 ee27f2 29 API calls 18558->18566 18563 efa12d 18559->18563 18571 ee27f2 29 API calls 18559->18571 18560->18555 18561->18598 18955 ee9cad 18561->18955 18567 efa155 18563->18567 18575 ee27f2 29 API calls 18563->18575 18564->18558 18566->18559 18572 efa169 18567->18572 18579 ee27f2 29 API calls 18567->18579 18569 ef82f5 18569->18598 18570 ef8403 18574 ef8414 18570->18574 18582 ee27f2 29 API calls 18570->18582 18571->18563 18573 efa17d 18572->18573 18581 ee27f2 29 API calls 18572->18581 18584 ee27f2 29 API calls 18573->18584 18594 efa191 18573->18594 18578 ef8425 18574->18578 18585 ee27f2 29 API calls 18574->18585 18575->18567 18583 ef844d 18578->18583 18586 ee27f2 29 API calls 18578->18586 18579->18572 18581->18573 18582->18574 18583->18507 18587 ee833a 29 API calls 18583->18587 18584->18594 18585->18578 18586->18583 18589 ef8482 18587->18589 18592 ee833a 29 API calls 18589->18592 18601 ef84f1 18589->18601 18591 efa286 18603 ee27f2 29 API calls 18591->18603 18604 efa2ae 18591->18604 18597 ef84a6 18592->18597 18594->18591 18599 ee27f2 29 API calls 18594->18599 18595 efa34f 19243 ee4509 18595->19243 18596 ef8508 18596->18507 18608 ee833a 29 API calls 18596->18608 18609 ee9cad 50 API calls 18597->18609 18614 ef84cd 18597->18614 19052 ee44a5 18598->19052 18599->18591 18600 efa2d1 18606 ee44a5 29 API calls 18600->18606 18601->18596 18605 ee27f2 29 API calls 18601->18605 18603->18604 18604->18595 18604->18600 18610 ee27f2 29 API calls 18604->18610 18605->18596 18611 efa2e8 18606->18611 18612 ef8538 18608->18612 18609->18614 18610->18600 18613 efa2fe 18611->18613 18620 ee27f2 29 API calls 18611->18620 18615 ee833a 29 API calls 18612->18615 18623 ef85a7 18612->18623 18616 efa312 18613->18616 18624 ee27f2 29 API calls 18613->18624 18614->18601 18617 ee27f2 29 API calls 18614->18617 18621 ef855c 18615->18621 18618 ee44a5 29 API calls 18616->18618 18617->18601 18622 efa329 18618->18622 18619 ef85be 18619->18507 19058 eeaf50 18619->19058 18620->18613 18628 ee9cad 50 API calls 18621->18628 18631 ef8583 18621->18631 18625 ee44a5 29 API calls 18622->18625 18623->18619 18626 ee27f2 29 API calls 18623->18626 18624->18616 18629 efa342 18625->18629 18626->18619 18628->18631 18632 ee6150 30 API calls 18629->18632 18631->18623 18634 ee27f2 29 API calls 18631->18634 18632->18595 18634->18623 18772 ee3731 18771->18772 18774 ee3745 18772->18774 18775 ee373f 18772->18775 18777 ee3754 18772->18777 18773 ee3743 18778 ee25a2 29 API calls 18773->18778 18776 ee27f2 29 API calls 18774->18776 18774->18777 18775->18773 18775->18777 18779 ee27f2 29 API calls 18775->18779 18776->18777 18780 ee833a 18777->18780 18778->18777 18779->18773 18781 ee3ef1 29 API calls 18780->18781 18783 ee8353 18781->18783 18782 ee8397 18782->18503 18782->18507 18783->18782 19255 ee4212 18783->19255 18786 ee55e0 18785->18786 19259 ee360d 18786->19259 18789 f016a0 29 API calls 18790 ee560f 18789->18790 18791 ee5618 _wgetenv 18790->18791 18794 ee5639 18790->18794 19263 ee2812 18791->19263 18793 ee564c 18793->18507 18793->18518 18794->18793 18795 ee5647 18794->18795 18796 ee5654 18794->18796 19267 ee18f3 18795->19267 18797 ee3719 29 API calls 18796->18797 18797->18793 18800 ee833a 29 API calls 18799->18800 18801 ee9058 18800->18801 18802 f016a0 29 API calls 18801->18802 18803 ee9072 18802->18803 18867 ee90a5 18803->18867 19279 ee6d2d 18803->19279 18805 ee908f 18807 ee909c 18805->18807 18808 ee90ed 18805->18808 18806 ee6150 30 API calls 18815 ee9aa6 18806->18815 19339 ee6c0e 18807->19339 18810 ee833a 29 API calls 18808->18810 18816 ee9102 18810->18816 18811 ee833a 29 API calls 18814 ee95f3 18811->18814 18812 ee9ac0 18813 ee6150 30 API calls 18812->18813 18824 ee9ac7 18813->18824 18817 ee9612 18814->18817 18820 ee3719 29 API calls 18814->18820 18815->18812 18818 ee27f2 29 API calls 18815->18818 18954 ee95db 18815->18954 18819 ee833a 29 API calls 18816->18819 18816->18867 18817->18507 18817->18547 18818->18812 18822 ee913e 18819->18822 18823 ee960b 18820->18823 18821 ee9aef 18825 ee6150 30 API calls 18821->18825 18822->18867 19307 ee7341 18822->19307 19346 ee2ffd 18823->19346 18824->18821 18827 ee27f2 29 API calls 18824->18827 18824->18954 18829 ee9afa 18825->18829 18827->18821 18833 ee6150 30 API calls 18829->18833 18829->18954 18831 ee916c 18834 ee6150 30 API calls 18831->18834 18832 ee91a9 18835 ee833a 29 API calls 18832->18835 18839 ee9b0b 18833->18839 18834->18867 18836 ee91c7 18835->18836 18836->18867 18837 ee9b39 18838 ee6150 30 API calls 18837->18838 18847 ee9b44 18838->18847 18839->18837 18842 ee27f2 29 API calls 18839->18842 18839->18954 18842->18837 18849 ee9b72 18847->18849 18851 ee27f2 29 API calls 18847->18851 18847->18954 18850 ee9b97 18849->18850 18856 ee27f2 29 API calls 18849->18856 18854 ee6150 30 API calls 18850->18854 18851->18849 18857 ee9ba2 18854->18857 18856->18850 18859 ee6150 30 API calls 18857->18859 18857->18954 18860 ee9bb6 18859->18860 18865 ee6150 30 API calls 18860->18865 18860->18954 18869 ee9bca 18865->18869 18867->18806 18868 ee9bf8 18871 ee6150 30 API calls 18868->18871 18869->18868 18872 ee27f2 29 API calls 18869->18872 18869->18954 18878 ee9c03 18871->18878 18872->18868 18875 ee9c31 18882 ee27f2 29 API calls 18875->18882 18878->18875 18881 ee27f2 29 API calls 18878->18881 18878->18954 18881->18875 18954->18811 18954->18817 18956 ee9cde 18955->18956 18957 ee833a 29 API calls 18956->18957 18958 ee9d01 18957->18958 18959 f016a0 29 API calls 18958->18959 18960 ee9d12 18959->18960 18961 ee833a 29 API calls 18960->18961 19036 eea2df 18960->19036 18962 ee9d32 18961->18962 18964 ee379b 29 API calls 18962->18964 18962->19036 18963 ee44a5 29 API calls 18965 eea3cb 18963->18965 18972 ee9d56 18964->18972 18966 eea3de 18965->18966 18969 ee27f2 29 API calls 18965->18969 18967 eea3ef 18966->18967 18970 ee27f2 29 API calls 18966->18970 18968 eea40b 18967->18968 18973 ee27f2 29 API calls 18967->18973 18971 eea427 18968->18971 18975 ee27f2 29 API calls 18968->18975 18969->18966 18970->18967 18974 eea443 18971->18974 18976 ee27f2 29 API calls 18971->18976 18980 ee833a 29 API calls 18972->18980 18973->18968 18977 ee27f2 29 API calls 18974->18977 19051 eea28b 18974->19051 18975->18971 18976->18974 18977->19051 18978 eea497 18978->18569 18979 eea47b 18979->18978 18982 ee27f2 29 API calls 18979->18982 18983 ee9da7 18980->18983 18981 ee27f2 29 API calls 18981->18979 18982->18978 18984 ee833a 29 API calls 18983->18984 18983->19036 18985 ee9dca 18984->18985 18986 ee9e7a 18985->18986 18990 ee9eb2 18985->18990 18985->19036 19820 ee36da 18985->19820 19823 efa378 18986->19823 18988 eea067 18992 ee40bc 42 API calls 18988->18992 18990->18988 18993 ee27f2 29 API calls 18990->18993 18996 eea06e 18992->18996 18993->18988 18994 ee9e5e 18995 ee9e55 19036->18963 19051->18979 19051->18981 19053 ee44b6 19052->19053 19054 ee44ba 19053->19054 19057 ee27f2 29 API calls 19053->19057 19055 ee44be 19054->19055 19056 ee27f2 29 API calls 19054->19056 19055->18570 19201 ee27f2 19055->19201 19056->19055 19057->19053 19059 ee833a 29 API calls 19058->19059 19060 eeaf8d 19059->19060 19202 f016a0 29 API calls 19201->19202 19203 ee2807 19202->19203 19244 f016a0 29 API calls 19243->19244 19245 ee451c 19244->19245 19246 ee4564 19245->19246 19247 f016a0 29 API calls 19245->19247 19248 ee452d 19247->19248 19248->19246 19991 ee3a85 19248->19991 19251 ee2c92 42 API calls 19252 ee454c 19251->19252 19253 ee4558 exit 19252->19253 19254 ee2dc1 29 API calls 19252->19254 19253->19246 19254->19253 19256 ee4237 19255->19256 19257 ee4222 19255->19257 19256->18783 19257->19256 19258 ee25a2 29 API calls 19257->19258 19258->19256 19260 ee3623 19259->19260 19261 ee3631 19260->19261 19270 ee18dc 19260->19270 19261->18789 19264 ee281f 19263->19264 19265 ee2824 19263->19265 19266 ee27f2 29 API calls 19264->19266 19265->18794 19266->19265 19273 ef22ac 19267->19273 19271 ee18f0 19270->19271 19272 ee18e0 strlen 19270->19272 19271->19261 19272->19261 19274 ee379b 29 API calls 19273->19274 19275 ef22d4 19274->19275 19276 ee190a 19275->19276 19277 f016a0 29 API calls 19275->19277 19278 ee3877 42 API calls 19275->19278 19276->18793 19277->19275 19278->19275 19280 f016a0 29 API calls 19279->19280 19281 ee6d4e 19280->19281 19282 ee6d66 19281->19282 19283 ee6d53 CoInitialize 19281->19283 19284 ee6c0e 29 API calls 19282->19284 19283->19282 19285 ee6d6d 19284->19285 19286 f016a0 29 API calls 19285->19286 19287 ee6d79 19286->19287 19288 ee36c0 29 API calls 19287->19288 19300 ee6ec4 19287->19300 19289 ee6d9d 19288->19289 19351 ee6c64 19289->19351 19292 f016a0 29 API calls 19293 ee6de4 19292->19293 19294 ee6e52 CoGetClassObject 19293->19294 19296 ee6def 19293->19296 19294->19296 19295 ee379b 29 API calls 19297 ee6dfa 19295->19297 19296->19295 19296->19300 19363 ee6cd8 19297->19363 19300->18805 19308 f016a0 29 API calls 19307->19308 19309 ee7356 19308->19309 19310 ee736e 19309->19310 19311 ee735b CoInitialize 19309->19311 19312 ee6150 30 API calls 19310->19312 19311->19310 19313 ee7377 19312->19313 19314 f016a0 29 API calls 19313->19314 19315 ee7383 19314->19315 19316 ee73df 19315->19316 19317 ee36c0 29 API calls 19315->19317 19316->18831 19316->18832 19318 ee7399 19317->19318 19318->19316 19319 ee5c7f 31 API calls 19318->19319 19320 ee73b0 19319->19320 19320->19316 19340 ee6c20 19339->19340 19341 f016a0 29 API calls 19340->19341 19342 ee6c32 19340->19342 19341->19342 19342->18867 19347 f016a0 29 API calls 19346->19347 19348 ee300f 19347->19348 19349 ee2ec6 42 API calls 19348->19349 19350 ee3022 19349->19350 19350->18817 19352 f016a0 29 API calls 19351->19352 19353 ee6c7f 19352->19353 19354 ee6c9e 19353->19354 19355 ee6c8e 19353->19355 19356 ee5d36 44 API calls 19354->19356 19387 ee5d36 19355->19387 19358 ee6ca3 19356->19358 19361 ee6caa CLSIDFromString 19358->19361 19362 ee6c9a 19358->19362 19360 ee6cbc CLSIDFromProgID 19360->19362 19361->19362 19362->19292 19362->19300 19364 ee36c0 29 API calls 19363->19364 19365 ee6cee 19364->19365 19366 ee3ef1 29 API calls 19365->19366 19367 ee6d0f 19366->19367 19424 ee5c7f 19387->19424 19390 f016a0 29 API calls 19391 ee5d5c 19390->19391 19392 ee5e03 19391->19392 19393 f016a0 29 API calls 19391->19393 19392->19360 19392->19362 19394 ee5d79 19393->19394 19395 ee5daa 19394->19395 19396 ee5d81 19394->19396 19434 ee33bb 19395->19434 19397 f016a0 29 API calls 19396->19397 19403 ee5d8d 19397->19403 19403->19392 19425 ee5c91 19424->19425 19426 f016a0 29 API calls 19425->19426 19427 ee5ca2 19426->19427 19428 ee5d28 19427->19428 19429 ee5ca9 MultiByteToWideChar 19427->19429 19428->19390 19457 ee5c6f 19429->19457 19432 ee5c3d 29 API calls 19433 ee5cf5 MultiByteToWideChar 19432->19433 19433->19428 19435 ee33cd 19434->19435 19460 ee3684 19457->19460 19461 ee369a 19460->19461 19462 ee36a6 19461->19462 19463 ee345e 29 API calls 19461->19463 19462->19428 19462->19432 19463->19462 19821 ee36c0 29 API calls 19820->19821 19822 ee36f0 19821->19822 19822->18994 19822->18995 19824 efa383 19823->19824 19825 ee2c92 42 API calls 19824->19825 19992 ee3aa7 19991->19992 19993 ee379b 29 API calls 19992->19993 19994 ee3aba 19992->19994 19996 ee3ad4 19993->19996 19997 ee18dc strlen 19994->19997 19995 ee3afb 19995->19994 19998 ee3d7d 19995->19998 20004 ee27f2 29 API calls 19995->20004 19996->19995 19999 ee37db 42 API calls 19996->19999 20006 ee3877 42 API calls 19996->20006 20007 ee399a 42 API calls 19996->20007 20000 ee3d1e 19997->20000 19998->19998 19999->19996 20001 ee3d47 20000->20001 20002 ee18dc strlen 20000->20002 20008 ee3025 MessageBoxA 20001->20008 20002->20001 20004->19994 20005 ee3d6b 20005->19251 20006->19996 20007->19996 20008->20005 20095 ee1207 _initterm 20096 ee1218 20095->20096 20097 ee1222 _initterm 20096->20097 20099 ee1240 20096->20099 20097->20099 20111 efac8e 20099->20111 20100 ee128c 20101 ee12b3 __p__acmdln 20100->20101 20104 ee12cd 20101->20104 20115 ee14b1 malloc 20104->20115 20106 ee1366 20107 ee13af 20106->20107 20108 ee13a2 exit 20106->20108 20109 ee13bd 20107->20109 20110 ee13b8 _cexit 20107->20110 20108->20107 20110->20109 20112 efaca1 20111->20112 20114 efad1e 20111->20114 20123 efaa54 20112->20123 20114->20100 20116 ee1552 20115->20116 20117 ee14dd strlen malloc memcpy 20116->20117 20118 ee1361 20116->20118 20117->20116 20119 efa4dc 20118->20119 20120 efa4eb 20119->20120 20121 efa4fa 20119->20121 20154 efa47d 20120->20154 20121->20106 20124 efaaf8 20123->20124 20125 efaa73 20123->20125 20124->20114 20126 efaaad 20125->20126 20127 efaafd 20125->20127 20126->20124 20133 efaa1f 20126->20133 20131 efab1e 20127->20131 20138 efa6b8 20127->20138 20130 efa6b8 3 API calls 20130->20131 20131->20124 20131->20130 20132 efaa1f fwrite vfprintf abort memcpy 20131->20132 20132->20131 20134 efaa2b 20133->20134 20135 efaa51 20133->20135 20144 efa718 20134->20144 20135->20126 20152 f00fd4 20138->20152 20140 efa6d1 fwrite 20153 f00fd4 20140->20153 20142 efa700 vfprintf abort 20143 efa718 20142->20143 20143->20131 20146 efa729 20144->20146 20145 efa958 memcpy 20145->20135 20146->20145 20147 efa6b8 3 API calls 20146->20147 20148 efa7b9 20146->20148 20147->20148 20149 efa6b8 3 API calls 20148->20149 20150 efa882 20148->20150 20149->20150 20150->20145 20151 efa6b8 3 API calls 20150->20151 20151->20145 20152->20140 20153->20142 20155 efa491 20154->20155 20158 ee157d _onexit 20155->20158 20159 ee1592 20158->20159 20159->20121 20320 ef4a1d 20360 ee2779 20320->20360 20322 ef4a22 20366 ee3f9a EnterCriticalSection 20322->20366 20325 ef49fe 20326 ee360d strlen 20325->20326 20342 ef4a16 20325->20342 20328 ef4a05 20326->20328 20327 ee27f2 29 API calls 20327->20325 20331 ee360d strlen 20328->20331 20328->20342 20329 ee2812 29 API calls 20330 ef4c6d 20329->20330 20332 ef4cc3 20330->20332 20334 ee2812 29 API calls 20330->20334 20333 ef4a61 20331->20333 20336 ee360d strlen 20333->20336 20333->20342 20335 ef4c8c 20334->20335 20335->20332 20338 ee2812 29 API calls 20335->20338 20337 ef4a81 20336->20337 20339 ef4a96 CreateProcessW GetLastError 20337->20339 20337->20342 20343 ef4cab 20338->20343 20340 ef4b1b 20339->20340 20339->20342 20341 ef4b24 20340->20341 20375 ee828c 20340->20375 20341->20342 20346 ef4b76 20341->20346 20348 ee82c3 31 API calls 20341->20348 20342->20329 20343->20332 20347 ee27f2 29 API calls 20343->20347 20346->20342 20349 ef4bb9 20346->20349 20352 ef4b88 20346->20352 20347->20332 20348->20346 20351 ee379b 29 API calls 20349->20351 20350 ee828c 31 API calls 20353 ef4b46 20350->20353 20356 ef4bc7 20351->20356 20354 ee4b85 44 API calls 20352->20354 20353->20341 20353->20342 20355 ee828c 31 API calls 20353->20355 20354->20342 20355->20341 20357 ee4b85 44 API calls 20356->20357 20358 ef4c1d 20357->20358 20358->20342 20359 ee27f2 29 API calls 20358->20359 20359->20342 20361 ee2791 20360->20361 20362 ee27bf 20361->20362 20363 ee18dc strlen 20361->20363 20362->20322 20364 ee27a4 20363->20364 20364->20362 20365 ee25a2 29 API calls 20364->20365 20365->20362 20369 ee3fbb 20366->20369 20367 f016a0 29 API calls 20367->20369 20368 ee402c fputc 20368->20369 20369->20367 20369->20368 20370 ef21e8 fputc _errno _lock _unlock 20369->20370 20371 ee40b4 20369->20371 20372 ee4066 fwrite 20369->20372 20370->20369 20371->20325 20371->20327 20374 ee409e fflush LeaveCriticalSection 20372->20374 20374->20371 20376 ee829c 20375->20376 20377 ee82ad 20375->20377 20378 ee81ec 31 API calls 20376->20378 20377->20342 20377->20350 20379 ee82a1 20378->20379 20380 f016a0 29 API calls 20379->20380 20380->20377
                        APIs
                          • Part of subcall function 00EE5C7F: MultiByteToWideChar.KERNEL32 ref: 00EE5CD0
                          • Part of subcall function 00EE5C7F: MultiByteToWideChar.KERNEL32 ref: 00EE5D17
                        • CoInitialize.OLE32 ref: 00EF4FE0
                        • SysFreeString.OLEAUT32 ref: 00EF5050
                        • SysFreeString.OLEAUT32 ref: 00EF509A
                        • VariantClear.OLEAUT32 ref: 00EF5364
                        • SysFreeString.OLEAUT32(00000000), ref: 00EF547C
                        • SysFreeString.OLEAUT32 ref: 00EF5489
                        • SysFreeString.OLEAUT32 ref: 00EF5496
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: FreeString$ByteCharMultiWide$ClearInitializeVariant
                        • String ID: $COMError$COMException$com.nim$invoke
                        • API String ID: 3707380375-1182642905
                        • Opcode ID: fa8c2274e2409aea218da3172d8ed092a0850b6d255d4713282fdea9902eb308
                        • Instruction ID: 2cff1fd8f11a0494dfe7722656add0434a64e58991133ac696f0aa55c75ab584
                        • Opcode Fuzzy Hash: fa8c2274e2409aea218da3172d8ed092a0850b6d255d4713282fdea9902eb308
                        • Instruction Fuzzy Hash: 736286B190476D8FDB21DF68C8847ADBBF1BF55304F149199E688AB342DB709885CF82
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID:
                        • String ID: -$JsonError$ValueError$fromHex$jsony.nim$parseHook$parseObjectInner$strutils.nim
                        • API String ID: 0-130352387
                        • Opcode ID: 162e8df1d9234f3955f97b0c36f1da2db6a3c0e7050b9c64befd089fdb95a520
                        • Instruction ID: e2d2123e1bc4e9e7a09bf80a96efcdf7d547befe082f05249219950175e06944
                        • Opcode Fuzzy Hash: 162e8df1d9234f3955f97b0c36f1da2db6a3c0e7050b9c64befd089fdb95a520
                        • Instruction Fuzzy Hash: BFD237B0A042AD8FDB60DF14C8807A9B7F1AF45308F0490E9E689B7252DB749EC5DF59
                        APIs
                        • CoInitialize.OLE32 ref: 00EEAFED
                        • GetActiveObject.OLEAUT32 ref: 00EEB0EA
                        • CoCreateInstance.COMBASE ref: 00EEB124
                        • CoGetObject.OLE32 ref: 00EEB23E
                          • Part of subcall function 00EE74EF: VariantClear.OLEAUT32 ref: 00EE751A
                        • SysFreeString.OLEAUT32 ref: 00EEB6AE
                        • VariantClear.OLEAUT32 ref: 00EEBA77
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: ClearObjectVariant$ActiveCreateFreeInitializeInstanceString
                        • String ID: COMError$GetAV$GetObject$com.nim
                        • API String ID: 1187925771-4142695778
                        • Opcode ID: 4a135afc53281e1a1b55605063c1fb384fba871e1b780dad30fa4af6b0a88ee2
                        • Instruction ID: 7a1f9f64528da87d038f6d945fbd7003de562d953008f5bc1687d00f91442f00
                        • Opcode Fuzzy Hash: 4a135afc53281e1a1b55605063c1fb384fba871e1b780dad30fa4af6b0a88ee2
                        • Instruction Fuzzy Hash: B0827B70D0439C8FDF21AF66C89079EBBF1AF56304F149099E498AB356DB748885DF82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1798 f016a0-f016b0 1799 f016f0-f016ff call f030f4 1798->1799 1800 f016b2-f016c3 call f034a7 1798->1800 1803 f01704-f01715 call f01b64 1799->1803 1806 f01730-f0174a calloc 1800->1806 1807 f016c5-f016c9 1800->1807 1816 f01868-f01879 1803->1816 1817 f0171b-f01727 call f01c0d 1803->1817 1810 f01750-f0176c call f03527 1806->1810 1811 f0b655-f0b65e abort 1806->1811 1808 f017d0-f017f6 realloc 1807->1808 1809 f016cf-f016d8 1807->1809 1808->1811 1818 f017fc-f01830 memset call f03527 1808->1818 1813 f01778-f01781 1809->1813 1814 f016de-f016e7 1809->1814 1810->1814 1826 f01772 1810->1826 1820 f01787-f01798 malloc 1813->1820 1821 f01838-f0184a malloc 1813->1821 1817->1800 1818->1821 1820->1811 1827 f0179e-f017a4 1820->1827 1821->1811 1825 f01850-f0185f 1821->1825 1825->1816 1829 f017a7-f017b0 1825->1829 1826->1813 1827->1829 1830 f01880-f01890 memset 1829->1830 1831 f017b6-f017bd memcpy 1829->1831 1832 f017c2-f017cf 1830->1832 1831->1832
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4ce04eeea5b3d0211f5ce340a8df32c2575fa21cac55e78b94e201d4b81fc630
                        • Instruction ID: b379337ff6764faebde9ace538639f2568fc6f839b1cefe3824569e686f05c2a
                        • Opcode Fuzzy Hash: 4ce04eeea5b3d0211f5ce340a8df32c2575fa21cac55e78b94e201d4b81fc630
                        • Instruction Fuzzy Hash: 6C516E71A097058FC710EF65C98465AB7E5FF84350F06892DE8888B381EB35E945FB82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2000 ee1148-ee1220 _amsg_exit 2006 ee1222-ee1236 _initterm 2000->2006 2007 ee1240-ee1244 2000->2007 2006->2007 2008 ee125d-ee1264 2007->2008 2009 ee1246-ee125c 2007->2009 2010 ee1266-ee1284 2008->2010 2011 ee1287-ee12cb call efac8e call f00fe8 call efa6b0 __p__acmdln 2008->2011 2009->2008 2010->2011 2020 ee12cd 2011->2020 2021 ee1326-ee132d 2011->2021 2024 ee12ea-ee12f2 2020->2024 2022 ee132f-ee1337 2021->2022 2023 ee134c-ee1361 call ee14b1 call efa4dc 2021->2023 2025 ee1339-ee1340 2022->2025 2026 ee1342 2022->2026 2041 ee1366-ee138f call efa404 2023->2041 2028 ee12cf-ee12d7 2024->2028 2029 ee12f4-ee12fc 2024->2029 2032 ee1347 2025->2032 2026->2032 2030 ee12d9-ee12e3 2028->2030 2031 ee12e6 2028->2031 2034 ee12fe-ee1302 2029->2034 2035 ee130a-ee1312 2029->2035 2030->2031 2031->2024 2032->2023 2034->2028 2039 ee1304 2034->2039 2036 ee131e-ee1321 2035->2036 2037 ee1314-ee131c 2035->2037 2036->2021 2037->2036 2040 ee1306 2037->2040 2039->2035 2040->2035 2043 ee1394-ee13a0 2041->2043 2044 ee13af-ee13b6 2043->2044 2045 ee13a2-ee13aa exit 2043->2045 2046 ee13bd-ee13c9 2044->2046 2047 ee13b8 _cexit 2044->2047 2045->2044 2047->2046
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: __p__acmdln_amsg_exit_cexit_inittermexit
                        • String ID:
                        • API String ID: 3774341475-0
                        • Opcode ID: f4650fc7d9ad1c2828f06ddf1688dc214714c51b1270547abfaa556f845f7e34
                        • Instruction ID: ca04abef2a50adcfdb76d1d01d9833e0f145ee653fc7af2ddda1194f295e7cc7
                        • Opcode Fuzzy Hash: f4650fc7d9ad1c2828f06ddf1688dc214714c51b1270547abfaa556f845f7e34
                        • Instruction Fuzzy Hash: 2A615BB0A0428CCFCB50DFA5D9847ADBBF0FB09348F119499E854AB361C7749985EF51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2048 ee1189-ee1220 _amsg_exit 2052 ee1222-ee1236 _initterm 2048->2052 2053 ee1240-ee1244 2048->2053 2052->2053 2054 ee125d-ee1264 2053->2054 2055 ee1246-ee125c 2053->2055 2056 ee1266-ee1284 2054->2056 2057 ee1287-ee12cb call efac8e call f00fe8 call efa6b0 __p__acmdln 2054->2057 2055->2054 2056->2057 2066 ee12cd 2057->2066 2067 ee1326-ee132d 2057->2067 2070 ee12ea-ee12f2 2066->2070 2068 ee132f-ee1337 2067->2068 2069 ee134c-ee1361 call ee14b1 call efa4dc 2067->2069 2071 ee1339-ee1340 2068->2071 2072 ee1342 2068->2072 2087 ee1366-ee138f call efa404 2069->2087 2074 ee12cf-ee12d7 2070->2074 2075 ee12f4-ee12fc 2070->2075 2078 ee1347 2071->2078 2072->2078 2076 ee12d9-ee12e3 2074->2076 2077 ee12e6 2074->2077 2080 ee12fe-ee1302 2075->2080 2081 ee130a-ee1312 2075->2081 2076->2077 2077->2070 2078->2069 2080->2074 2085 ee1304 2080->2085 2082 ee131e-ee1321 2081->2082 2083 ee1314-ee131c 2081->2083 2082->2067 2083->2082 2086 ee1306 2083->2086 2085->2081 2086->2081 2089 ee1394-ee13a0 2087->2089 2090 ee13af-ee13b6 2089->2090 2091 ee13a2-ee13aa exit 2089->2091 2092 ee13bd-ee13c9 2090->2092 2093 ee13b8 _cexit 2090->2093 2091->2090 2093->2092
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: __p__acmdln_amsg_exit_cexit_inittermexit
                        • String ID:
                        • API String ID: 3774341475-0
                        • Opcode ID: 394bbd5e45a06170c969ee34080854a7192dd31e319ea88b3c754fb2aa96abcd
                        • Instruction ID: 9b60b7b2f056525f51793f530d24ec92335d7a31d1a87a913cca231561f8afb9
                        • Opcode Fuzzy Hash: 394bbd5e45a06170c969ee34080854a7192dd31e319ea88b3c754fb2aa96abcd
                        • Instruction Fuzzy Hash: 94417F7090428CCFCB40DF95D9807ADBBF0BB44344F029499E894AB361CB74C985FB52

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2094 ee1207-ee1220 _initterm 2096 ee1222-ee1236 _initterm 2094->2096 2097 ee1240-ee1244 2094->2097 2096->2097 2098 ee125d-ee1264 2097->2098 2099 ee1246-ee125c 2097->2099 2100 ee1266-ee1284 2098->2100 2101 ee1287-ee12cb call efac8e call f00fe8 call efa6b0 __p__acmdln 2098->2101 2099->2098 2100->2101 2110 ee12cd 2101->2110 2111 ee1326-ee132d 2101->2111 2114 ee12ea-ee12f2 2110->2114 2112 ee132f-ee1337 2111->2112 2113 ee134c-ee138f call ee14b1 call efa4dc call efa404 2111->2113 2115 ee1339-ee1340 2112->2115 2116 ee1342 2112->2116 2133 ee1394-ee13a0 2113->2133 2118 ee12cf-ee12d7 2114->2118 2119 ee12f4-ee12fc 2114->2119 2122 ee1347 2115->2122 2116->2122 2120 ee12d9-ee12e3 2118->2120 2121 ee12e6 2118->2121 2124 ee12fe-ee1302 2119->2124 2125 ee130a-ee1312 2119->2125 2120->2121 2121->2114 2122->2113 2124->2118 2129 ee1304 2124->2129 2126 ee131e-ee1321 2125->2126 2127 ee1314-ee131c 2125->2127 2126->2111 2127->2126 2130 ee1306 2127->2130 2129->2125 2130->2125 2134 ee13af-ee13b6 2133->2134 2135 ee13a2-ee13aa exit 2133->2135 2136 ee13bd-ee13c9 2134->2136 2137 ee13b8 _cexit 2134->2137 2135->2134 2137->2136
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: _initterm$__p__acmdln_cexitexit
                        • String ID:
                        • API String ID: 1163873781-0
                        • Opcode ID: f92cd0675a8fb70306be47a059a1cd3fb90ea16460b1f0a69d832ff1a4932d54
                        • Instruction ID: 4689a5f0d32f06aec3f7e59836bdfe4b2733372f592077f8ea4212f7483abdbc
                        • Opcode Fuzzy Hash: f92cd0675a8fb70306be47a059a1cd3fb90ea16460b1f0a69d832ff1a4932d54
                        • Instruction Fuzzy Hash: 19417F7090428CCFCB50DF65DA817ADBBF1BB48344F029499E894AB361CB74D985FB52

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2194 ee9cad-ee9d15 call ee193d call ee833a call f016a0 2201 ee9d1b-ee9d40 call ee833a 2194->2201 2202 eea2e4-eea319 2194->2202 2207 eea31e-eea34c 2201->2207 2208 ee9d46-ee9daf call ee379b call ee1b43 * 4 call ee833a 2201->2208 2203 eea3ab-eea3b2 2202->2203 2206 eea3b9-eea3cf call ee44a5 2203->2206 2213 eea3de-eea3e0 2206->2213 2214 eea3d1-eea3d5 2206->2214 2207->2203 2258 eea34e-eea36e 2208->2258 2259 ee9db5-ee9dd3 call ee833a 2208->2259 2217 eea3ef-eea3f3 2213->2217 2218 eea3e2-eea3e6 2213->2218 2214->2213 2216 eea3d7-eea3d9 call ee27f2 2214->2216 2216->2213 2220 eea40b-eea40f 2217->2220 2221 eea3f5-eea401 2217->2221 2218->2217 2219 eea3e8-eea3ea call ee27f2 2218->2219 2219->2217 2226 eea427-eea42b 2220->2226 2227 eea411-eea41d 2220->2227 2221->2220 2225 eea403-eea406 call ee27f2 2221->2225 2225->2220 2231 eea42d-eea439 2226->2231 2232 eea443-eea447 2226->2232 2227->2226 2230 eea41f-eea422 call ee27f2 2227->2230 2230->2226 2231->2232 2235 eea43b-eea43e call ee27f2 2231->2235 2236 eea45f-eea463 2232->2236 2237 eea449-eea455 2232->2237 2235->2232 2241 eea47b-eea47f 2236->2241 2242 eea465-eea471 2236->2242 2237->2236 2239 eea457-eea45a call ee27f2 2237->2239 2239->2236 2247 eea497-eea4ac call ee2dae 2241->2247 2248 eea481-eea48d 2241->2248 2242->2241 2246 eea473 2242->2246 2250 eea476 call ee27f2 2246->2250 2248->2247 2251 eea48f-eea492 call ee27f2 2248->2251 2250->2241 2251->2247 2258->2203 2262 ee9dd9-ee9e35 call ee193d call ef40fd 2259->2262 2263 eea370-eea389 2259->2263 2268 eea04c-eea053 2262->2268 2269 ee9e3b-ee9e46 2262->2269 2263->2203 2270 eea055-eea05a 2268->2270 2271 ee9e7a-ee9e8c call efa378 2269->2271 2272 ee9e48-ee9e53 call ee36da 2269->2272 2274 eea05c-eea060 2270->2274 2275 eea067-eea098 call ee40bc * 3 2270->2275 2285 ee9e8d-ee9e98 2271->2285 2282 ee9e5e-ee9e70 call ee2c92 2272->2282 2283 ee9e55-ee9e5c call ee40bc 2272->2283 2274->2275 2277 eea062 call ee27f2 2274->2277 2275->2263 2307 eea09e-eea0e1 call ef1efe 2275->2307 2277->2275 2282->2271 2296 ee9e72-ee9e75 call ee2dc1 2282->2296 2283->2285 2285->2270 2289 ee9e9e-ee9ea2 2285->2289 2293 ee9eb7-ee9ec3 call ee40db 2289->2293 2294 ee9ea4-ee9eb0 call ee40db 2289->2294 2305 ee9edb-ee9ee5 call ee40bc 2293->2305 2306 ee9ec5-ee9ed8 2293->2306 2303 ee9eec-ee9ef6 call ee17a0 2294->2303 2304 ee9eb2 2294->2304 2296->2271 2303->2270 2318 ee9efc-ee9f1e call ee379b 2303->2318 2304->2270 2305->2294 2315 ee9ee7 2305->2315 2306->2305 2316 eea38b-eea39b 2307->2316 2317 eea0e7-eea101 call ee833a 2307->2317 2315->2270 2316->2203 2324 eea39d-eea3a4 2317->2324 2325 eea107-eea13e call ef1f83 2317->2325 2323 ee9f21-ee9f29 2318->2323 2327 ee9f2b 2323->2327 2328 ee9f74-ee9f7c 2323->2328 2324->2203 2325->2203 2331 eea144-eea148 2325->2331 2330 ee9f32-ee9f3d call ee18a1 2327->2330 2336 ee9f80-ee9f83 2328->2336 2340 ee9f7e 2330->2340 2341 ee9f3f-ee9f41 2330->2341 2334 eea14f-eea186 call ee3719 2331->2334 2335 eea14a-eea14c 2331->2335 2348 eea18c-eea1c8 call ef1efe 2334->2348 2349 eea2b8-eea2bf 2334->2349 2335->2334 2336->2270 2339 ee9f89-ee9f8b 2336->2339 2343 ee9f8d-ee9f91 2339->2343 2344 ee9ffb-eea034 call ee37db call ee1b43 call ee37db call ee1b43 2339->2344 2340->2336 2345 ee9f4b-ee9f4e call ee18a1 2341->2345 2346 ee9f43-ee9f45 2341->2346 2350 ee9f93-ee9fb4 WaitForSingleObject 2343->2350 2351 ee9ff1 2343->2351 2344->2323 2360 ee9f53-ee9f58 2345->2360 2352 ee9f5a-ee9f5c 2346->2352 2353 ee9f47-ee9f49 2346->2353 2359 eea2c6-eea2c8 2348->2359 2372 eea1ce-eea1d0 2348->2372 2349->2359 2357 ee9fb6-ee9fde GetExitCodeProcess call ee8235 2350->2357 2358 ee9ff4-ee9ff7 2350->2358 2351->2358 2361 ee9f5e-ee9f69 call ee3877 2352->2361 2362 ee9f6b-ee9f72 2352->2362 2353->2336 2374 ee9fe3-ee9fef 2357->2374 2367 eea039-eea03d 2358->2367 2368 ee9ff9 2358->2368 2359->2206 2366 eea2ce-eea2d2 2359->2366 2360->2336 2361->2330 2362->2336 2366->2206 2375 eea2d8-eea2df call ee27f2 2366->2375 2367->2323 2373 eea043-eea04a call ee82c3 2367->2373 2368->2270 2377 eea1df-eea1fb call ee44a5 2372->2377 2378 eea1d2-eea1d6 2372->2378 2373->2270 2374->2358 2375->2206 2389 eea1fd-eea201 2377->2389 2390 eea20a-eea20c 2377->2390 2378->2377 2383 eea1d8-eea1da call ee27f2 2378->2383 2383->2377 2389->2390 2392 eea203-eea205 call ee27f2 2389->2392 2393 eea20e-eea212 2390->2393 2394 eea21b-eea21f 2390->2394 2392->2390 2393->2394 2396 eea214-eea216 call ee27f2 2393->2396 2397 eea237-eea23b 2394->2397 2398 eea221-eea22d 2394->2398 2396->2394 2401 eea23d-eea249 2397->2401 2402 eea253-eea257 2397->2402 2398->2397 2400 eea22f-eea232 call ee27f2 2398->2400 2400->2397 2401->2402 2406 eea24b-eea24e call ee27f2 2401->2406 2403 eea26f-eea273 2402->2403 2404 eea259-eea265 2402->2404 2408 eea28b-eea292 2403->2408 2409 eea275-eea281 2403->2409 2404->2403 2407 eea267-eea26a call ee27f2 2404->2407 2406->2402 2407->2403 2408->2241 2413 eea298-eea2a7 2408->2413 2409->2408 2412 eea283-eea286 call ee27f2 2409->2412 2412->2408 2413->2241 2415 eea2ad-eea2b3 2413->2415 2415->2250
                        APIs
                        • WaitForSingleObject.KERNEL32 ref: 00EE9FA1
                        • GetExitCodeProcess.KERNELBASE ref: 00EE9FCA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: CodeExitObjectProcessSingleWait
                        • String ID: D
                        • API String ID: 1680577353-2746444292
                        • Opcode ID: 7834761ca93e310d57ec43d371a6e7913b6d639fab413df3cd0c8db712862868
                        • Instruction ID: c9247f4298294d217eef209494abb4146b9393d321e5a43f42c01f75c4193ff9
                        • Opcode Fuzzy Hash: 7834761ca93e310d57ec43d371a6e7913b6d639fab413df3cd0c8db712862868
                        • Instruction Fuzzy Hash: F432F1B0E0429D8BEB20DFAAC49479DBBF1BF44304F14916EE455BB292E774A845CF42
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: _wgetenv
                        • String ID: @$@$kI,B
                        • API String ID: 1821490009-2128285436
                        • Opcode ID: 7f10f50fd89c76610adc572b0271114c4233139e4ae8d5fa4a6bbff4c8d957ff
                        • Instruction ID: 1b1ed0ba6e9e6c20087e3ba7563bef0d1cb1b0898803345f18842aa8dc83b7d6
                        • Opcode Fuzzy Hash: 7f10f50fd89c76610adc572b0271114c4233139e4ae8d5fa4a6bbff4c8d957ff
                        • Instruction Fuzzy Hash: E5233871A0026C8FDB64DF29C981B99B7F2BB89304F0591E9E54DA7362DB309E81CF51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 3071 ef587c-ef5899 call ee7341 3074 ef589b-ef58be call ee6150 3071->3074 3075 ef58c3-ef58f8 call ee7341 3071->3075 3082 ef5d21-ef5d69 3074->3082 3080 ef58fa-ef595b call ee6150 3075->3080 3081 ef5960-ef5982 call ee73eb 3075->3081 3084 ef5dd5 3080->3084 3090 ef5984-ef59db call ee6150 3081->3090 3091 ef59e0-ef5a2f call ee193d call ef56cb 3081->3091 3082->3084 3087 ef5ddf-ef5e06 call ee6150 3084->3087 3095 ef5e0c-ef5e0e 3087->3095 3096 ef6622-ef6652 call ee6150 3087->3096 3090->3084 3110 ef5a83-ef5aaf call ee833a 3091->3110 3111 ef5a31-ef5a7e call ee6150 3091->3111 3100 ef5e1d-ef5e31 call ee6150 3095->3100 3101 ef5e10-ef5e14 3095->3101 3114 ef6654-ef6666 3096->3114 3115 ef6673-ef6695 call ee6c0e 3096->3115 3100->3096 3116 ef5e37-ef5e4b call ee6150 3100->3116 3101->3100 3104 ef5e16-ef5e18 call ee27f2 3101->3104 3104->3100 3123 ef5d6b-ef5d83 3110->3123 3124 ef5ab5-ef5ae9 call ee193d call ee833a 3110->3124 3111->3084 3114->3115 3119 ef6668-ef666e call ee27f2 3114->3119 3134 ef6697-ef669b 3115->3134 3135 ef66a2-ef66a7 Sleep call f016a0 IsDebuggerPresent call ee2ffd 3115->3135 3116->3096 3127 ef5e51-ef5e53 3116->3127 3119->3115 3128 ef5d93-ef5db3 3123->3128 3148 ef5aef-ef5b0c call ee7341 3124->3148 3149 ef5d85-ef5d91 3124->3149 3131 ef5e55-ef5e59 3127->3131 3132 ef5e62-ef5e76 call ee6150 3127->3132 3128->3084 3131->3132 3137 ef5e5b-ef5e5d call ee27f2 3131->3137 3132->3096 3147 ef5e7c-ef5e83 3132->3147 3134->3135 3140 ef669d call ee27f2 3134->3140 3177 ef579f-ef5876 call ee3719 call ee833a call ee6d2d call ee833a call ee193d call ee833a 3135->3177 3178 ef5787-ef5791 3135->3178 3137->3132 3140->3135 3151 ef5e85-ef5e97 3147->3151 3152 ef5ea4-ef5eab 3147->3152 3162 ef5b0e-ef5b1d call ee6150 3148->3162 3163 ef5b22-ef5b4e call ee833a 3148->3163 3149->3128 3151->3152 3155 ef5e99-ef5e9f call ee27f2 3151->3155 3157 ef5ead-ef5ebf 3152->3157 3158 ef5ecc-ef5ee0 call ee6150 3152->3158 3155->3152 3157->3158 3164 ef5ec1-ef5ec7 call ee27f2 3157->3164 3158->3096 3171 ef5ee6-ef5efa call ee6150 3158->3171 3162->3128 3174 ef5db5-ef5db7 3163->3174 3175 ef5b54-ef5b71 call ee7341 3163->3175 3164->3158 3171->3096 3184 ef5f00-ef5f14 call ee6150 3171->3184 3181 ef5db9-ef5dcf 3174->3181 3186 ef5b85-ef5bda call ee193d call ef56cb 3175->3186 3187 ef5b73-ef5b80 call ee6150 3175->3187 3177->3071 3178->3177 3181->3084 3184->3096 3196 ef5f1a-ef5f2e call ee6150 3184->3196 3206 ef5bdc-ef5bf5 call ee6150 3186->3206 3207 ef5bfa-ef5c20 call ee833a 3186->3207 3187->3181 3196->3096 3205 ef5f34-ef5f3b 3196->3205 3210 ef5f3d-ef5f4f 3205->3210 3211 ef5f5c-ef5f63 3205->3211 3206->3084 3220 ef5c26-ef5c5a call ee193d call ee7341 3207->3220 3221 ef5dd1 3207->3221 3210->3211 3218 ef5f51-ef5f57 call ee27f2 3210->3218 3214 ef5f65-ef5f77 3211->3214 3215 ef5f84-ef5f94 3211->3215 3214->3215 3219 ef5f79-ef5f7f call ee27f2 3214->3219 3215->3096 3222 ef5f9a-ef67d2 call ee193d call ee833a call ee193d * 2 call ef56cb call ee6150 3215->3222 3218->3211 3219->3215 3239 ef5c5c-ef5c63 call ee6150 3220->3239 3240 ef5c68-ef5cbb call ee193d call ef56cb 3220->3240 3229 ef5dd3 3221->3229 3262 ef67d4-ef67d8 3222->3262 3263 ef67e1-ef67f3 call ee49a7 3222->3263 3229->3084 3239->3229 3240->3087 3252 ef5cc1-ef5ccc call ee6150 3240->3252 3252->3082 3252->3084 3262->3263 3264 ef67da-ef67dc call ee27f2 3262->3264 3268 ef67f5-ef6807 3263->3268 3269 ef6814-ef6828 call ee6150 3263->3269 3264->3263 3268->3269 3271 ef6809-ef680f call ee27f2 3268->3271 3269->3096 3274 ef682e-ef6835 3269->3274 3271->3269 3275 ef6837-ef6849 3274->3275 3276 ef6856-ef685d 3274->3276 3275->3276 3277 ef684b-ef6851 call ee27f2 3275->3277 3278 ef685f-ef6871 3276->3278 3279 ef687e-ef688c 3276->3279 3277->3276 3278->3279 3281 ef6873-ef6879 call ee27f2 3278->3281 3279->3096 3281->3279
                        APIs
                          • Part of subcall function 00EE7341: CoInitialize.OLE32(?), ref: 00EE7364
                          • Part of subcall function 00EE7341: SysAllocString.OLEAUT32(?), ref: 00EE73BF
                          • Part of subcall function 00EE6150: VariantClear.OLEAUT32 ref: 00EE6178
                        • Sleep.KERNELBASE ref: 00EF5734
                        • IsDebuggerPresent.KERNEL32(00000000), ref: 00EF5756
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: AllocClearDebuggerInitializePresentSleepStringVariant
                        • String ID:
                        • API String ID: 3378142341-0
                        • Opcode ID: 2d80728af3ff50a0d3662fb3510f193d98bad08914f1591e37c8770fbbc7ced5
                        • Instruction ID: c25f95106f5dd75713654e391da5c4911c48ce8e0ba3e74ff1d9227a64c919c6
                        • Opcode Fuzzy Hash: 2d80728af3ff50a0d3662fb3510f193d98bad08914f1591e37c8770fbbc7ced5
                        • Instruction Fuzzy Hash: B04227B0A052AC8FEB61DF25C8847A9B7F5BB45308F0150D9D24DAB252CB749E84CF19
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID: 3}>f$;eD0
                        • API String ID: 2538663250-262806450
                        • Opcode ID: 446ed0f31225ed0fd5e7af6281e3f9b7aff65258196479ba0f2d422b3af55310
                        • Instruction ID: 7a0bea95056506783c83e96ee87625ccf58cea8822ecd93c4755beaf59cd6cc9
                        • Opcode Fuzzy Hash: 446ed0f31225ed0fd5e7af6281e3f9b7aff65258196479ba0f2d422b3af55310
                        • Instruction Fuzzy Hash: 8462D5B0D052AD8FEB20DF66C89579EBBF1BF45308F10909AD059BB292DB744988CF51
                        APIs
                        • RtlAddVectoredExceptionHandler.NTDLL ref: 00F02917
                          • Part of subcall function 00F01DEF: free.MSVCRT ref: 00F01E32
                          • Part of subcall function 00F0278D: abort.MSVCRT ref: 00F02897
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: ExceptionHandlerVectoredabortfree
                        • String ID:
                        • API String ID: 3783204689-0
                        • Opcode ID: 4b29cae8477de989c47dc52f4962fb0ddff27b83ae639411492937703495a8a3
                        • Instruction ID: d6c235c51eb89e04cedc600b6b41d71a451b56d98554cbd8c0c659276728fe69
                        • Opcode Fuzzy Hash: 4b29cae8477de989c47dc52f4962fb0ddff27b83ae639411492937703495a8a3
                        • Instruction Fuzzy Hash: 4891B4B4E042099FDB40EFA8D989A9DB7F0FF44314F0184A9E8649B3A1D774EA44EF51
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: 5393bdc6653cc25a76e4d63f190dfee2ade705367fe9d59c23749794c3fb1cc9
                        • Instruction ID: e1bd68056f9ec0d3169f8310632f93dcb0edd5bf5efb77b7393b34ca28d95e27
                        • Opcode Fuzzy Hash: 5393bdc6653cc25a76e4d63f190dfee2ade705367fe9d59c23749794c3fb1cc9
                        • Instruction Fuzzy Hash: 7E62D2B0E042AD8FEB20DF66C99579DBBF1BB44308F10909AD05CBB292DB754988DF51
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID:
                        • String ID: -$-$JsonError$jsony.nim$parseHook
                        • API String ID: 0-2511633537
                        • Opcode ID: 5f5b9e9b618e0e12597be4ef532f88eb8cac4e0ba4be5ac4e270be252054ebe0
                        • Instruction ID: 2a6d3d56b4a8b64c94b788c64e748b7eeb933f4d25f3a8774b3a43b2881ee73c
                        • Opcode Fuzzy Hash: 5f5b9e9b618e0e12597be4ef532f88eb8cac4e0ba4be5ac4e270be252054ebe0
                        • Instruction Fuzzy Hash: 9F3238B0A042AD8FDB61DF19C8807A9B7F1BF41308F0190D9E648AB252CB749EC5DF59

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1833 ee79aa-ee79db call ee7489 call f016a0 1838 ee7d98-ee7da1 1833->1838 1839 ee79e1-ee79ea 1833->1839 1840 ee79ec-ee79f6 call ee771d 1839->1840 1841 ee7a01-ee7a47 call ee193d 1839->1841 1846 ee79fc 1840->1846 1847 ee7d10-ee7d64 call ee193d * 2 call ef4cd7 1840->1847 1851 ee7a49-ee7a4b 1841->1851 1852 ee7a50-ee7a66 call f016a0 1841->1852 1850 ee7d7e-ee7d8e call ee6c0e 1846->1850 1870 ee7d69-ee7d75 1847->1870 1860 ee7d95 1850->1860 1861 ee7d90-ee7d93 1850->1861 1855 ee7c1f-ee7c32 call ee6fb3 1851->1855 1852->1851 1864 ee7a68-ee7a6f 1852->1864 1868 ee7c38-ee7c3f 1855->1868 1869 ee7ce2-ee7ce5 1855->1869 1860->1838 1861->1860 1867 ee7a72-ee7a7a 1864->1867 1873 ee7c00 1867->1873 1874 ee7a80-ee7a82 1867->1874 1868->1869 1875 ee7c45-ee7ca4 call ee379b call ee1b43 * 2 call f016a0 call ee6cd8 1868->1875 1871 ee7ce7-ee7cf5 call ee60ed 1869->1871 1872 ee7d03-ee7d0b call ee60ed 1869->1872 1870->1850 1876 ee7d77-ee7d7c call ee6c0e 1870->1876 1871->1838 1888 ee7cfb-ee7cfe 1871->1888 1872->1838 1878 ee7c02-ee7c18 call ee75cb 1873->1878 1874->1873 1880 ee7a88-ee7aa7 1874->1880 1912 ee7cad-ee7cce call ee3db2 1875->1912 1913 ee7ca6-ee7cab call ee40bc 1875->1913 1876->1860 1878->1855 1892 ee7c1a-ee7c1d 1878->1892 1880->1873 1893 ee7aad-ee7ab4 1880->1893 1888->1838 1892->1855 1895 ee7abb-ee7ac2 1893->1895 1896 ee7ab6-ee7ab9 1893->1896 1899 ee7bdb-ee7bf1 call ee75b5 1895->1899 1900 ee7ac8-ee7af5 1895->1900 1896->1867 1899->1873 1906 ee7bf3-ee7bfa 1899->1906 1900->1899 1907 ee7afb-ee7b02 1900->1907 1906->1873 1906->1896 1907->1899 1909 ee7b08-ee7b20 call ee193d call ee61ab 1907->1909 1922 ee7b88-ee7b95 SysFreeString 1909->1922 1923 ee7b22-ee7b44 call ee75e1 1909->1923 1921 ee7cd1-ee7cd3 1912->1921 1913->1921 1921->1869 1924 ee7cd5-ee7cd9 1921->1924 1922->1899 1929 ee7b4d-ee7b6a call ee6f34 1923->1929 1930 ee7b46-ee7b4b call ee6150 1923->1930 1924->1869 1926 ee7cdb-ee7cdd call ee27f2 1924->1926 1926->1869 1929->1922 1935 ee7b6c-ee7b86 call ee496d 1929->1935 1930->1922 1935->1922 1938 ee7b97-ee7bbc SysFreeString call ee75b5 1935->1938 1938->1878 1941 ee7bbe-ee7bcc call ee75cb 1938->1941 1941->1855 1944 ee7bce-ee7bd6 call ee6fb3 1941->1944 1944->1869
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID:
                        • String ID: COMError$com.nim$getValue
                        • API String ID: 0-564522733
                        • Opcode ID: 1d8f3847387a94f55c27aa92007e59cf8d7798b48a650342cf0a44f2be15ac85
                        • Instruction ID: 6febd04b3afb7f05613926ae30e1e60b67f4e8b3c86141d9bb39caa68b3adf8b
                        • Opcode Fuzzy Hash: 1d8f3847387a94f55c27aa92007e59cf8d7798b48a650342cf0a44f2be15ac85
                        • Instruction Fuzzy Hash: 9FD11574D0829C9FDF11EFA5C8807ADBBF1AF5A300F249499E880BB356D7749845CB92

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1947 ee6d2d-ee6d51 call f016a0 1950 ee6d66-ee6d85 call ee6c0e call f016a0 1947->1950 1951 ee6d53-ee6d63 CoInitialize 1947->1951 1956 ee6d8b-ee6dd2 call ee36c0 call ee193d call ee6c64 1950->1956 1957 ee6f27-ee6f31 1950->1957 1951->1950 1956->1957 1964 ee6dd8-ee6ded call f016a0 1956->1964 1967 ee6def-ee6e42 call ee379b call ee1b43 * 2 call ee6cd8 1964->1967 1968 ee6e52-ee6e81 CoGetClassObject 1964->1968 1989 ee6e48-ee6e4d call ee40bc 1967->1989 1990 ee6ef2-ee6f13 call ee3db2 1967->1990 1968->1967 1969 ee6e87-ee6e8d 1968->1969 1971 ee6ece-ee6ee1 call ee60ed 1969->1971 1972 ee6e8f-ee6ea8 1969->1972 1971->1957 1979 ee6ee3-ee6eea 1971->1979 1977 ee6eae-ee6eb4 1972->1977 1977->1971 1980 ee6eb6-ee6eba 1977->1980 1979->1967 1982 ee6ef0 1979->1982 1980->1971 1983 ee6ebc-ee6ec2 1980->1983 1982->1957 1983->1971 1986 ee6ec4-ee6ecc call ee60ed 1983->1986 1986->1957 1996 ee6f16-ee6f18 1989->1996 1990->1996 1996->1957 1997 ee6f1a-ee6f1e 1996->1997 1997->1957 1998 ee6f20-ee6f22 call ee27f2 1997->1998 1998->1957
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: ClassInitializeObject
                        • String ID: COMError$CreateObject$com.nim
                        • API String ID: 2072964892-2591894477
                        • Opcode ID: 9fcbe6f9c9996e2b0bf0e6aab265961fd4fc2dedfebcd829f6d01f7a1480f155
                        • Instruction ID: 21e55ba116d2aa56e75ec6b0f87a235566739c6794d25deab380c8f9c9fd6b9a
                        • Opcode Fuzzy Hash: 9fcbe6f9c9996e2b0bf0e6aab265961fd4fc2dedfebcd829f6d01f7a1480f155
                        • Instruction Fuzzy Hash: 055179B4E042889FCB20EFA9D88479EBFF0BF55344F149469E490AB392D7749845DF42

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2138 ef47c7-ef47d0 call ee80e7 2140 ef47d5-ef47d8 2138->2140 2141 ef47da 2140->2141 2142 ef47f0-ef4814 SetHandleInformation 2140->2142 2143 ef47a4-ef47a6 2141->2143 2144 ef483a-ef4884 SetHandleInformation * 2 2142->2144 2145 ef4816-ef481e GetLastError 2142->2145 2147 ef4c4f-ef4c72 call ee2812 2143->2147 2151 ef476e-ef4920 call ee5767 2144->2151 2152 ef488a-ef48bd GetLastError 2144->2152 2145->2143 2146 ef4820-ef4834 call ee4b85 2145->2146 2146->2143 2146->2144 2158 ef4cc7-ef4cd4 2147->2158 2159 ef4c74-ef4c91 call ee2812 2147->2159 2167 ef4998-ef49a3 2151->2167 2168 ef4922-ef492b 2151->2168 2152->2143 2157 ef48c3-ef48d4 call ee4b85 2152->2157 2157->2147 2159->2158 2169 ef4c93-ef4cb0 call ee2812 2159->2169 2167->2147 2170 ef4931-ef4937 2168->2170 2169->2158 2176 ef4cb2-ef4cb4 2169->2176 2170->2167 2173 ef4939-ef4964 call ee3877 call ee5767 2170->2173 2173->2167 2184 ef4966-ef4982 call ee37db call ee1b43 2173->2184 2178 ef4cb6-ef4cba 2176->2178 2179 ef4cc3-ef4cc5 2176->2179 2178->2179 2181 ef4cbc-ef4cbe call ee27f2 2178->2181 2179->2158 2181->2179 2189 ef4989-ef498d 2184->2189 2190 ef4984-ef4987 2184->2190 2189->2190 2191 ef498f-ef4996 call ee27f2 2189->2191 2190->2170 2191->2190
                        APIs
                          • Part of subcall function 00EE80E7: CreatePipe.KERNELBASE ref: 00EE812B
                          • Part of subcall function 00EE80E7: GetLastError.KERNEL32 ref: 00EE8138
                        • SetHandleInformation.KERNEL32 ref: 00EF4809
                        • GetLastError.KERNEL32 ref: 00EF4816
                        • SetHandleInformation.KERNEL32 ref: 00EF4853
                        • SetHandleInformation.KERNEL32 ref: 00EF4879
                        • GetLastError.KERNEL32 ref: 00EF48B5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: ErrorHandleInformationLast$CreatePipe
                        • String ID:
                        • API String ID: 3790209225-0
                        • Opcode ID: c634105da2dfab1277af9d5442572d7a7c71fa2b0855c3dbf9111476096202b6
                        • Instruction ID: 15794071f63467de4f36412213cdc07c4bac76d6e4e073d1a808e5274e989f56
                        • Opcode Fuzzy Hash: c634105da2dfab1277af9d5442572d7a7c71fa2b0855c3dbf9111476096202b6
                        • Instruction Fuzzy Hash: B841A2B09043DD9FEB10AF65C944B7ABBF4AF44304F10A499E684632D2D7748C84DB12

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2926 ef49fe-ef4a14 call ee360d 2929 ef4a5a-ef4a70 call ee360d 2926->2929 2930 ef4a16 2926->2930 2931 ef4c4f-ef4c72 call ee2812 2929->2931 2936 ef4a76-ef4a90 call ee360d 2929->2936 2930->2931 2937 ef4cc7-ef4cd4 2931->2937 2938 ef4c74-ef4c91 call ee2812 2931->2938 2936->2931 2943 ef4a96-ef4b15 CreateProcessW GetLastError 2936->2943 2938->2937 2944 ef4c93-ef4cb0 call ee2812 2938->2944 2943->2931 2945 ef4b1b-ef4b22 2943->2945 2944->2937 2956 ef4cb2-ef4cb4 2944->2956 2947 ef4b2d-ef4b38 call ee828c 2945->2947 2948 ef4b24-ef4b26 2945->2948 2947->2931 2959 ef4b3e-ef4b49 call ee828c 2947->2959 2950 ef4b6a-ef4b74 2948->2950 2951 ef4b28 2948->2951 2954 ef4b76-ef4b7d 2950->2954 2955 ef4ba4-ef4bb2 call ee82c3 2950->2955 2957 ef4c33-ef4c4c 2951->2957 2960 ef4b7f-ef4b86 2954->2960 2961 ef4bb9-ef4c1f call ee379b call ee1b43 * 3 call ee4b85 2954->2961 2955->2954 2969 ef4bb4 2955->2969 2962 ef4cb6-ef4cba 2956->2962 2963 ef4cc3-ef4cc5 2956->2963 2957->2931 2959->2931 2974 ef4b4f-ef4b56 2959->2974 2960->2961 2967 ef4b88-ef4b9f call ee4b85 2960->2967 2979 ef4c2e-ef4c31 2961->2979 2989 ef4c21-ef4c25 2961->2989 2962->2963 2968 ef4cbc-ef4cbe call ee27f2 2962->2968 2963->2937 2967->2979 2968->2963 2969->2931 2974->2948 2977 ef4b58-ef4b63 call ee828c 2974->2977 2977->2948 2984 ef4b65 2977->2984 2979->2931 2979->2957 2984->2931 2989->2979 2990 ef4c27-ef4c29 call ee27f2 2989->2990 2990->2979
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: CreateErrorLastProcess
                        • String ID: W
                        • API String ID: 2919029540-655174618
                        • Opcode ID: fb58c6251675b0f3bbd94e839b5ee2ebbef8e86deae05d9194a688508f70bcbc
                        • Instruction ID: 9b665f2f4beeb2a9313e354488e915445230b2ed5c4d03e7c24054333c6b8ac8
                        • Opcode Fuzzy Hash: fb58c6251675b0f3bbd94e839b5ee2ebbef8e86deae05d9194a688508f70bcbc
                        • Instruction Fuzzy Hash: 967125B09053AE8FEB24DB65C940BAAFBF0AF44304F14A59AD54877292E7709E80CF41

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2992 ee1bba-ee1c0f call ee1b7f exit VirtualAlloc 2997 ee1c16-ee1c17 2992->2997 2998 ee1c11 call ee1bba 2992->2998 2998->2997
                        APIs
                          • Part of subcall function 00EE1B7F: strlen.MSVCRT ref: 00EE1B8E
                          • Part of subcall function 00EE1B7F: fwrite.MSVCRT ref: 00EE1BA6
                          • Part of subcall function 00EE1B7F: fflush.MSVCRT ref: 00EE1BAE
                        • exit.MSVCRT ref: 00EE1BDE
                        • VirtualAlloc.KERNELBASE ref: 00EE1C04
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: AllocVirtualexitfflushfwritestrlen
                        • String ID: out of memory
                        • API String ID: 3211969242-49810860
                        • Opcode ID: fe29da8184f7e646b92cbefa59fd76f4227ac7822c5d5dbfd29e612d8d3d2618
                        • Instruction ID: b44b9c86d80df2cec6ed252e4deb170f58bb898a19547fd7aa84611ebebc8d91
                        • Opcode Fuzzy Hash: fe29da8184f7e646b92cbefa59fd76f4227ac7822c5d5dbfd29e612d8d3d2618
                        • Instruction Fuzzy Hash: ABE012B04083489BE3007FB9C90A31DBEE8AB40304F41859CE9D457297EBB894849BD7

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 3000 f03841-f0387e call f02e02 3004 f03880-f03883 3000->3004 3005 f03888-f03897 call f02696 3000->3005 3006 f039d3-f039da 3004->3006 3009 f03899-f0389d 3005->3009 3010 f0389f-f038a4 3005->3010 3009->3010 3011 f038a9-f03974 call f0278d DuplicateHandle 3009->3011 3010->3006 3019 f03976 abort 3011->3019 3020 f0397b-f039c9 3011->3020 3019->3020 3023 f039d0 3020->3023 3024 f039cb abort 3020->3024 3023->3006 3024->3023
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 50a146a4ba82df3807d1d843970ce5279e777fc5fe7d246d4d672345109492a4
                        • Instruction ID: 3ae2f369fc226d1d19b0a9ccc90dc1a16eb078937f2a3bf5d97aa8cc2988cc7b
                        • Opcode Fuzzy Hash: 50a146a4ba82df3807d1d843970ce5279e777fc5fe7d246d4d672345109492a4
                        • Instruction Fuzzy Hash: CF41F8709042199FDB40EF68DD84B8EBBF4FF88314F018559E454AB3A1D3B89944EFA2

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 3025 f01729-f0174a calloc 3027 f01750-f0176c call f03527 3025->3027 3028 f0b655-f0b65e abort 3025->3028 3031 f01772-f01781 3027->3031 3032 f016de-f016e7 3027->3032 3034 f01787-f01798 malloc 3031->3034 3035 f01838-f0184a malloc 3031->3035 3034->3028 3037 f0179e-f017a4 3034->3037 3035->3028 3036 f01850-f0185f 3035->3036 3038 f017a7-f017b0 3036->3038 3039 f01868-f01879 3036->3039 3037->3038 3040 f01880-f01890 memset 3038->3040 3041 f017b6-f017bd memcpy 3038->3041 3042 f017c2-f017cf 3040->3042 3041->3042
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: malloc$abortcallocmemcpyrealloc
                        • String ID:
                        • API String ID: 3078593747-0
                        • Opcode ID: eea7d1e624b561c60a285b1d91812cd55cbebd9d8e049e89377b55826a0b0c04
                        • Instruction ID: 397a3b1b5ce6213ac22350219d1d19f95f06c18592d6c516c61e47f94a8f2f61
                        • Opcode Fuzzy Hash: eea7d1e624b561c60a285b1d91812cd55cbebd9d8e049e89377b55826a0b0c04
                        • Instruction Fuzzy Hash: E6113975A047068FDB10DF24C98425AB7E5FF88314F06C829E98D9B341EB31E906EF81

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 3043 f030f4-f03107 3044 f03113-f03117 3043->3044 3045 f03109-f0310e 3043->3045 3047 f03123-f03127 3044->3047 3048 f03119-f0311e 3044->3048 3046 f031f3-f031f7 3045->3046 3049 f03133-f03156 call f02c3f call f01b64 3047->3049 3050 f03129-f0312e 3047->3050 3048->3046 3055 f03158-f03165 call f03a4d 3049->3055 3056 f0319d-f031a5 3049->3056 3050->3046 3061 f0316a-f0319b call f03a4d * 2 3055->3061 3057 f031d5-f031ee call f01c0d call f02d01 3056->3057 3058 f031a7-f031d0 fprintf 3056->3058 3057->3046 3058->3057 3061->3057
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID:
                        • String ID: once %p is %d
                        • API String ID: 0-95064319
                        • Opcode ID: 99c4cd2b5d7880182126ca43da776fbf79b16a374b77022212d74a5a42693f80
                        • Instruction ID: 18d822569e281dbcdd609e98439b40ad928276e515f6875ead12f59f54daf8cd
                        • Opcode Fuzzy Hash: 99c4cd2b5d7880182126ca43da776fbf79b16a374b77022212d74a5a42693f80
                        • Instruction Fuzzy Hash: 9031A4B4A04209DFDB00EFA8C88579DBBF4FF49354F108819E8959B391D778DA80AF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 3284 ef65bc-ef65bf 3285 ef67c4-ef67d2 3284->3285 3286 ef6622-ef6652 call ee6150 3284->3286 3288 ef67d4-ef67d8 3285->3288 3289 ef67e1-ef67f3 call ee49a7 3285->3289 3296 ef6654-ef6666 3286->3296 3297 ef6673-ef6695 call ee6c0e 3286->3297 3288->3289 3291 ef67da-ef67dc call ee27f2 3288->3291 3298 ef67f5-ef6807 3289->3298 3299 ef6814-ef6828 call ee6150 3289->3299 3291->3289 3296->3297 3301 ef6668-ef666e call ee27f2 3296->3301 3312 ef6697-ef669b 3297->3312 3313 ef66a2-ef66a7 Sleep call f016a0 IsDebuggerPresent call ee2ffd 3297->3313 3298->3299 3303 ef6809-ef680f call ee27f2 3298->3303 3299->3286 3308 ef682e-ef6835 3299->3308 3301->3297 3303->3299 3310 ef6837-ef6849 3308->3310 3311 ef6856-ef685d 3308->3311 3310->3311 3315 ef684b-ef6851 call ee27f2 3310->3315 3316 ef685f-ef6871 3311->3316 3317 ef687e-ef688c 3311->3317 3312->3313 3318 ef669d call ee27f2 3312->3318 3331 ef579f-ef5899 call ee3719 call ee833a call ee6d2d call ee833a call ee193d call ee833a call ee7341 3313->3331 3332 ef5787-ef5791 3313->3332 3315->3311 3316->3317 3321 ef6873-ef6879 call ee27f2 3316->3321 3317->3286 3318->3313 3321->3317 3351 ef589b-ef58be call ee6150 3331->3351 3352 ef58c3-ef58f8 call ee7341 3331->3352 3332->3331 3359 ef5d21-ef5d69 3351->3359 3357 ef58fa-ef595b call ee6150 3352->3357 3358 ef5960-ef5982 call ee73eb 3352->3358 3361 ef5dd5 3357->3361 3367 ef5984-ef59db call ee6150 3358->3367 3368 ef59e0-ef5a2f call ee193d call ef56cb 3358->3368 3359->3361 3364 ef5ddf-ef5e06 call ee6150 3361->3364 3364->3286 3372 ef5e0c-ef5e0e 3364->3372 3367->3361 3383 ef5a83-ef5aaf call ee833a 3368->3383 3384 ef5a31-ef5a7e call ee6150 3368->3384 3375 ef5e1d-ef5e31 call ee6150 3372->3375 3376 ef5e10-ef5e14 3372->3376 3375->3286 3387 ef5e37-ef5e4b call ee6150 3375->3387 3376->3375 3378 ef5e16-ef5e18 call ee27f2 3376->3378 3378->3375 3392 ef5d6b-ef5d83 3383->3392 3393 ef5ab5-ef5ae9 call ee193d call ee833a 3383->3393 3384->3361 3387->3286 3394 ef5e51-ef5e53 3387->3394 3395 ef5d93-ef5db3 3392->3395 3407 ef5aef-ef5b0c call ee7341 3393->3407 3408 ef5d85-ef5d91 3393->3408 3397 ef5e55-ef5e59 3394->3397 3398 ef5e62-ef5e76 call ee6150 3394->3398 3395->3361 3397->3398 3400 ef5e5b-ef5e5d call ee27f2 3397->3400 3398->3286 3406 ef5e7c-ef5e83 3398->3406 3400->3398 3409 ef5e85-ef5e97 3406->3409 3410 ef5ea4-ef5eab 3406->3410 3418 ef5b0e-ef5b1d call ee6150 3407->3418 3419 ef5b22-ef5b4e call ee833a 3407->3419 3408->3395 3409->3410 3412 ef5e99-ef5e9f call ee27f2 3409->3412 3414 ef5ead-ef5ebf 3410->3414 3415 ef5ecc-ef5ee0 call ee6150 3410->3415 3412->3410 3414->3415 3420 ef5ec1-ef5ec7 call ee27f2 3414->3420 3415->3286 3426 ef5ee6-ef5efa call ee6150 3415->3426 3418->3395 3428 ef5db5-ef5db7 3419->3428 3429 ef5b54-ef5b71 call ee7341 3419->3429 3420->3415 3426->3286 3435 ef5f00-ef5f14 call ee6150 3426->3435 3433 ef5db9-ef5dcf 3428->3433 3436 ef5b85-ef5bda call ee193d call ef56cb 3429->3436 3437 ef5b73-ef5b80 call ee6150 3429->3437 3433->3361 3435->3286 3443 ef5f1a-ef5f2e call ee6150 3435->3443 3450 ef5bdc-ef5bf5 call ee6150 3436->3450 3451 ef5bfa-ef5c20 call ee833a 3436->3451 3437->3433 3443->3286 3449 ef5f34-ef5f3b 3443->3449 3453 ef5f3d-ef5f4f 3449->3453 3454 ef5f5c-ef5f63 3449->3454 3450->3361 3462 ef5c26-ef5c5a call ee193d call ee7341 3451->3462 3463 ef5dd1 3451->3463 3453->3454 3460 ef5f51-ef5f57 call ee27f2 3453->3460 3457 ef5f65-ef5f77 3454->3457 3458 ef5f84-ef5f94 3454->3458 3457->3458 3461 ef5f79-ef5f7f call ee27f2 3457->3461 3458->3286 3464 ef5f9a-ef67a4 call ee193d call ee833a call ee193d * 2 call ef56cb call ee6150 3458->3464 3460->3454 3461->3458 3476 ef5c5c-ef5c63 call ee6150 3462->3476 3477 ef5c68-ef5ca7 call ee193d call ef56cb 3462->3477 3469 ef5dd3 3463->3469 3464->3285 3469->3361 3476->3469 3487 ef5cac-ef5cbb 3477->3487 3487->3364 3489 ef5cc1-ef5ccc call ee6150 3487->3489 3489->3359 3489->3361
                        APIs
                        • Sleep.KERNELBASE ref: 00EF5734
                        • IsDebuggerPresent.KERNEL32(00000000), ref: 00EF5756
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: DebuggerPresentSleep
                        • String ID:
                        • API String ID: 598088951-0
                        • Opcode ID: 5472466e49daeaf35be27615e7ed844cab9c12da075525af4dbff230441bf022
                        • Instruction ID: 26d38146c8a5e3c284af8ae54d9627a8c1ea6b4368daa8131542d53e44670271
                        • Opcode Fuzzy Hash: 5472466e49daeaf35be27615e7ed844cab9c12da075525af4dbff230441bf022
                        • Instruction Fuzzy Hash: 7EF129B0A052AC8FEB61DB19C9807A8B7F5BF51308F0550D9E349BB252CB749E84CF19
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: AllocInitializeString
                        • String ID:
                        • API String ID: 3145325428-0
                        • Opcode ID: 312f8761f2a57aa0a06238da84f1cb50efbdf5415b926229bbe902760729eeb3
                        • Instruction ID: 36aa0d30a6c0bdc0e95b12c0c69b3645c0b7409a5e431a74d936bb0dca751af2
                        • Opcode Fuzzy Hash: 312f8761f2a57aa0a06238da84f1cb50efbdf5415b926229bbe902760729eeb3
                        • Instruction Fuzzy Hash: 0F11C2719082CE5BDB617FB6CC8475EBBD0AF01348F155169EAD05B382DBB94C40A7A2
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: ErrorFileLastRead
                        • String ID:
                        • API String ID: 1948546556-0
                        • Opcode ID: baec2f065d021a051a704794d8bb7c809266d99ca5928d5cc0ed3a2fd062640e
                        • Instruction ID: 74f269971acd09acec0d4f90d02dd3ccd4bec9029e2862d28c16c38a5c02eca5
                        • Opcode Fuzzy Hash: baec2f065d021a051a704794d8bb7c809266d99ca5928d5cc0ed3a2fd062640e
                        • Instruction Fuzzy Hash: 5B1191B0E093888FDB10DFBAD48479AFBF4BB48354F109569E94097381D7749845CF51
                        APIs
                        • CLSIDFromString.COMBASE ref: 00EE6CB4
                        • CLSIDFromProgID.COMBASE(?,?), ref: 00EE6CC6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: From$ProgString
                        • String ID:
                        • API String ID: 2510552579-0
                        • Opcode ID: 36f55850ca0040583fb4d5f76dc12e64e0a2e90e8aa4479df07050a2730aa28f
                        • Instruction ID: dfa1d0afb5dab99b6704c6f3e3a808bd7da048e78b0b31e4cbbfc713d132de1b
                        • Opcode Fuzzy Hash: 36f55850ca0040583fb4d5f76dc12e64e0a2e90e8aa4479df07050a2730aa28f
                        • Instruction Fuzzy Hash: 6C0184B1904788BFC7206F65CC44A9BFFE8EF99390F15981DF48453201D6319850DB62
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: CreateErrorLastPipe
                        • String ID:
                        • API String ID: 269057482-0
                        • Opcode ID: 5a6a5c0a9d082f3a12c93c1c9a4771cfc6fdecb4d7881387640d7f9662771005
                        • Instruction ID: 178e6fb723166bb7c939482e2b16dee3e3cc85cfe24fe101efdca0229b029ae1
                        • Opcode Fuzzy Hash: 5a6a5c0a9d082f3a12c93c1c9a4771cfc6fdecb4d7881387640d7f9662771005
                        • Instruction Fuzzy Hash: A301ADB0E043088FD700AFAADC8439EFBE8EF88354F008559E844A7253D7B988059F91
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: CloseErrorHandleLast
                        • String ID:
                        • API String ID: 918212764-0
                        • Opcode ID: 6e1c0ee68a3b1e2a0f5d2a11dfe10cde676a81673b30b8887594d88ffd64b8b5
                        • Instruction ID: 840fe8f09e03eb9455094fcdcdf8fb703a08e5698dee8459e23552e435bbf026
                        • Opcode Fuzzy Hash: 6e1c0ee68a3b1e2a0f5d2a11dfe10cde676a81673b30b8887594d88ffd64b8b5
                        • Instruction Fuzzy Hash: AFE092B0B0468E9BCB00EBBAD98565A77E86B0C398F401058D54557253DA78D840ABA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: _wgetenv
                        • String ID:
                        • API String ID: 1821490009-0
                        • Opcode ID: c40aff3743cf51801e2e0f5eee33ab69df8a9de092cdf0de815cd258723ae3ec
                        • Instruction ID: 70d73f40bf5b648155bdb602f8f4e0cb67d6d1364cf1ccfa006cb42ff860e7cb
                        • Opcode Fuzzy Hash: c40aff3743cf51801e2e0f5eee33ab69df8a9de092cdf0de815cd258723ae3ec
                        • Instruction Fuzzy Hash: 0F21F7B4D0064E9FCB04DFA5C591AAEBBF4BF84304F508429E855A7381D7749A41DFA1
                        APIs
                        • VirtualAlloc.KERNEL32 ref: 00EE20C6
                          • Part of subcall function 00EE1BE3: VirtualAlloc.KERNELBASE ref: 00EE1C04
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: a796819e2a77192243d73a8b65c0ad7f865077cea555e6b552f30407ca627de1
                        • Instruction ID: 43a0b36ec9ee0d018303614c43ecc870a96a62a55bcdf939d3c4e2fa8920bfd2
                        • Opcode Fuzzy Hash: a796819e2a77192243d73a8b65c0ad7f865077cea555e6b552f30407ca627de1
                        • Instruction Fuzzy Hash: E5417AB1A0424A8FC714CF6AC8847EABBE5AF84304F1881BDD948EF356EB75D941CB50
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: 0c1cd497257422dab046fa966501c695fddd575c205f598553eaa2d0776ed3cb
                        • Instruction ID: 31271c3ede1e05a150554c248e2d659cdfd0b1119467adf526b285f42609a97d
                        • Opcode Fuzzy Hash: 0c1cd497257422dab046fa966501c695fddd575c205f598553eaa2d0776ed3cb
                        • Instruction Fuzzy Hash: A2F0287290418C5BDF00AF75CC0039FBBE5EB85350F050428E284AB282CA796985A7A2
                        APIs
                        • VirtualAlloc.KERNELBASE ref: 00EE1C04
                          • Part of subcall function 00EE1BBA: exit.MSVCRT ref: 00EE1BDE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: AllocVirtualexit
                        • String ID:
                        • API String ID: 1690354023-0
                        • Opcode ID: 32f7111a7596cc0c58469adab2e2173bd28a086f53f59d60df61731950908aef
                        • Instruction ID: ab36736bc768018193c43e3b9efea70bd1c5086332b2d2b77821b581f5bb8da9
                        • Opcode Fuzzy Hash: 32f7111a7596cc0c58469adab2e2173bd28a086f53f59d60df61731950908aef
                        • Instruction Fuzzy Hash: A0D09EB05083459AE704BF79C51931ABEE49B40348F41859CD99596151F7B484848B97
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID:
                        • String ID: @$VariantConversionError$com.nim$toVariant$<V
                        • API String ID: 0-1035723416
                        • Opcode ID: 6b0017efc268166c910679e263ee5a85e7655079f400a47140f8b8aaa3078a65
                        • Instruction ID: 54793df7b8bf05a683f39b4fc4f18672d375cd190048939205ee25bd3faeada7
                        • Opcode Fuzzy Hash: 6b0017efc268166c910679e263ee5a85e7655079f400a47140f8b8aaa3078a65
                        • Instruction Fuzzy Hash: 7BF205B0E0429DCFEB20DFAAC49479EBBF0BF44308F149569E554AB292DBB49845CF41
                        APIs
                        • CreateNamedPipeW.KERNEL32 ref: 00EF4464
                        • GetLastError.KERNEL32 ref: 00EF4486
                        • CreateNamedPipeW.KERNEL32 ref: 00EF44E9
                        • GetLastError.KERNEL32 ref: 00EF44FB
                        • CreateFileW.KERNEL32 ref: 00EF455B
                        • GetLastError.KERNEL32 ref: 00EF4581
                        • CreateFileW.KERNEL32 ref: 00EF45DF
                        • GetLastError.KERNEL32 ref: 00EF4605
                          • Part of subcall function 00EE816B: GetCurrentProcess.KERNEL32 ref: 00EE817E
                          • Part of subcall function 00EE816B: DuplicateHandle.KERNEL32 ref: 00EE81AA
                          • Part of subcall function 00EE816B: GetLastError.KERNEL32 ref: 00EE81B7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: ErrorLast$Create$FileNamedPipe$CurrentDuplicateHandleProcess
                        • String ID:
                        • API String ID: 2980152811-3916222277
                        • Opcode ID: c1d64f9bd9967df1a1204b882c9daa992da6b298b2fe38fafefbd6a44b94ef60
                        • Instruction ID: cebd24d7926cc6e862c72c10af3a9f5911136804042273ab012dcd50d9e464bb
                        • Opcode Fuzzy Hash: c1d64f9bd9967df1a1204b882c9daa992da6b298b2fe38fafefbd6a44b94ef60
                        • Instruction Fuzzy Hash: 90126FB090429D8FEB20DF65C9847AEBBF0BF45304F10949AE589B7282E7749E85CF51
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: FileModuleNameexit
                        • String ID: @$CF3$IOError$syncio.nim$writeFile${3V2
                        • API String ID: 3381550187-2796672887
                        • Opcode ID: a32a8db7c62fd2e94d192c7c794a658de6f18f9979e65bc14218121ac3c4a8d4
                        • Instruction ID: edd0f22dc0f00d22cedd13ff33f92da8ce27944396e1b683ceb901e099426fd8
                        • Opcode Fuzzy Hash: a32a8db7c62fd2e94d192c7c794a658de6f18f9979e65bc14218121ac3c4a8d4
                        • Instruction Fuzzy Hash: 1452E2B0D0429CCBEB24DFAAD49479EBBF1BF44308F14912AE454AB295DBB49849CF41
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: AddressProc$HandleLibraryLoadModule
                        • String ID: __deregister_frame_info$__register_frame_info$libgcc_s_dw2-1.dll
                        • API String ID: 384173800-1835852900
                        • Opcode ID: 2a20a494e5bd57f2d27e63e0bf20a31e087a3d3e965c40b1b4fb85bf8f975db5
                        • Instruction ID: 524f31e2f09257574a54fd2511d9eaa038966ecd62a81e52e2a2d4fea952e0b1
                        • Opcode Fuzzy Hash: 2a20a494e5bd57f2d27e63e0bf20a31e087a3d3e965c40b1b4fb85bf8f975db5
                        • Instruction Fuzzy Hash: 7C0184B18092489BC7007FB9A90929EBFF4EB44341F06456DD989A7245D7B08849EBD3
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: abort
                        • String ID:
                        • API String ID: 4206212132-0
                        • Opcode ID: cb42a8986869489169f5aecce8518cf5f67fc2ae1588cbee1365d47dac422884
                        • Instruction ID: 7fe2c9cd57e4889cd87c2e53eedd033811aeaced9075426ed91565861bd5779e
                        • Opcode Fuzzy Hash: cb42a8986869489169f5aecce8518cf5f67fc2ae1588cbee1365d47dac422884
                        • Instruction Fuzzy Hash: 0DE08C70C093009EDB107F2489023AAB6E4BF81348F452C4CE89823283EB3994897796
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID:
                        • String ID: gfff
                        • API String ID: 0-1553575800
                        • Opcode ID: 0073a8cf0da60cb04c71dd4f934285ee406274152f31b0e2a9521934299919e5
                        • Instruction ID: e8acabce20ce27eb6df48c6d91ebe49bf23b748757233e87044cc5bab6d6b67a
                        • Opcode Fuzzy Hash: 0073a8cf0da60cb04c71dd4f934285ee406274152f31b0e2a9521934299919e5
                        • Instruction Fuzzy Hash: 0812C475E0430A8FDB04CFA9C985AAEBBF2AF58350F149125E948EB351E734ED41CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: 1dcb7d983feff556881198f30038af6ca7f12b7be2c197ea862e8010217394aa
                        • Instruction ID: 3048d7635f3920ca20f3c19fc6079285494eab13100aa7302cf7e31d4930a9ef
                        • Opcode Fuzzy Hash: 1dcb7d983feff556881198f30038af6ca7f12b7be2c197ea862e8010217394aa
                        • Instruction Fuzzy Hash: 324226B0D042AC8BEB219F66C89579DBBF1BB55308F00909AD498BB386DB744985DF42
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e97695afb617a3f923c6b3b59cb640a9f43eabd5f12d7ba363e01811b228366d
                        • Instruction ID: db79deb4ffc1ab74ab7e8c966eb4632c919b74431dc1fb953d740710b639a6c0
                        • Opcode Fuzzy Hash: e97695afb617a3f923c6b3b59cb640a9f43eabd5f12d7ba363e01811b228366d
                        • Instruction Fuzzy Hash: C06191B5E0429C9FDB11DFAAD88069EFBF5BF48314F18A52DE854B7341C734A8019B92
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f34ab0970795ce4c984d1a3aec6b80fbb63f1c6f645651df4128e3d80a54c061
                        • Instruction ID: 37093635fb9488336f7e29401e940fc7e8e13a9c293e609c6f9571b9b63b86b8
                        • Opcode Fuzzy Hash: f34ab0970795ce4c984d1a3aec6b80fbb63f1c6f645651df4128e3d80a54c061
                        • Instruction Fuzzy Hash: F2513B757083198FC714DE69D48462BF7E2ABC8710F11892EE998D7340E771EC19CB82
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 095c74716efd8bddd4451833ac99d74df168eb62f009fcb5752a56a238bec1d2
                        • Instruction ID: 4ca9c3d5a9292512d08901c9c450441b59752ba9cb734c738582d9a5f89219e5
                        • Opcode Fuzzy Hash: 095c74716efd8bddd4451833ac99d74df168eb62f009fcb5752a56a238bec1d2
                        • Instruction Fuzzy Hash: 0B31E5327083194BC7149EADD8C423AF6D3ABD8360F59863DE94ACB3C0EB719C55B681
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: feed848f599a5cd88bd727f8b4df612002df484fccf92bd63339d157ffa91842
                        • Instruction ID: 4fca186ae0dbd2b0437e6e381fbcd2d2444aedef77f93a384c43580c619ec531
                        • Opcode Fuzzy Hash: feed848f599a5cd88bd727f8b4df612002df484fccf92bd63339d157ffa91842
                        • Instruction Fuzzy Hash: 30F01CB4A082099BDB00EF68D8C175BB7F5EB88344F008438E854D7385D638E9449B92
                        APIs
                        • LoadLibraryA.KERNEL32 ref: 00EE49E6
                          • Part of subcall function 00EE30B2: GetLastError.KERNEL32 ref: 00EE3108
                          • Part of subcall function 00EE30B2: MessageBoxA.USER32 ref: 00EE31BA
                          • Part of subcall function 00EE30B2: exit.MSVCRT ref: 00EE31E1
                          • Part of subcall function 00EE30B2: GetProcAddress.KERNEL32 ref: 00EE3205
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: AddressErrorLastLibraryLoadMessageProcexit
                        • String ID: CloseHandle$CreateFileW$CreateNamedPipeW$CreatePipe$CreateProcessW$DuplicateHandle$FormatMessageW$GetCurrentProcess$GetExitCodeProcess$GetLastError$GetModuleFileNameW$GetStdHandle$LocalFree$ReadFile$SetHandleInformation$Sleep$WaitForSingleObject$WriteFile
                        • API String ID: 2087689892-1854796719
                        • Opcode ID: 6efbd48bac6f34102f0802d2e41295cd2d5e627e1fb9a5735368e394d5d85347
                        • Instruction ID: 51ee11e35b55bd868d1714a0c9e3f399927784e0b76efdabfdc2512b781bbe8a
                        • Opcode Fuzzy Hash: 6efbd48bac6f34102f0802d2e41295cd2d5e627e1fb9a5735368e394d5d85347
                        • Instruction Fuzzy Hash: 3541FE74A0964D8BC748EFF2EF9945537F1A788380353D42E99055B396EE329A0AFB04
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: exit$AddressProc$ErrorLastMessage
                        • String ID: (bad format; library may be wrong architecture)$J$@$SIGABRT: Abnormal termination.$SIGFPE: Arithmetic error.$SIGILL: Illegal operation.$SIGINT: Interrupted by Ctrl-C.$SIGSEGV: Illegal storage access. (Attempt to read from nil?)$could not import: $could not load: $unknown signal
                        • API String ID: 24751467-4290323954
                        • Opcode ID: 903e3e2bf33c9eec240ff906b6051b99b853799be389900f6571cce16f78f7df
                        • Instruction ID: f86c6885ee5d031df6c14b290afac2bd5e0ecb57677c756527edb195ecf83997
                        • Opcode Fuzzy Hash: 903e3e2bf33c9eec240ff906b6051b99b853799be389900f6571cce16f78f7df
                        • Instruction Fuzzy Hash: E061EA7090425C8BDB14AFB9C8857DDBBF6EF84304F0045BDD988A7382D7758E859B91
                        APIs
                          • Part of subcall function 00EE1B7F: strlen.MSVCRT ref: 00EE1B8E
                          • Part of subcall function 00EE1B7F: fwrite.MSVCRT ref: 00EE1BA6
                          • Part of subcall function 00EE1B7F: fflush.MSVCRT ref: 00EE1BAE
                        • GetLastError.KERNEL32 ref: 00EE3108
                        • MessageBoxA.USER32 ref: 00EE31BA
                        • exit.MSVCRT ref: 00EE31E1
                        • GetProcAddress.KERNEL32 ref: 00EE3205
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: AddressErrorLastMessageProcexitfflushfwritestrlen
                        • String ID: (bad format; library may be wrong architecture)$J$@$could not import: $could not load:
                        • API String ID: 2650761064-1246505812
                        • Opcode ID: 740163e9207aa31f92e73d4bffb5721efa658c62dc942c749e337daf815848a3
                        • Instruction ID: 0a79075d5ea1f8117d37eb8979e60cf21dc28925239a322f50903a784a6754f0
                        • Opcode Fuzzy Hash: 740163e9207aa31f92e73d4bffb5721efa658c62dc942c749e337daf815848a3
                        • Instruction Fuzzy Hash: 9D51B5B090425C8BEB10AFA5C8857DEBBF6EF44304F0041BDDA88A7342D7788E859F91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: abort
                        • String ID: Erro$ad $eani$eys $for $in_k$ng u$p sp$r cl$thre
                        • API String ID: 4206212132-3726152543
                        • Opcode ID: 16f404fd46d2a77af62eb37662f3538f979dd01cce762ae5272627f43fd6358f
                        • Instruction ID: 274d234008f231cf458aaf2b569ab405f35b1cb69a6e1c8ec0f2c1d5449b6636
                        • Opcode Fuzzy Hash: 16f404fd46d2a77af62eb37662f3538f979dd01cce762ae5272627f43fd6358f
                        • Instruction Fuzzy Hash: 70315374900248DFDB10CFA8C885B8CBBF1FF85320F14822AE8589B3A6D7749A04EF51
                        APIs
                        • SafeArrayGetDim.OLEAUT32 ref: 00EE7E99
                        • SafeArrayGetVartype.OLEAUT32 ref: 00EE7EE1
                        • SafeArrayGetLBound.OLEAUT32 ref: 00EE7F23
                        • SafeArrayGetUBound.OLEAUT32 ref: 00EE7F55
                        • SafeArrayAccessData.OLEAUT32 ref: 00EE7F83
                        • SafeArrayUnaccessData.OLEAUT32 ref: 00EE7FDE
                          • Part of subcall function 00EE6669: CoInitialize.OLE32 ref: 00EE6699
                          • Part of subcall function 00EE6669: VariantCopy.OLEAUT32 ref: 00EE66E7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: ArraySafe$BoundData$AccessCopyInitializeUnaccessVariantVartype
                        • String ID: VariantConversionError$com.nim$fromVariant
                        • API String ID: 2568714141-2391934419
                        • Opcode ID: ec0cba7e2eb1cfd798148330d1a17604a27f8826b2815b26513c5d7eb1fa83ce
                        • Instruction ID: 04bcb057df8b354711ad5157cdaacb70228e1a416cc5d078f6ba58cf6d614e76
                        • Opcode Fuzzy Hash: ec0cba7e2eb1cfd798148330d1a17604a27f8826b2815b26513c5d7eb1fa83ce
                        • Instruction Fuzzy Hash: 0FA166B4D0428CDFEB15DFA9C58479DBBF0AF49304F049099E888AB352DB759C89CB52
                        APIs
                        • SafeArrayGetDim.OLEAUT32 ref: 00EE710F
                        • SysAllocString.OLEAUT32 ref: 00EE71B0
                          • Part of subcall function 00EE6669: CoInitialize.OLE32 ref: 00EE6699
                          • Part of subcall function 00EE6669: VariantCopy.OLEAUT32 ref: 00EE66E7
                          • Part of subcall function 00EE61AB: SysStringLen.OLEAUT32 ref: 00EE61C8
                        • VariantClear.OLEAUT32 ref: 00EE7297
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: StringVariant$AllocArrayClearCopyInitializeSafe
                        • String ID: VariantConversionError$com.nim$fromVariant
                        • API String ID: 3897195957-2391934419
                        • Opcode ID: c0b9a92ad15459fab2646054d1497587646047e27b34f6395e10982ea21f464b
                        • Instruction ID: fed5440cac4f90a7e82650cade2531165f07951211b887da7bf84d2e64f7eb66
                        • Opcode Fuzzy Hash: c0b9a92ad15459fab2646054d1497587646047e27b34f6395e10982ea21f464b
                        • Instruction Fuzzy Hash: 6371BDB0C0869C9FEF219FA5D4847ADBFF0AF49304F049449EA807B356E7744885DBA2
                        APIs
                        • SafeArrayGetDim.OLEAUT32 ref: 00EE77F4
                        • VariantClear.OLEAUT32 ref: 00EE798C
                          • Part of subcall function 00EE6669: CoInitialize.OLE32 ref: 00EE6699
                          • Part of subcall function 00EE6669: VariantCopy.OLEAUT32 ref: 00EE66E7
                        • VariantChangeType.OLEAUT32 ref: 00EE784E
                        • CoInitialize.OLE32 ref: 00EE7942
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: Variant$Initialize$ArrayChangeClearCopySafeType
                        • String ID: VariantConversionError$com.nim$fromVariant
                        • API String ID: 2375843262-2391934419
                        • Opcode ID: a50f7cece5b410f8534dbb8b8fcc1a4d40e91356676fd3d6bad450013efdb19c
                        • Instruction ID: 99f602e0202a07d9d303ba838c2dd48797f82e0bc4a3587e9252b0238762e0f6
                        • Opcode Fuzzy Hash: a50f7cece5b410f8534dbb8b8fcc1a4d40e91356676fd3d6bad450013efdb19c
                        • Instruction Fuzzy Hash: 4A71AF7090829C9FEF21AFA5C4443ADBBF1AF89304F05A499E4C47B383D7758844DB92
                        APIs
                        Strings
                        • Mingw-w64 runtime failure:, xrefs: 00EFA6E5
                        • Address %p has no image-section, xrefs: 00EFA7AD
                        • VirtualProtect failed with code 0x%x, xrefs: 00EFA94C
                        • VirtualQuery failed for %d bytes at address %p, xrefs: 00EFA876
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: abortfwritevfprintf
                        • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                        • API String ID: 3176311984-1534286854
                        • Opcode ID: 34f3288ae7fbdd133a32cdfda0656dab2c0cf0d5a6c4a4ecf6e6b3338dac60f9
                        • Instruction ID: 5b928b86955eccfcc2737007a16b82a50ff00d529477e4ba20c36634067612b9
                        • Opcode Fuzzy Hash: 34f3288ae7fbdd133a32cdfda0656dab2c0cf0d5a6c4a4ecf6e6b3338dac60f9
                        • Instruction Fuzzy Hash: 3761A1B4A046099FC704DF58C981AAEB7F1FB88340F15C529E958E7351D774EA42EF82
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: AddressProc$exit
                        • String ID: (bad format; library may be wrong architecture)$J$@$could not import:
                        • API String ID: 3486290055-1653290064
                        • Opcode ID: 5d98dde79866ae850ab431e09915aa071ba92e8fd2ed4160c1667222e4fc7a25
                        • Instruction ID: 7a9b85ac878d916b13edcf7bd800d2e6d85e150563b38fd798d41d8a4c655fba
                        • Opcode Fuzzy Hash: 5d98dde79866ae850ab431e09915aa071ba92e8fd2ed4160c1667222e4fc7a25
                        • Instruction Fuzzy Hash: 9F31E77090425C9AEB14AF6ADC857EEF7F6AB59300F0040BDDACCA3342D6358E459BA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: ArraySafe$CreateElementInitialize
                        • String ID: VariantConversionError$com.nim$toVariant
                        • API String ID: 2234878901-3035603046
                        • Opcode ID: d56ca305d1e5ad057c63b6e8b602c7497dc6c38c168a44bbf540f460b1dd8d80
                        • Instruction ID: 388ce13efdc2fcaf6e08bb3c9821cefe8de308e907e8f3b68f45de580a57d5d6
                        • Opcode Fuzzy Hash: d56ca305d1e5ad057c63b6e8b602c7497dc6c38c168a44bbf540f460b1dd8d80
                        • Instruction Fuzzy Hash: 5C519CB0D043589FDB21AF69C88436DBBE0FF85304F01D46EE688AB392D7758845DB92
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: ArraySafe$CreateElementInitialize
                        • String ID: VariantConversionError$com.nim$toVariant
                        • API String ID: 2234878901-3035603046
                        • Opcode ID: 1f702794f37a1c86d36bb597a101a34cec95a56f2fc54ee86c5894ec2e547133
                        • Instruction ID: 30da63480cd2f1f0366adf01aa1debfae808d81e3462cf495f8f458dba0814c6
                        • Opcode Fuzzy Hash: 1f702794f37a1c86d36bb597a101a34cec95a56f2fc54ee86c5894ec2e547133
                        • Instruction Fuzzy Hash: 47419EB0D0425C9FEB21EF75C84436DBBE0BF89344F11946DEA94AB342D7B58844DB92
                        APIs
                        Strings
                        • (, xrefs: 00F0553E
                        • (((rwlock_t *)*rwl)->valid == LIFE_RWLOCK) && (((rwlock_t *)*rwl)->busy > 0), xrefs: 00F0554E
                        • Assertion failed: (%s), file %s, line %d, xrefs: 00F05556
                        • src/rwlock.c, xrefs: 00F05546
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: exitfprintf
                        • String ID: ($(((rwlock_t *)*rwl)->valid == LIFE_RWLOCK) && (((rwlock_t *)*rwl)->busy > 0)$Assertion failed: (%s), file %s, line %d$src/rwlock.c
                        • API String ID: 4243785698-3585572628
                        • Opcode ID: 5f9f2f20a5c5fb7276d01b1f7b544be979b4043cf40b183f80b9c4b643f27279
                        • Instruction ID: d6c9a8b3c5036b29aadc406545bfb28ca4ef8939917bf190fbf60bc73a7c2784
                        • Opcode Fuzzy Hash: 5f9f2f20a5c5fb7276d01b1f7b544be979b4043cf40b183f80b9c4b643f27279
                        • Instruction Fuzzy Hash: 610104746057088FC300EF58D989919BBE4BF45304F048948E4C88B3A2CBB8E884FF82
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: signal
                        • String ID:
                        • API String ID: 1946981877-0
                        • Opcode ID: bf5cc1b277670a267714325ba9559dec80da75ac437d972a0287857624e5941f
                        • Instruction ID: 20f866bfabfc28cd85cd0e7cd7690b561414a7de3aa9b3edc70f2fb5e7b4ea1e
                        • Opcode Fuzzy Hash: bf5cc1b277670a267714325ba9559dec80da75ac437d972a0287857624e5941f
                        • Instruction Fuzzy Hash: 93410DF19042098EEB10AF64D5443BDB7B0BB05318F199A29D1ACBF2D1C7794984DF43
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: CopyInitializeVariant
                        • String ID: VariantConversionError$com.nim$toVariant
                        • API String ID: 633353902-3035603046
                        • Opcode ID: c8416a82b98a5057c6cf152ea1bc5d0af863284d1ea60cd0391b234fcceae913
                        • Instruction ID: 78a32959cbedd486904d63f38b3018288725dcec8bc7ee9dcc32b66b16d90534
                        • Opcode Fuzzy Hash: c8416a82b98a5057c6cf152ea1bc5d0af863284d1ea60cd0391b234fcceae913
                        • Instruction Fuzzy Hash: 293192B19083899FDB10AFB9C44439ABBE1EF44304F00992DE5C5AB382D7759844EB91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: CopyInitializeVariant
                        • String ID: VariantConversionError$com.nim$newVariant
                        • API String ID: 633353902-805458017
                        • Opcode ID: 45c9569cd02e96eb8ecedeed44bc9210944f85b4a01c7131488a30f7f9ddb221
                        • Instruction ID: cd71aa8a539d5415e95f01534b2a749452dea23433513188f69acaf203274a55
                        • Opcode Fuzzy Hash: 45c9569cd02e96eb8ecedeed44bc9210944f85b4a01c7131488a30f7f9ddb221
                        • Instruction Fuzzy Hash: 1F31B2B09043899FDB10AFB5C44435EBBF0FF95354F01882EE585AB382D7759844EB91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: calloc
                        • String ID:
                        • API String ID: 2635317215-3916222277
                        • Opcode ID: f65756ecc1919784dff9414ac3e3b7b77ab1357038e3adb49f7eaf2e7ec3b0d8
                        • Instruction ID: d59fe282c27c0e64958ed62c2a0937d7bf2f9426f3feabc5e66e55b1622da18d
                        • Opcode Fuzzy Hash: f65756ecc1919784dff9414ac3e3b7b77ab1357038e3adb49f7eaf2e7ec3b0d8
                        • Instruction Fuzzy Hash: BE414E74E04609DFDB00EFA8C889B9EB7F0FF04714F418959E8A5AB392D7789944EB41
                        APIs
                        • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,00000001,00000000,?,?,00EFA22B), ref: 00EE3FAE
                        • fputc.MSVCRT ref: 00EE403A
                        • fwrite.MSVCRT ref: 00EE408D
                        • fflush.MSVCRT ref: 00EE40A1
                        • LeaveCriticalSection.KERNEL32 ref: 00EE40AD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterLeavefflushfputcfwrite
                        • String ID:
                        • API String ID: 623422050-0
                        • Opcode ID: 8598e995c5b5a34ca18daeaec7858ee6b40204eb54c2f3619594a400cdbbdc31
                        • Instruction ID: db8878f086c08b017ceab5cb2f47987fe0c3a35270e27e260edbcdac2b2ac080
                        • Opcode Fuzzy Hash: 8598e995c5b5a34ca18daeaec7858ee6b40204eb54c2f3619594a400cdbbdc31
                        • Instruction Fuzzy Hash: DD313CB09042099FDB10EFA5C8847ADBBF4EF88304F05952DE584A7352D7B99980EB92
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: memset
                        • String ID: z
                        • API String ID: 2221118986-1657960367
                        • Opcode ID: 33bec8d43b57326b9a1e5255a4728608ab4f4c0903b179c354d0f6b43994ff92
                        • Instruction ID: 09cb542211aa8bd1bfff6512fa01f339617b54544a2e8a4c88720c237e0965c9
                        • Opcode Fuzzy Hash: 33bec8d43b57326b9a1e5255a4728608ab4f4c0903b179c354d0f6b43994ff92
                        • Instruction Fuzzy Hash: F081927090020ADFDF10CF59C4857AEBBF0BF08355F108519E868AB290D3B9EA95EF95
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: memset
                        • String ID: &
                        • API String ID: 2221118986-1010288
                        • Opcode ID: 97417f53290297cc1caa45a986f46549f3145e6d93713e9dbf45f40050e36feb
                        • Instruction ID: 7f0e68a71d7d406c6e54405476eca231807d89a8e01c38e0e4a05ee0db3cd7b8
                        • Opcode Fuzzy Hash: 97417f53290297cc1caa45a986f46549f3145e6d93713e9dbf45f40050e36feb
                        • Instruction Fuzzy Hash: 0371BF7490020ADFDF20CF59C9847AEB7B0FF04324F148569E864AB291D378DA94EF95
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: memset
                        • String ID: &
                        • API String ID: 2221118986-1010288
                        • Opcode ID: 9e4d073aa8be4ade6cae661355d0d0f7307d55aeb76e789427c838b067a72e7a
                        • Instruction ID: 66bb00862b93bb8acc895ccb8b9ecb417888a199509cea76777e1cb4eb671006
                        • Opcode Fuzzy Hash: 9e4d073aa8be4ade6cae661355d0d0f7307d55aeb76e789427c838b067a72e7a
                        • Instruction Fuzzy Hash: 2171D07090424ADFDF11CF99C4887AEBBF0EF04365F108519E864AB280D3789A94EFA5
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: fprintf
                        • String ID: C%p %d %s$C%p %d V=%0X w=%ld %s
                        • API String ID: 383729395-884133013
                        • Opcode ID: 21cda4cb30bc923e0b722d7d6f4bcd150bdb43ed3a3e0d7222cad11430a33ffc
                        • Instruction ID: a7d73d42695493508235ad997c9a449f0ec452b187dc8b54077b290efb521121
                        • Opcode Fuzzy Hash: 21cda4cb30bc923e0b722d7d6f4bcd150bdb43ed3a3e0d7222cad11430a33ffc
                        • Instruction Fuzzy Hash: 56219374A04305DFCB40DF59E88499ABBF4AB98350F10C52AF998CB361DB74A941EF91
                        APIs
                        Strings
                        • RWL%p %d %s, xrefs: 00F0581B
                        • RWL%p %d V=%0X B=%d r=%ld w=%ld L=%p %s, xrefs: 00F05875
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: printf
                        • String ID: RWL%p %d %s$RWL%p %d V=%0X B=%d r=%ld w=%ld L=%p %s
                        • API String ID: 3524737521-1971217749
                        • Opcode ID: 702a31ca680b6a7795406131e76629e502cbd8b4cbaf0075588408f7536eef23
                        • Instruction ID: f854a6ce351a26efab6dc65f1ddba5ed46519e73ba50e679ffe4d185adcdd679
                        • Opcode Fuzzy Hash: 702a31ca680b6a7795406131e76629e502cbd8b4cbaf0075588408f7536eef23
                        • Instruction Fuzzy Hash: 7421B474A08704AFCB00DF59D48065ABBE0FB88754F10C86AF899CB360D774E940AF82
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: printf
                        • String ID: T%p %d %s$T%p %d V=%0X H=%p %s
                        • API String ID: 3524737521-2059990036
                        • Opcode ID: 9b15409ad81e8d55041f2c60926286dc6776da3090aacdce615bc07236718bef
                        • Instruction ID: 5706d5a8e61cfe11fadb2a735ad2f3fbc44658dca6de7a561ce6ee517488428a
                        • Opcode Fuzzy Hash: 9b15409ad81e8d55041f2c60926286dc6776da3090aacdce615bc07236718bef
                        • Instruction Fuzzy Hash: 2511FE705083049FDB50EF69D98494ABBE4EF89350F11C929F888C7350D774D980EBA2
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: atoisetlocalestrchr
                        • String ID: .
                        • API String ID: 1223908000-248832578
                        • Opcode ID: 913335cb0b85864febce951fc101198b94ac045b3d78c8280c564eefbe26e24a
                        • Instruction ID: 537abc423e1cd24fb12b03cc94793a05c10a1b4aa8aa3914f1217c391aa27a01
                        • Opcode Fuzzy Hash: 913335cb0b85864febce951fc101198b94ac045b3d78c8280c564eefbe26e24a
                        • Instruction Fuzzy Hash: FDE09A70804304ABD714BFA5D84A35DB7F4BB00348F00885CE080DB2C2D67C9484FB86
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: memset
                        • String ID: z
                        • API String ID: 2221118986-1657960367
                        • Opcode ID: 0f480dde8c9652c92a97bf27d2d1770a53d0c43e0074a90f2a354a8b5f3358f0
                        • Instruction ID: 857cae4880d7e4927f95aa9c97ea59cb0b2c50bddfd9048d8105ddbc23c92080
                        • Opcode Fuzzy Hash: 0f480dde8c9652c92a97bf27d2d1770a53d0c43e0074a90f2a354a8b5f3358f0
                        • Instruction Fuzzy Hash: 87817F7090030ADFDF11CF59C4847AEBBF1AB44355F148519E858AB390D378EA95EF92
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: realloc
                        • String ID:
                        • API String ID: 471065373-0
                        • Opcode ID: 94471a85d24445aa736d0a5e051881bbe0c98b6d8f5f08a2ded4814bdb816338
                        • Instruction ID: e56a14ad0a1cf57da1c51f56e89e781697a7f1b5d8008680c0a0173d7588d5d4
                        • Opcode Fuzzy Hash: 94471a85d24445aa736d0a5e051881bbe0c98b6d8f5f08a2ded4814bdb816338
                        • Instruction Fuzzy Hash: B95193B4A0421A8FCB00DFA8C985AAEB7F0FF48304F558969E858EB355D734E941DF51
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: __set_app_type$__p__commode__p__fmode
                        • String ID:
                        • API String ID: 2522132747-0
                        • Opcode ID: 0b4d1ce9bfc3ea28e4e31f7a052b66651dc33827074dfa411c69a1a015b8220e
                        • Instruction ID: 4cce61f92373daaa595b64f9e18c63dacd368f0895e95cfd42a3518f88f772f4
                        • Opcode Fuzzy Hash: 0b4d1ce9bfc3ea28e4e31f7a052b66651dc33827074dfa411c69a1a015b8220e
                        • Instruction Fuzzy Hash: D7F012B02002888BD340BFA9D98237E77E5AB40344F129565D4849B393DF79D8C2F7A3
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: FormatFreeLocalMessage
                        • String ID: OSError
                        • API String ID: 1427518018-4278961375
                        • Opcode ID: 2cb05c07912136c38e69bc028c488f47c5c360fd9f0a708ebd85dd201c9d45be
                        • Instruction ID: c5760108e98596e6dc621d4652e9d54aa04f2b8721e094769e7b2f0db0fdb6f9
                        • Opcode Fuzzy Hash: 2cb05c07912136c38e69bc028c488f47c5c360fd9f0a708ebd85dd201c9d45be
                        • Instruction Fuzzy Hash: 08414BB0A042898FDB00EF6AC8847AEFBF5FF98304F149559E844AB391D774C845DBA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: fprintffree
                        • String ID: %p not found?!?!
                        • API String ID: 92069018-11085004
                        • Opcode ID: 419cc6e492abf3e2059c478a23ebd6ebe270f8a57f8ef653f64568f72577c1d0
                        • Instruction ID: 1639bc04bf733332e3306288dd2829ad18a96c19bd6ccaa0dbfeba12d422c1ad
                        • Opcode Fuzzy Hash: 419cc6e492abf3e2059c478a23ebd6ebe270f8a57f8ef653f64568f72577c1d0
                        • Instruction Fuzzy Hash: 8D21B474905209DFCB40EF99C488AADBBF0BF48354F05C959E8949B3A1D774E980EF91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: FreeVirtualexit
                        • String ID: virtualFree failing!
                        • API String ID: 1212090140-3108117800
                        • Opcode ID: 345bbea2bff1895aa43dbc116ab3f6045c019be3673bbedbfce0d411bd80cd0d
                        • Instruction ID: 7b452db5003089f4794154c0457244943cba10c18db65cc05261d96a5f98fcb1
                        • Opcode Fuzzy Hash: 345bbea2bff1895aa43dbc116ab3f6045c019be3673bbedbfce0d411bd80cd0d
                        • Instruction Fuzzy Hash: E101D475A042048FDB00AF6AD8843DDBBE4FF85318F0481BAEC488B256D7714489CBA2
                        APIs
                        Strings
                        • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00EFA695
                        • Unknown error, xrefs: 00EFA640
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: fprintf
                        • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                        • API String ID: 383729395-3474627141
                        • Opcode ID: c27dc237151a72e94e5d5a258ed647316675aa235ab71232018723bab6d64e72
                        • Instruction ID: 6b98c3bb7ab33bdf3f0b47184f85e8c94d06d070380aa7384ca2c94083956308
                        • Opcode Fuzzy Hash: c27dc237151a72e94e5d5a258ed647316675aa235ab71232018723bab6d64e72
                        • Instruction Fuzzy Hash: 4911C574504609EBDB00EF55E48899DBFF0FF88350F528488E8C8AB355CB35E9A4DB56
                        APIs
                        Strings
                        • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00EFA695
                        • Total loss of significance (TLOSS), xrefs: 00EFA62E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: fprintf
                        • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                        • API String ID: 383729395-4273532761
                        • Opcode ID: d79c1295f89a633a58e2ccc43cafe6ecacd34a67ef52a4241a51ea9d62dafbe8
                        • Instruction ID: ab03d63eab146ee0b6d9d3095759f3a02400e821d2ee78e2530c701ca8077f80
                        • Opcode Fuzzy Hash: d79c1295f89a633a58e2ccc43cafe6ecacd34a67ef52a4241a51ea9d62dafbe8
                        • Instruction Fuzzy Hash: B1019274904A09EBDB00DF45E48899DBFF0FF88344F528488E8C86B296CB35D9B4DB52
                        APIs
                        Strings
                        • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00EFA695
                        • Partial loss of significance (PLOSS), xrefs: 00EFA625
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: fprintf
                        • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                        • API String ID: 383729395-4283191376
                        • Opcode ID: 80e5e4e542d8d16ecc8aab90809474b0b9eb5db8956d51bc3d84df7b5625ab5c
                        • Instruction ID: b2220ecb3ae1ac7a5a0b8a216a68bed7713528e464fcbce06b172a7b2141b348
                        • Opcode Fuzzy Hash: 80e5e4e542d8d16ecc8aab90809474b0b9eb5db8956d51bc3d84df7b5625ab5c
                        • Instruction Fuzzy Hash: 3D019274904A09EBDB00DF45E08899DBFF0FF88344F528488E8C86B296CB35D9B4DB52
                        APIs
                        Strings
                        • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00EFA695
                        • The result is too small to be represented (UNDERFLOW), xrefs: 00EFA637
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: fprintf
                        • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                        • API String ID: 383729395-2187435201
                        • Opcode ID: 0cc054fb29da6a625bd1ba9c8fc8bf6bc4dc9f4e97f315a6f7a48896ad4a6f3c
                        • Instruction ID: 382615dc53cb7f21bdfe2e0fb9df68815f7b5fb95b47cb3ceb36114632255e0d
                        • Opcode Fuzzy Hash: 0cc054fb29da6a625bd1ba9c8fc8bf6bc4dc9f4e97f315a6f7a48896ad4a6f3c
                        • Instruction Fuzzy Hash: 10019274904A09EBDB00DF45E08899DBFF0FF88344F528488E8C86B296CB75D9B4DB52
                        APIs
                        Strings
                        • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00EFA695
                        • Argument domain error (DOMAIN), xrefs: 00EFA60A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: fprintf
                        • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                        • API String ID: 383729395-2713391170
                        • Opcode ID: 7b728922b01d8630b2c5596ed974249c386cbd37a976cf13bd04e7eee0b2aac6
                        • Instruction ID: c8b17d6731a2f911e84799b88455faa6557c53e4528c2f1edcddd66e85da9ae2
                        • Opcode Fuzzy Hash: 7b728922b01d8630b2c5596ed974249c386cbd37a976cf13bd04e7eee0b2aac6
                        • Instruction Fuzzy Hash: 28019274904A09EBDB00DF45E08899DBFF0FF88354F528488E8C86B25ACB35D9B4DB52
                        APIs
                        Strings
                        • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00EFA695
                        • Overflow range error (OVERFLOW), xrefs: 00EFA61C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: fprintf
                        • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                        • API String ID: 383729395-4064033741
                        • Opcode ID: 2937cc81757473e6dcbc3944c5440f09a7f75b1fb7ecb6051f36e988ecdc0c2c
                        • Instruction ID: bb93bbb0fd1bf7f0c1faa65f774d98e067bf00a8b40d15d5aa3cbece37d3eef5
                        • Opcode Fuzzy Hash: 2937cc81757473e6dcbc3944c5440f09a7f75b1fb7ecb6051f36e988ecdc0c2c
                        • Instruction Fuzzy Hash: 63019274904A09EBDB00DF45E08899DBFF0FF88344F528488E8C86B296CB35D9B4DB52
                        APIs
                        Strings
                        • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00EFA695
                        • Argument singularity (SIGN), xrefs: 00EFA613
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: fprintf
                        • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                        • API String ID: 383729395-2468659920
                        • Opcode ID: f74d474e6cdf922584b42ef4021e73d054d881ab6a5dfe11c5f60ed9440cfddb
                        • Instruction ID: 71ae34d4af751e65847ac36f6dcf22a5b674acfbd6aad7de7f202ad1ee9f1931
                        • Opcode Fuzzy Hash: f74d474e6cdf922584b42ef4021e73d054d881ab6a5dfe11c5f60ed9440cfddb
                        • Instruction Fuzzy Hash: 1D019274904A09EBDB00DF45E08899DBFF0FF88344F528488E8C86B256CB35D9B4DB52
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: free$memset
                        • String ID:
                        • API String ID: 2717317152-0
                        • Opcode ID: 1b32eb604eaa46abadf8cd78cea66da4e6f4d9e963d029525c123901af9b158a
                        • Instruction ID: c836ff375029f5d23c1881e5a66cbf3e6b40ccaaba60251218b407358e939b9f
                        • Opcode Fuzzy Hash: 1b32eb604eaa46abadf8cd78cea66da4e6f4d9e963d029525c123901af9b158a
                        • Instruction Fuzzy Hash: 6E31A9746043099FDB40EF69D984A997BE5BF08390F458568F888CB792DB34E940FF91
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2960994897.0000000000EE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EE0000, based on PE: true
                        • Associated: 00000000.00000002.2960904847.0000000000EE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961032552.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961062257.0000000000F0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961087773.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961121959.0000000000F1C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2961147801.0000000000F1D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ee0000_1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae.jbxd
                        Similarity
                        • API ID: malloc$memcpystrlen
                        • String ID:
                        • API String ID: 3553820921-0
                        • Opcode ID: 0df883d8f804be8603d09f79e5027836c1e691306ccb3d88e202735976b77b69
                        • Instruction ID: 0ece1606827cc3e1f4c5d3e74a028312bcf7e89893c76548c4b14d43ba56bdcb
                        • Opcode Fuzzy Hash: 0df883d8f804be8603d09f79e5027836c1e691306ccb3d88e202735976b77b69
                        • Instruction Fuzzy Hash: E6216BB4A0460A9FDF00DF99D881B9EB7F0FF49308F048858E555AB351E734AA44DF91